From 392b998f0b71da1f4b8ca034cdaa41a19e0e7618 Mon Sep 17 00:00:00 2001 From: Baohua Yang Date: Fri, 19 Jul 2019 20:36:40 -0700 Subject: [PATCH] Add v1.4.2 --- hyperledger_fabric/README.md | 5 +- hyperledger_fabric/v1.4.0/scripts/func.sh | 16 +- hyperledger_fabric/v1.4.2/.env | 4 + .../v1.4.2/2orgs-4peers-solo.yaml | 95 + hyperledger_fabric/v1.4.2/Makefile | 300 + hyperledger_fabric/v1.4.2/base-dev.yaml | 97 + hyperledger_fabric/v1.4.2/base-event.yaml | 78 + hyperledger_fabric/v1.4.2/base-kafka.yaml | 276 + hyperledger_fabric/v1.4.2/base-raft.yaml | 198 + hyperledger_fabric/v1.4.2/base-solo.yaml | 190 + hyperledger_fabric/v1.4.2/base.yaml | 163 + .../example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../example.com/ca/IssuerRevocationPublicKey | 5 + .../example.com/ca/ca.example.com-cert.pem | 14 + .../example.com/ca/ca.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...8d4bf2e735befe20a1138c57cdd2b74c48da14d_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + .../example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../example.com/tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...7fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | Bin 0 -> 32 bytes .../tlsca/tlsca.example.com-cert.pem | 14 + .../example.com/tlsca/tlsca.example.com_sk | 5 + .../fabric-ca-client-config.yaml | 162 + ...a798a30ef7e72c099dc45d5af032767bc56db90_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...7ae6ab6beed584000c446a5a22373fb366a4987_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...87de44c9d630428d49fe82ac730959ada6d3eb7_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../org1.example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../ca/IssuerRevocationPublicKey | 5 + .../ca/ca.org1.example.com-cert.pem | 14 + .../ca/ca.org1.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../org1.example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + ...bbca7d9485e5f138aa75f4c82cd0f74c14b5e56_sk | 5 + .../fabric-ca-client-config.yaml | 162 + ...105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...7b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...821de931526774ad9c6aa12865161208628bb4a_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../org1.example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | 1 + ...253fa86a004a246b452decd4f6aae2f1013583f_sk | 5 + .../tlsca/tlsca.org1.example.com-cert.pem | 14 + .../tlsca/tlsca.org1.example.com_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...90da9b01265e5e06e555889ea72e8b1925271f6_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...0e74d67380e9ea6514c6620cf570f8caa27b9b9_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...8cc6f90f9aa11513ab46453f26b2751fca86458_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...c4f7cd804ad237fd6759fc58d7bdfe070489749_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...47c4bfba74bf006c94ec88d283e9d4850ba3c28_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../org2.example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../ca/IssuerRevocationPublicKey | 5 + .../ca/ca.org2.example.com-cert.pem | 14 + .../ca/ca.org2.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../org2.example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...3e73807cda5f167f219b0c7687bb06baf3b5e60_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...959dfd2ecaa5135b935a001a4164a19a04ef791_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...7c3bd09974abc6156c0968ec242e31c90a3b22a_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...a630ece99c0354257389a79ee3d89b2043a4e51_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...46a489481db47142530f5acce617b92d911a9a8_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../org2.example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...e6b0fa8845ef93eb7f2e9b801e11f5b07852aeb_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | Bin 0 -> 32 bytes .../tlsca/tlsca.org2.example.com-cert.pem | 14 + .../tlsca/tlsca.org2.example.com_sk | 5 + .../v1.4.2/ca-test/docker-compose.yaml | 92 + hyperledger_fabric/v1.4.2/ca-test/run.sh | 12 + .../v1.4.2/ca-test/scripts/ca_server_start.sh | 54 + .../v1.4.2/ca-test/scripts/client-test.sh | 182 + .../v1.4.2/ca-test/scripts/env.sh | 166 + hyperledger_fabric/v1.4.2/crypto-config.yaml | 99 + ...718a3cba45e3d94e16fb816b542242fdc82798e_sk | 5 + .../example.com/ca/ca.example.com-cert.pem | 14 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 14 + ...980566471d8d8099a7b4d65db42e1a7265ef0e8_sk | 5 + .../signcerts/orderer0.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer0.example.com/tls/ca.crt | 15 + .../orderer0.example.com/tls/server.crt | 15 + .../orderer0.example.com/tls/server.key | 5 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 14 + ...cb01fc8dc68717f2c3319d69ec66c52859edbb5_sk | 5 + .../signcerts/orderer1.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer1.example.com/tls/ca.crt | 15 + .../orderer1.example.com/tls/server.crt | 15 + .../orderer1.example.com/tls/server.key | 5 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 14 + ...884c53154f25ea69660b7f6c4280d34841ce6bd_sk | 5 + .../signcerts/orderer2.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer2.example.com/tls/ca.crt | 15 + .../orderer2.example.com/tls/server.crt | 15 + .../orderer2.example.com/tls/server.key | 5 + ...02250777ab82ec0e1f18576fb7a127f370f2af9_sk | 5 + .../tlsca/tlsca.example.com-cert.pem | 15 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 14 + ...e37a65bc0abd1b5cf4c9a8d9702239077a24d7a_sk | 5 + .../msp/signcerts/Admin@example.com-cert.pem | 13 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../users/Admin@example.com/tls/ca.crt | 15 + .../users/Admin@example.com/tls/client.crt | 14 + .../users/Admin@example.com/tls/client.key | 5 + ...250b318f825fdaafb690e4dcb207fe5cb42f8d8_sk | 5 + .../ca/ca.org1.example.com-cert.pem | 15 + .../Admin@org1.example.com-cert.pem | 14 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../org1.example.com/msp/config.yaml | 8 + .../tlsca.org1.example.com-cert.pem | 15 + .../Admin@org1.example.com-cert.pem | 14 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../peer0.org1.example.com/msp/config.yaml | 8 + ...e7a4ee081a55a888d6d5336cc92e473669fe175_sk | 5 + .../signcerts/peer0.org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../peers/peer0.org1.example.com/tls/ca.crt | 15 + .../peer0.org1.example.com/tls/server.crt | 15 + .../peer0.org1.example.com/tls/server.key | 5 + .../Admin@org1.example.com-cert.pem | 14 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../peer1.org1.example.com/msp/config.yaml | 8 + ...997f6d495f50a64714906777507b8f1c3b777fa_sk | 5 + .../signcerts/peer1.org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../peers/peer1.org1.example.com/tls/ca.crt | 15 + .../peer1.org1.example.com/tls/server.crt | 15 + .../peer1.org1.example.com/tls/server.key | 5 + ...68d4edb0dd8ade024cf33e237b897ad623e4ce5_sk | 5 + .../tlsca/tlsca.org1.example.com-cert.pem | 15 + .../Admin@org1.example.com-cert.pem | 14 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + ...83206c98da94b93e5daa1574904fafe1252ec54_sk | 5 + .../signcerts/Admin@org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../users/Admin@org1.example.com/tls/ca.crt | 15 + .../Admin@org1.example.com/tls/client.crt | 14 + .../Admin@org1.example.com/tls/client.key | 5 + .../User1@org1.example.com-cert.pem | 14 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + ...88098b45651cbee04ee21f36897b461dfb58a89_sk | 5 + .../signcerts/User1@org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../users/User1@org1.example.com/tls/ca.crt | 15 + .../User1@org1.example.com/tls/client.crt | 14 + .../User1@org1.example.com/tls/client.key | 5 + ...657d880234c798c52cf81ff1f80d88a66aae1e0_sk | 5 + .../ca/ca.org2.example.com-cert.pem | 15 + .../Admin@org2.example.com-cert.pem | 14 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../org2.example.com/msp/config.yaml | 8 + .../tlsca.org2.example.com-cert.pem | 15 + .../Admin@org2.example.com-cert.pem | 14 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../peer0.org2.example.com/msp/config.yaml | 8 + ...4e4e2b8cac073915e0731bafcce718f0ee1f5ab_sk | 5 + .../signcerts/peer0.org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../peers/peer0.org2.example.com/tls/ca.crt | 15 + .../peer0.org2.example.com/tls/server.crt | 15 + .../peer0.org2.example.com/tls/server.key | 5 + .../Admin@org2.example.com-cert.pem | 14 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../peer1.org2.example.com/msp/config.yaml | 8 + ...55889637b1b1d9fdfbfea0f7d7b101aab6b293e_sk | 5 + .../signcerts/peer1.org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../peers/peer1.org2.example.com/tls/ca.crt | 15 + .../peer1.org2.example.com/tls/server.crt | 15 + .../peer1.org2.example.com/tls/server.key | 5 + ...9dc24e50c437f2fd1455aea4e3b8da76a3b2e17_sk | 5 + .../tlsca/tlsca.org2.example.com-cert.pem | 15 + .../Admin@org2.example.com-cert.pem | 14 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + ...d19960ff1a047418cd6b6b011fb0b61d04b6a75_sk | 5 + .../signcerts/Admin@org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../users/Admin@org2.example.com/tls/ca.crt | 15 + .../Admin@org2.example.com/tls/client.crt | 14 + .../Admin@org2.example.com/tls/client.key | 5 + .../User1@org2.example.com-cert.pem | 14 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + ...2788d5472f5ee5df75d3c6c2843d35603f76021_sk | 5 + .../signcerts/User1@org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../users/User1@org2.example.com/tls/ca.crt | 15 + .../User1@org2.example.com/tls/client.crt | 14 + .../User1@org2.example.com/tls/client.key | 5 + ...581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk | 5 + .../ca/ca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../org3.example.com/msp/config.yaml | 8 + .../tlsca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer0.org3.example.com/msp/config.yaml | 8 + ...c84d36579715dde229e6fbf4ee0a6427001e943_sk | 5 + .../signcerts/peer0.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer0.org3.example.com/tls/ca.crt | 15 + .../peer0.org3.example.com/tls/server.crt | 15 + .../peer0.org3.example.com/tls/server.key | 5 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer1.org3.example.com/msp/config.yaml | 8 + ...beb1389d038299fd76b0535072e1f0dd3f6e57b_sk | 5 + .../signcerts/peer1.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer1.org3.example.com/tls/ca.crt | 15 + .../peer1.org3.example.com/tls/server.crt | 15 + .../peer1.org3.example.com/tls/server.key | 5 + ...fb41664788c56aea4bebdc22c6342db2e568446_sk | 5 + .../tlsca/tlsca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + ...9967d0470486868a975948c69e4ff987024d4b0_sk | 5 + .../signcerts/Admin@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/Admin@org3.example.com/tls/ca.crt | 15 + .../Admin@org3.example.com/tls/client.crt | 14 + .../Admin@org3.example.com/tls/client.key | 5 + .../User1@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + ...81da179e8344cdafe94221c11296084c477c24d_sk | 5 + .../signcerts/User1@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/User1@org3.example.com/tls/ca.crt | 15 + .../User1@org3.example.com/tls/client.crt | 14 + .../User1@org3.example.com/tls/client.key | 5 + .../docker-compose-1orgs-1peers-dev.yaml | 92 + .../docker-compose-2orgs-4peers-couchdb.yaml | 107 + .../docker-compose-2orgs-4peers-event.yaml | 59 + .../docker-compose-2orgs-4peers-kafka.yaml | 134 + .../docker-compose-2orgs-4peers-raft.yaml | 76 + .../docker-compose-2orgs-4peers-solo-be.yaml | 82 + .../docker-compose-2orgs-4peers-solo.yaml | 73 + .../chaincode/go/cc02_mockTest/README.md | 23 + .../chaincode/go/cc02_mockTest/cc_test.go | 58 + .../go/cc02_mockTest/chaincode_example02.go | 200 + .../chaincode_example01.go | 104 + .../chaincode_example02.go | 193 + .../chaincode_example02_test.go | 112 + .../chaincode_example03.go | 100 + .../chaincode_example03_test.go | 72 + .../chaincode_example04.go | 174 + .../chaincode_example04_test.go | 119 + .../chaincode_example05.go | 215 + .../chaincode_example05_test.go | 128 + .../chaincode/go/enccc_example/README.md | 80 + .../go/enccc_example/enccc_example.go | 223 + .../chaincode/go/enccc_example/enccc_test.go | 234 + .../chaincode/go/enccc_example/utils.go | 147 + .../chaincode/go/eventsender/eventsender.go | 92 + .../invokereturnsvalue/invokereturnsvalue.go | 133 + .../invokereturnsvalue_test.go | 97 + .../v1.4.2/examples/chaincode/go/map/map.go | 200 + .../chaincode/go/map/map_experimental.go | 311 + .../go/marbles02/marbles_chaincode.go | 627 + .../marbles02_private/collections_config.json | 18 + .../collections_config_new.json | 16 + .../collectionMarbles/indexes/indexOwner.json | 1 + .../go/marbles_chaincode_private.go | 634 + .../chaincode/go/passthru/passthru.go | 72 + .../examples/chaincode/go/sleeper/sleeper.go | 124 + .../examples/chaincode/go/utxo/Dockerfile | 40 + .../examples/chaincode/go/utxo/README.md | 79 + .../examples/chaincode/go/utxo/chaincode.go | 104 + .../chaincode/go/utxo/consensus/consensus.go | 482 + .../go/utxo/consensus/consensus_wrap.cxx | 812 + .../examples/chaincode/go/utxo/store.go | 91 + ...ransactions_base64_encoded_on_testnet3.txt | 908 + ...for_first_500_transactions_on_testnet3.txt | 908 + .../examples/chaincode/go/utxo/util/dah.pb.go | 197 + .../examples/chaincode/go/utxo/util/dah.proto | 43 + .../examples/chaincode/go/utxo/util/store.go | 72 + .../examples/chaincode/go/utxo/util/util.go | 104 + .../examples/chaincode/go/utxo/util/utxo.go | 144 + .../chaincode/go/utxo/util/utxo_test.go | 206 + .../v1.4.2/explorer-artifacts/config.json | 57 + .../explorer-artifacts/fabricexplorer.sql | 115 + hyperledger_fabric/v1.4.2/kafka/README.md | 8 + .../kafka/channel-artifacts/Org1MSP.json | 164 + .../kafka/channel-artifacts/Org1MSPanchors.tx | Bin 0 -> 324 bytes .../kafka/channel-artifacts/Org2MSP.json | 164 + .../kafka/channel-artifacts/Org2MSPanchors.tx | Bin 0 -> 324 bytes .../kafka/channel-artifacts/Org3MSP.json | 194 + .../channel-artifacts/businesschannel.tx | Bin 0 -> 1383 bytes .../channel-artifacts/businesschannel.tx.json | 221 + .../channel-artifacts/businesschannel_0.block | Bin 0 -> 18159 bytes .../businesschannel_0.block.json | 1058 + .../channel-artifacts/businesschannel_1.block | Bin 0 -> 18110 bytes .../businesschannel_1.block.json | 986 + .../channel-artifacts/businesschannel_2.block | Bin 0 -> 18168 bytes .../businesschannel_2.block.json | 998 + .../channel-artifacts/businesschannel_3.block | Bin 0 -> 4707 bytes .../businesschannel_3.block.json | 131 + .../channel-artifacts/businesschannel_4.block | Bin 0 -> 4709 bytes .../businesschannel_4.block.json | 131 + .../channel-artifacts/businesschannel_5.block | Bin 0 -> 5711 bytes .../businesschannel_5.block.json | 170 + .../channel-artifacts/businesschannel_6.block | Bin 0 -> 4059 bytes .../businesschannel_6.block.json | 162 + .../channel-artifacts/businesschannel_7.block | Bin 0 -> 4049 bytes .../businesschannel_7.block.json | 173 + .../channel-artifacts/businesschannel_8.block | Bin 0 -> 4049 bytes .../businesschannel_8.block.json | 173 + .../channel-artifacts/businesschannel_9.block | Bin 0 -> 29428 bytes .../businesschannel_9.block.json | 1428 + .../businesschannel_config.block | Bin 0 -> 29428 bytes .../businesschannel_config.block.json | 998 + .../kafka/channel-artifacts/config_delta.json | 332 + .../kafka/channel-artifacts/config_delta.pb | Bin 0 -> 5012 bytes .../channel-artifacts/config_delta_env.json | 344 + .../channel-artifacts/config_delta_env.pb | Bin 0 -> 7850 bytes .../channel-artifacts/orderer.genesis.block | Bin 0 -> 13061 bytes .../orderer.genesis.block.json | 727 + .../orderer.genesis.updated.block | Bin 0 -> 13061 bytes .../orderer.genesis.updated.block.json | 727 + .../channel-artifacts/original_config.json | 799 + .../channel-artifacts/original_config.pb | Bin 0 -> 14033 bytes .../channel-artifacts/testchainid_0.block | Bin 0 -> 13061 bytes .../testchainid_0.block.json | 727 + .../channel-artifacts/testchainid_1.block | Bin 0 -> 20037 bytes .../testchainid_1.block.json | 1082 + .../testchainid_config.block | Bin 0 -> 13061 bytes .../testchainid_config.block.json | 727 + .../channel-artifacts/updated_config.json | 993 + .../kafka/channel-artifacts/updated_config.pb | Bin 0 -> 18695 bytes hyperledger_fabric/v1.4.2/kafka/configtx.yaml | 764 + .../v1.4.2/kafka/logs/dev_all.log | 2307 ++ .../v1.4.2/kafka/logs/dev_orderer.log | 229 + .../v1.4.2/kafka/logs/dev_peer0.log | 220 + hyperledger_fabric/v1.4.2/network_config.json | 65 + .../v1.4.2/network_generator/__init__.py | 0 .../network_generator/config_manager.py | 6 + .../v1.4.2/network_generator/network.py | 13 + .../network_generator/network_generator.py | 242 + .../v1.4.2/network_generator/node.py | 15 + .../v1.4.2/network_generator/orderer.py | 9 + .../v1.4.2/network_generator/requirements.txt | 6 + hyperledger_fabric/v1.4.2/orderer.yaml | 36 + hyperledger_fabric/v1.4.2/org3/configtx.yaml | 54 + .../v1.4.2/org3/crypto-config.yaml | 23 + ...581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk | 5 + .../ca/ca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../org3.example.com/msp/config.yaml | 8 + .../tlsca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer0.org3.example.com/msp/config.yaml | 8 + ...c84d36579715dde229e6fbf4ee0a6427001e943_sk | 5 + .../signcerts/peer0.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer0.org3.example.com/tls/ca.crt | 15 + .../peer0.org3.example.com/tls/server.crt | 15 + .../peer0.org3.example.com/tls/server.key | 5 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer1.org3.example.com/msp/config.yaml | 8 + ...beb1389d038299fd76b0535072e1f0dd3f6e57b_sk | 5 + .../signcerts/peer1.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer1.org3.example.com/tls/ca.crt | 15 + .../peer1.org3.example.com/tls/server.crt | 15 + .../peer1.org3.example.com/tls/server.key | 5 + ...fb41664788c56aea4bebdc22c6342db2e568446_sk | 5 + .../tlsca/tlsca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + ...9967d0470486868a975948c69e4ff987024d4b0_sk | 5 + .../signcerts/Admin@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/Admin@org3.example.com/tls/ca.crt | 15 + .../Admin@org3.example.com/tls/client.crt | 14 + .../Admin@org3.example.com/tls/client.key | 5 + .../User1@org3.example.com-cert.pem | 14 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + ...81da179e8344cdafe94221c11296084c477c24d_sk | 5 + .../signcerts/User1@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/User1@org3.example.com/tls/ca.crt | 15 + .../User1@org3.example.com/tls/client.crt | 14 + .../User1@org3.example.com/tls/client.key | 5 + hyperledger_fabric/v1.4.2/peer.yaml | 37 + hyperledger_fabric/v1.4.2/prometheus.yml | 45 + hyperledger_fabric/v1.4.2/raft/README.md | 8 + .../raft/channel-artifacts/Org1MSP.json | 164 + .../raft/channel-artifacts/Org1MSPanchors.tx | Bin 0 -> 324 bytes .../raft/channel-artifacts/Org2MSP.json | 164 + .../raft/channel-artifacts/Org2MSPanchors.tx | Bin 0 -> 324 bytes .../raft/channel-artifacts/Org3MSP.json | 164 + .../raft/channel-artifacts/businesschannel.tx | Bin 0 -> 1600 bytes .../channel-artifacts/businesschannel.tx.json | 230 + .../channel-artifacts/businesschannel_0.block | Bin 0 -> 23955 bytes .../businesschannel_0.block.json | 1093 + .../businesschannel_0.block.json-flat.json | 393 + .../channel-artifacts/businesschannel_1.block | Bin 0 -> 23706 bytes .../businesschannel_1.block.json | 1012 + .../businesschannel_1.block.json-flat.json | 373 + .../channel-artifacts/businesschannel_2.block | Bin 0 -> 23763 bytes .../businesschannel_2.block.json | 1024 + .../businesschannel_2.block.json-flat.json | 377 + .../channel-artifacts/businesschannel_3.block | Bin 0 -> 4542 bytes .../businesschannel_3.block.json | 157 + .../businesschannel_3.block.json-flat.json | 59 + .../channel-artifacts/businesschannel_4.block | Bin 0 -> 4007 bytes .../businesschannel_4.block.json | 167 + .../businesschannel_4.block.json-flat.json | 61 + .../channel-artifacts/businesschannel_5.block | Bin 0 -> 4004 bytes .../businesschannel_5.block.json | 167 + .../businesschannel_5.block.json-flat.json | 61 + .../channel-artifacts/businesschannel_6.block | Bin 0 -> 34896 bytes .../businesschannel_6.block.json | 1394 + .../businesschannel_6.block.json-flat.json | 503 + .../businesschannel_config.block | Bin 0 -> 34896 bytes .../businesschannel_config.block.json | 1024 + ...usinesschannel_config.block.json-flat.json | 377 + .../raft/channel-artifacts/config_delta.json | 302 + .../raft/channel-artifacts/config_delta.pb | Bin 0 -> 4951 bytes .../channel-artifacts/config_delta_env.json | 314 + .../channel-artifacts/config_delta_env.pb | Bin 0 -> 7789 bytes .../channel-artifacts/orderer0.genesis.block | Bin 0 -> 18426 bytes .../orderer0.genesis.block.json | 743 + .../orderer0.genesis.block.json-flat.json | 266 + .../orderer0.genesis.block_updated.block | Bin 0 -> 18425 bytes .../orderer0.genesis.block_updated.json | 743 + .../channel-artifacts/orderer1.genesis.block | Bin 0 -> 18426 bytes .../orderer1.genesis.block.json | 743 + .../orderer1.genesis.block.json-flat.json | 266 + .../channel-artifacts/orderer2.genesis.block | Bin 0 -> 18426 bytes .../orderer2.genesis.block.json | 743 + .../orderer2.genesis.block.json-flat.json | 266 + .../channel-artifacts/original_config.json | 824 + .../raft/channel-artifacts/original_config.pb | Bin 0 -> 19610 bytes .../channel-artifacts/testchainid_0.block | Bin 0 -> 18426 bytes .../testchainid_0.block.json | 743 + .../testchainid_0.block.json-flat.json | 266 + .../channel-artifacts/testchainid_1.block | Bin 0 -> 25848 bytes .../testchainid_1.block.json | 1117 + .../testchainid_1.block.json-flat.json | 405 + .../testchainid_config.block | Bin 0 -> 18426 bytes .../testchainid_config.block.json | 743 + .../testchainid_config.block.json-flat.json | 266 + .../channel-artifacts/updated_config.json | 988 + .../raft/channel-artifacts/updated_config.pb | Bin 0 -> 24210 bytes hyperledger_fabric/v1.4.2/raft/configtx.yaml | 833 + .../v1.4.2/raft/logs/dev_all.log | 34344 ++++++++++++++++ .../v1.4.2/raft/logs/dev_orderer.log | 9753 +++++ .../v1.4.2/raft/logs/dev_peer0.log | 23269 +++++++++++ .../v1.4.2/scripts/download_images.sh | 67 + .../v1.4.2/scripts/env_cleanup.sh | 17 + .../v1.4.2/scripts/env_setup.sh | 30 + hyperledger_fabric/v1.4.2/scripts/func.sh | 973 + .../v1.4.2/scripts/gen_channelArtifacts.sh | 81 + .../v1.4.2/scripts/gen_config_channel.sh | 44 + .../v1.4.2/scripts/gen_config_crypto.sh | 41 + .../v1.4.2/scripts/gen_cryptoArtifacts.sh | 37 + .../v1.4.2/scripts/init_chaincode_dev.sh | 67 + .../v1.4.2/scripts/initialize_peer0.sh | 40 + .../v1.4.2/scripts/json_flatter.py | 104 + .../v1.4.2/scripts/start_eventsclient.sh | 24 + .../v1.4.2/scripts/test_cc_approve.sh | 25 + .../v1.4.2/scripts/test_cc_commit.sh | 23 + .../v1.4.2/scripts/test_cc_install.sh | 28 + .../v1.4.2/scripts/test_cc_instantiate.sh | 23 + .../v1.4.2/scripts/test_cc_invoke_query.sh | 37 + .../v1.4.2/scripts/test_cc_list.sh | 16 + .../v1.4.2/scripts/test_cc_peer0.sh | 32 + .../v1.4.2/scripts/test_cc_queryapprove.sh | 25 + .../v1.4.2/scripts/test_cc_querycommit.sh | 25 + .../v1.4.2/scripts/test_cc_upgrade.sh | 32 + .../v1.4.2/scripts/test_channel_create.sh | 22 + .../v1.4.2/scripts/test_channel_getinfo.sh | 25 + .../v1.4.2/scripts/test_channel_join.sh | 23 + .../v1.4.2/scripts/test_channel_list.sh | 23 + .../v1.4.2/scripts/test_channel_update.sh | 43 + .../v1.4.2/scripts/test_config_update.sh | 85 + .../v1.4.2/scripts/test_configtxlator.sh | 64 + .../v1.4.2/scripts/test_cscc.sh | 30 + .../v1.4.2/scripts/test_fetch_blocks.sh | 23 + .../v1.4.2/scripts/test_lscc.sh | 67 + .../v1.4.2/scripts/test_qscc.sh | 35 + .../v1.4.2/scripts/test_sideDB.sh | 72 + .../v1.4.2/scripts/test_temp.sh | 23 + .../v1.4.2/scripts/test_update_anchors.sh | 19 + .../v1.4.2/scripts/variables.sh | 145 + hyperledger_fabric/v1.4.2/solo/README.md | 7 + .../solo/channel-artifacts/Org1MSP.json | 164 + .../solo/channel-artifacts/Org1MSPanchors.tx | Bin 0 -> 324 bytes .../solo/channel-artifacts/Org2MSP.json | 164 + .../solo/channel-artifacts/Org2MSPanchors.tx | Bin 0 -> 324 bytes .../solo/channel-artifacts/Org3MSP.json | 194 + .../solo/channel-artifacts/businesschannel.tx | Bin 0 -> 1598 bytes .../channel-artifacts/businesschannel.tx.json | 230 + .../channel-artifacts/businesschannel_0.block | Bin 0 -> 18510 bytes .../businesschannel_0.block.json | 1064 + .../channel-artifacts/businesschannel_1.block | Bin 0 -> 18236 bytes .../businesschannel_1.block.json | 983 + .../channel-artifacts/businesschannel_2.block | Bin 0 -> 18295 bytes .../businesschannel_2.block.json | 995 + .../channel-artifacts/businesschannel_3.block | Bin 0 -> 4699 bytes .../businesschannel_3.block.json | 131 + .../channel-artifacts/businesschannel_4.block | Bin 0 -> 4699 bytes .../businesschannel_4.block.json | 131 + .../channel-artifacts/businesschannel_5.block | Bin 0 -> 5700 bytes .../businesschannel_5.block.json | 170 + .../channel-artifacts/businesschannel_6.block | Bin 0 -> 4047 bytes .../businesschannel_6.block.json | 162 + .../channel-artifacts/businesschannel_7.block | Bin 0 -> 4040 bytes .../businesschannel_7.block.json | 173 + .../channel-artifacts/businesschannel_8.block | Bin 0 -> 4040 bytes .../businesschannel_8.block.json | 173 + .../channel-artifacts/businesschannel_9.block | Bin 0 -> 29553 bytes .../businesschannel_9.block.json | 1425 + .../businesschannel_config.block | Bin 0 -> 29553 bytes .../businesschannel_config.block.json | 995 + .../solo/channel-artifacts/config_delta.json | 332 + .../solo/channel-artifacts/config_delta.pb | Bin 0 -> 5012 bytes .../channel-artifacts/config_delta_env.json | 344 + .../channel-artifacts/config_delta_env.pb | Bin 0 -> 7849 bytes .../channel-artifacts/orderer.genesis.block | Bin 0 -> 12982 bytes .../orderer.genesis.block.json | 715 + .../orderer.genesis.updated.block | Bin 0 -> 12981 bytes .../orderer.genesis.updated.block.json | 715 + .../channel-artifacts/original_config.json | 796 + .../solo/channel-artifacts/original_config.pb | Bin 0 -> 14169 bytes .../channel-artifacts/testchainid_0.block | Bin 0 -> 12982 bytes .../testchainid_0.block.json | 715 + .../channel-artifacts/testchainid_1.block | Bin 0 -> 20379 bytes .../testchainid_1.block.json | 1088 + .../testchainid_config.block | Bin 0 -> 12982 bytes .../testchainid_config.block.json | 715 + .../channel-artifacts/updated_config.json | 990 + .../solo/channel-artifacts/updated_config.pb | Bin 0 -> 18831 bytes hyperledger_fabric/v1.4.2/solo/configtx.yaml | 775 + .../v1.4.2/solo/logs/dev_all.log | 882 + .../v1.4.2/solo/logs/dev_orderer.log | 197 + .../v1.4.2/solo/logs/dev_peer.log | 2305 ++ .../v1.4.2/solo/logs/dev_peer0.log | 227 + 648 files changed, 143928 insertions(+), 9 deletions(-) create mode 100644 hyperledger_fabric/v1.4.2/.env create mode 100644 hyperledger_fabric/v1.4.2/2orgs-4peers-solo.yaml create mode 100644 hyperledger_fabric/v1.4.2/Makefile create mode 100644 hyperledger_fabric/v1.4.2/base-dev.yaml create mode 100644 hyperledger_fabric/v1.4.2/base-event.yaml create mode 100644 hyperledger_fabric/v1.4.2/base-kafka.yaml create mode 100644 hyperledger_fabric/v1.4.2/base-raft.yaml create mode 100644 hyperledger_fabric/v1.4.2/base-solo.yaml create mode 100644 hyperledger_fabric/v1.4.2/base.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/ca.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/05f1c88abe3ae35edf814c2d68d4bf2e735befe20a1138c57cdd2b74c48da14d_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/b089a01c9180d928900a3d03fbbca7d9485e5f138aa75f4c82cd0f74c14b5e56_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/c5dbb6f8b9c60fd02eaa67d59253fa86a004a246b452decd4f6aae2f1013583f_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/keystore/838272d7e4bcce70c0f465ccc90da9b01265e5e06e555889ea72e8b1925271f6_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/keystore/9b123a706dc6ebe86e44dac468cc6f90f9aa11513ab46453f26b2751fca86458_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/keystore/7a4420664b066c549cf1a30b247c4bfba74bf006c94ec88d283e9d4850ba3c28_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/6fa68ee91c7b1584ed81827073e73807cda5f167f219b0c7687bb06baf3b5e60_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/keystore/063ffaae647ace1302ffa661a7c3bd09974abc6156c0968ec242e31c90a3b22a_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/keystore/99c61eb8924af634e48b559c346a489481db47142530f5acce617b92d911a9a8_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/290d8e2b87492d1502dc438a9e6b0fa8845ef93eb7f2e9b801e11f5b07852aeb_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk create mode 100644 hyperledger_fabric/v1.4.2/ca-test/docker-compose.yaml create mode 100644 hyperledger_fabric/v1.4.2/ca-test/run.sh create mode 100644 hyperledger_fabric/v1.4.2/ca-test/scripts/ca_server_start.sh create mode 100644 hyperledger_fabric/v1.4.2/ca-test/scripts/client-test.sh create mode 100644 hyperledger_fabric/v1.4.2/ca-test/scripts/env.sh create mode 100644 hyperledger_fabric/v1.4.2/crypto-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/c77add2f51bcdbb2d97bede84718a3cba45e3d94e16fb816b542242fdc82798e_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/bbed34c9f94bb882840eb1a07cb01fc8dc68717f2c3319d69ec66c52859edbb5_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/0cfb2889d2dbdb9d29f9ea536884c53154f25ea69660b7f6c4280d34841ce6bd_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/1e05ac513d93a02f6b298f96c02250777ab82ec0e1f18576fb7a127f370f2af9_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/ba6daad2e0f63b9a83f5dddd2e37a65bc0abd1b5cf4c9a8d9702239077a24d7a_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/6bbb4b3c3656b310abbcea1e9250b318f825fdaafb690e4dcb207fe5cb42f8d8_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/6ad7ebdffb1f1eec7cdad85ad997f6d495f50a64714906777507b8f1c3b777fa_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/b533d80a3bf9f462364ee7ed368d4edb0dd8ade024cf33e237b897ad623e4ce5_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/94c1904939ceabae0c1ce591683206c98da94b93e5daa1574904fafe1252ec54_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/admincerts/User1@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/86f9ae2cbc05f6668b9ddb42a88098b45651cbee04ee21f36897b461dfb58a89_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/7c19ca70568313f9db2ca1627657d880234c798c52cf81ff1f80d88a66aae1e0_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/25bfe9c4fcef7907a964694404e4e2b8cac073915e0731bafcce718f0ee1f5ab_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/387aba683c3d0050ea972152655889637b1b1d9fdfbfea0f7d7b101aab6b293e_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/9809d182aa6d68753acc08ca09dc24e50c437f2fd1455aea4e3b8da76a3b2e17_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/a3968871febc28055c344cc33d19960ff1a047418cd6b6b011fb0b61d04b6a75_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/admincerts/User1@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/f82d0717b173d1944032da5cb2788d5472f5ee5df75d3c6c2843d35603f76021_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-1orgs-1peers-dev.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-couchdb.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-event.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-kafka.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-raft.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo-be.yaml create mode 100644 hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo.yaml create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/README.md create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/cc_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/chaincode_example02.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example01/chaincode_example01.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/README.md create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_example.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/utils.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/eventsender/eventsender.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map_experimental.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02/marbles_chaincode.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config.json create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config_new.json create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/passthru/passthru.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/sleeper/sleeper.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/Dockerfile create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/README.md create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/chaincode.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/store.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.pb.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.proto create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/store.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/util.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo.go create mode 100644 hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo_test.go create mode 100644 hyperledger_fabric/v1.4.2/explorer-artifacts/config.json create mode 100644 hyperledger_fabric/v1.4.2/explorer-artifacts/fabricexplorer.sql create mode 100644 hyperledger_fabric/v1.4.2/kafka/README.md create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSP.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org2MSP.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org2MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org3MSP.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel.tx create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel.tx.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_0.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_1.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_2.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_2.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_6.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_6.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_7.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_7.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_8.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_8.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_9.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_9.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.pb create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta_env.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta_env.pb create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.pb create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.json create mode 100644 hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.pb create mode 100644 hyperledger_fabric/v1.4.2/kafka/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.2/kafka/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.2/kafka/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.2/kafka/logs/dev_peer0.log create mode 100644 hyperledger_fabric/v1.4.2/network_config.json create mode 100644 hyperledger_fabric/v1.4.2/network_generator/__init__.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/config_manager.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/network.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/network_generator.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/node.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/orderer.py create mode 100644 hyperledger_fabric/v1.4.2/network_generator/requirements.txt create mode 100644 hyperledger_fabric/v1.4.2/orderer.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.2/peer.yaml create mode 100644 hyperledger_fabric/v1.4.2/prometheus.yml create mode 100644 hyperledger_fabric/v1.4.2/raft/README.md create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSP.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org2MSP.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org2MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org3MSP.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel.tx create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel.tx.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_config.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta.pb create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer1.genesis.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer1.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer1.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer2.genesis.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer2.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer2.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/original_config.pb create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_0.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_0.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_config.block create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_config.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.json create mode 100644 hyperledger_fabric/v1.4.2/raft/channel-artifacts/updated_config.pb create mode 100644 hyperledger_fabric/v1.4.2/raft/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.2/raft/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log create mode 100644 hyperledger_fabric/v1.4.2/scripts/download_images.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/env_cleanup.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/env_setup.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/func.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/gen_channelArtifacts.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/gen_config_channel.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/gen_config_crypto.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/gen_cryptoArtifacts.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/init_chaincode_dev.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/initialize_peer0.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/json_flatter.py create mode 100644 hyperledger_fabric/v1.4.2/scripts/start_eventsclient.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_approve.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_commit.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_install.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_instantiate.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_invoke_query.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_list.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_peer0.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_queryapprove.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_querycommit.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cc_upgrade.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_channel_create.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_channel_getinfo.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_channel_join.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_channel_list.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_channel_update.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_config_update.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_configtxlator.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_cscc.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_fetch_blocks.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_lscc.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_qscc.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_sideDB.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_temp.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/test_update_anchors.sh create mode 100644 hyperledger_fabric/v1.4.2/scripts/variables.sh create mode 100644 hyperledger_fabric/v1.4.2/solo/README.md create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSP.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org2MSP.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org2MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org3MSP.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel.tx create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel.tx.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_6.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_6.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_7.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_7.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_9.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_9.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_config.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta.pb create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.pb create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.updated.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.updated.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.pb create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_0.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_0.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_1.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_1.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_config.block create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/testchainid_config.block.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/updated_config.json create mode 100644 hyperledger_fabric/v1.4.2/solo/channel-artifacts/updated_config.pb create mode 100644 hyperledger_fabric/v1.4.2/solo/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.2/solo/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.2/solo/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.2/solo/logs/dev_peer.log create mode 100644 hyperledger_fabric/v1.4.2/solo/logs/dev_peer0.log diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index 7f3f34c3..8ae7a831 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -14,7 +14,8 @@ If you're not familiar with Docker and Blockchain, can have a look at these book Fabric Release | Description --- | --- [Fabric Latest](latest/) | latest fabric code, unstable. -[Fabric v1.4.0](v1.3.0/) | stable fabric 1.4.0 release. +[Fabric v1.4.2](v1.4.2/) | stable fabric 1.4.2 release. +[Fabric v1.4.0](v1.4.0/) | stable fabric 1.4.0 release. [Fabric v1.3.0](v1.3.0/) | stable fabric 1.3.0 release. [Fabric v1.2.0](v1.2.0/) | stable fabric 1.2.0 release. [Fabric v1.1.0](v1.1.0/) | stable fabric 1.1.0 release. @@ -28,7 +29,7 @@ Fabric Release | Description ### TLDR ```bash -$ export RELEASE=v1.4.0 +$ export RELEASE=v1.4.2 ``` ```bash diff --git a/hyperledger_fabric/v1.4.0/scripts/func.sh b/hyperledger_fabric/v1.4.0/scripts/func.sh index 5d6399f2..d3302385 100644 --- a/hyperledger_fabric/v1.4.0/scripts/func.sh +++ b/hyperledger_fabric/v1.4.0/scripts/func.sh @@ -221,13 +221,13 @@ channelGetInfo () { local channel=$1 local org=$2 local peer=$3 - echo "=== Get channel info of ${channel} with id of org${org}/peer${peer} === " + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " setEnvs $org $peer peer channel getinfo -c ${channel} >&log.txt rc=$? - [ $rc -ne 0 ] && cat log.txt + cat log.txt if [ $rc -ne 0 ]; then echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " else @@ -266,6 +266,7 @@ channelFetchAll () { done } +# Fetch some block from a given channel # Fetch some block from a given channel: channel, peer, blockNum channelFetch () { local channel=$1 @@ -376,10 +377,11 @@ chaincodeInstall () { -v $version \ -p ${path} \ >&log.txt + rc=$? [ $rc -ne 0 ] && cat log.txt - verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" - echo "=== Chaincode is installed on remote peer$peer === " + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " } # Instantiate chaincode on specifized peer node @@ -520,9 +522,9 @@ chaincodeQuery () { # rc==0, or timeout if [ $rc -eq 0 ]; then - echo "=== Query on org $org/peer$peer in channel ${channel} is successful === " + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " else - echo_r "=== Query on org $org/peer$peer is INVALID, run `make stop clean` to clean ===" + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" exit 1 fi } @@ -573,7 +575,7 @@ chaincodeStartDev () { echo "=== Chaincode started in dev mode === " } -# chaincodeUpgrade channel peer name version args +# chaincodeUpgrade channel org peer orderer_url name version args chaincodeUpgrade () { if [ "$#" -gt 8 -a "$#" -lt 6 ]; then echo_r "Wrong param number for chaincode instantaite" diff --git a/hyperledger_fabric/v1.4.2/.env b/hyperledger_fabric/v1.4.2/.env new file mode 100644 index 00000000..39b97663 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.2 +EXT_IMG_TAG=0.4.15 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.2/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.2/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.2/Makefile b/hyperledger_fabric/v1.4.2/Makefile new file mode 100644 index 00000000..976a058d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/Makefile @@ -0,0 +1,300 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-solo.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_approve test_cc_queryapprove test_cc_commit test_cc_querycommit test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.2/base-dev.yaml b/hyperledger_fabric/v1.4.2/base-dev.yaml new file mode 100644 index 00000000..7a9b09e4 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base-dev.yaml @@ -0,0 +1,97 @@ +# This is the development compose file to config env and command +# Notice that chaincode is executed inside docker in default net mode +# https://github.com/yeasy/docker-compose-files + +# Depends on the yeasy/hyperledger-fabric image. + +version: '2' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: orderer.example.com + hostname: orderer.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # for solo case + #- ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + # for kafka case + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + #command: bash -c 'orderer start' + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # solo mode configuration + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + # kafka mode configuration + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: bash -c 'peer node start' + #command: bash -c 'peer node start --peer-chaincodedev=true' # DEV mode + + cli: + extends: + file: base.yaml + service: cli-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/opt/gopath/src/github.com/hyperledger/fabric + #- /tmp/:/tmp/ + - ./scripts:/tmp/scripts + # solo mode configuration + #- ./solo/channel-artifacts:/tmp/channel-artifacts + #- ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + #- ./solo/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + #- ./solo/crypto-config:/etc/hyperledger/fabric/crypto-config + #- ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples + # kafka mode configuration + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./kafka/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./kafka/crypto-config:/etc/hyperledger/fabric/crypto-config + - ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples diff --git a/hyperledger_fabric/v1.4.2/base-event.yaml b/hyperledger_fabric/v1.4.2/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.2/base-kafka.yaml b/hyperledger_fabric/v1.4.2/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.2/base-raft.yaml b/hyperledger_fabric/v1.4.2/base-raft.yaml new file mode 100644 index 00000000..005b6821 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base-raft.yaml @@ -0,0 +1,198 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples diff --git a/hyperledger_fabric/v1.4.2/base-solo.yaml b/hyperledger_fabric/v1.4.2/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.2/base.yaml b/hyperledger_fabric/v1.4.2/base.yaml new file mode 100644 index 00000000..97f5be98 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/base.yaml @@ -0,0 +1,163 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_LOGGING_LEVEL=DEBUG + - CORE_CHIANCODE_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..2efdf85e0eae9492ed0e972d824d2e74ba57bfd8 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zARVwUTrz%e*?k%KO#g5AZEsl$~wQk@Pnd;Ls45` z7?d!;N91pd7vJ+Go?GN+t`Z=u##5|zSh(f{w_)Q?^b@>YiZ$j~`oUZV(X^%zR@rJI zL<%6IOR+^py6y;}2%s%Rprm~v$SHaw$EpD^D!X)>GAVWvATO!054lX{T7?_Jxyh<*2BeDb)h7+n$9^^NtQ zN)jM=?el)FW3xki+^8>-w>o}^e)*w-@WH5n{qp2P4Mh?nL<%6xtpmIQVl2D}v!1m+ zDky-NL2&YNa!w{QAkqwRN#_U>AoScsv!bXTStamlD>cn@fLRt~wp)WTcBiWf(6h$H z%_@ii3LrN&0@~C9eq?-~Q__+zy-cx)j%~J|igaT!d@Nlags>7I>DL~8X%kW5hcBB-9YLwfkgp9ASGS5&Tp0 zKU^Xp+G4PvQ^)u(xDyqef2$SVXG-8JCxFWNr=@Q|8Ul9jGDHd>ywXBI^g+)~dsB$~ z_AI%2{p;)cD3co!v7km3Xm7Bb5+FD`$;F@KTR$ z`_4K<3Lq!C+_dsB7Y}U9KtQId^H!1_o6#h+Qk#NA&CHw*RW%YIpD~jn>7I5ndCrbk zik`Xd{HGWSfk$3@iJ;oS$adUGLLf|&{6y6_oh->J#HJEyc1;ld6z_@j_T=9uz&l-a zq:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..64c75634968bf1e5295bcfe84a70eb3dc8b9b44b GIT binary patch literal 61440 zcmeI)&u`mQ00(fp&d;{#>!wv%Z?EYpHIQ~owr-3|$+pmib={V>h=Ra+NnTnr$Icw5 zw3;}il-sy+VdBgMG;!hp9FX`2CLtljjSCV8iOb-E;MqwRJ8ili)=4YhtWNFc_nzPT zyys`fFYDs1dClguVp>&Z)3egBB+Jq(luD8`Di$J^kXZV}GAx#WSax3W&dNT&N2RHM zYO%Hi}7XMZy~8~vJ`i-d>1jH!`toPYb|fn5-Q00bcLzZKYeClHQL zP08D)&5AlNam&^!T8Y`bu9|wedpmf!kjpOR=u-C5e2yl%cPHqiR;I6K3zx5E3zM0d znPiIAxur2(H5%0-w`fr}i*(_}5?xrHpHETNu-8mWvp3b-d{foR+;9%RJ6?&YIxBMB zO)v7ancb*&XJ&C$Hw~&8c8cH@P$MbkBA zYo<~6uJ`$1y?f}S!K(Z*YWhs(T=KCXU0%rFTF#|t&Ei7PA1g(BR3#aCB#k+(-V`>X z)xC#vTAfuc91F#-O~{gFl=(*ejxO$GRMA$ZyRG_~J?-5J3_g_d&dD?z48<3x4wQj7 zpz6!SDMIM(KsY`&CO5Ng32T;FbGjz4ch&}dWSww2*6gBvUt*$Yntn*Hw&gyn6Ow|mvW}1)B$DV!K58xgoncO-N z3dhIC zQT&bTxx78i!gw!fht}GMeyO@Z_8atl7m2iY%lRnV8uXR@27PZ5XNXsQnK&VVWdrIIRc*OlVW^BGD?_P`P25x?UAGDRs|SwfF5pGA2}lT)QPWH9q zWIU;zIGKptj+1dd|GP8$&$M1R7z7{y0SG_<0uX=z1Rwwb2tWV=&r+b@Ihga!eo0c? zcf3IW0uX=z1Rwwb2tWV=5P$##AaLXaF#mt#niLg+00bZa0SG_<0uX=z1Rwwb2=o$g z{+3^`*G_~(00Izz00bZa0SG_<0uX=z1R(Hy3t;~L`EEay9s&@600bZa0SG_<0uX=z z1R!t_0nh*cKS*@MfdB*`009U<00Izz00bZa0SG|gITUc_|7G%*B!2LM00bZa0SG_< z0uX=z1Rwwb2teRy354aK6zz*DzvBDP~1Rwwb2tWV= z5P$##AOHafK;Y>MkdQJ?4AUs_X`QcgJv|&$CWuwijEdO~IT28%NXg=5ZrB>r+o2nJfZz#bO74CJ5ExNT z%ex){C{F0ECjfoNlw{QZ0KonGe?!}n_`wST5P$##AOHafKmY;|fB*y_aHs-XoASU| zGcX$4z7dh5MbosWSh=bhr!wqR`pl^}*`4Le>BSB6Vy^UBy?X7nOY_#%8!P$3!gOYF z^&+1sr5h~&-uc2De|Oo+zjSV8Zk?BOP0WB;Hz5QwwN_tFm+z{#C)M=%qv{yt6~QJ$tl*&+kC&H=M9@%RbCcT_xy6! zbMWqB&T->%VSb+ooqA+#+tP{+ySp-P|Le^E2gw78{6xMd56Iu-mqTr8WDWrcKmY;| zfB*y_009U<00IzzzySoDuK<|VYI?fNYs|8%;vq-I{a!#V>wVQyq>WfDXR zAXHZ(=KpR!cf-1dhai9oP;dyiz%>nJoB`A-8N?eC?-C$e)DjG&p}WQSD2kyFYogHF zjQjTTL)ZK!<5Yx#`cRr0L<%4gZc0La4u>i~Gj$B2^^>u;B#u`HIH<*P>a!wDg04dn zAUN#T+=EgEi~v~5)QAbg9>C>a)x1dT67dr}`=zvGIwC|0Alf?LKR0EXB+n|(oJEz< zt*fb9u*^JMoxXL~>A1r3;1VDQH%TNKR1g!669(|83Nh^iqriK?bBJ{>tO=8#i2$M^ zL<%4$>R^>mCZV~F6t0{c__Qa-?slB92Jw0%0Ah@kY-jHhAZ;tK7X?w$k$(-tsv$6j zFzfR{=r}$Pq1_)~c9E?FE+Rwsznha zED|8|)I8yjZZRd@3OVix^U;DA(Xt@!!kQ2LEkyRa;l)@YL<%6v0%7AdiS8?`QqLQs zK4K9j$fjBO-AW1C+2VHJUqKuaAUklelETfc(BacpfSw%HW>qW5^V$KSsQ5CCd^Z4B7haWL%;Xy8Z|3 z91RpYyXfdWt!CH~MmxaQ9C80_8X#Xwf^;O6eB6Vqsl6h&TAdn9C;}n|`o_kxKqSA!pVrqu% z?*T-N;*yJ4sJ;au-$k^(Hd;&{5+Ehx*(Y$t8beu9C0J-k$?OW2y1SYERFCMp1;I5m zPsTb#3Ltco3fCwTLtkCmMuL@RfB9pod_3(P{mi6DkfSmpCMgmixz1`xLp|9FwYhi? zz5ehX%zlb!ZV1pa?8{*olC!C|LLmKwDJb~hmh)lyTk$BAj61pKj{?_%soIa`(Nk=x zY3E8HTwS6r!x-3zq;VQ=5?~;iJ(Os5ztr(Gt$x)~((+-RQXsq=Mr:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..cb70bf703c5d2da7c1f86ae1e98bc71fee345b87 GIT binary patch literal 61440 zcmeI)O>Em#00(fp&S%&3bx7T)+YDl{}UAMudgf5h5rQ5Q0VnSd!$xCYH*qP&0 z4HJiyavN7JOq{uZ5GM}6VG>skNJt#GaX|thaT#0?JUi)Pr%l(xI<)fl>ePPk`T4!y zdwzCouQ#r*=nkW0%dTn;ofk#~Q50UHR1kzQJ`+Ai_&mVp5k80bygP}z3kUoj6K4Ld zC1Ur5p;%Nnu`~41;Aina23zsP_*dk7EIRx}LXCax{yQKKL_q)o5P-n{R$%+BP&7F+ zBkov^RxntR*^XY;i<-mgs%4aV*TYNsY-TM>*D^1!Wa&h2^aP#OOY~+Yzw~M*Kb>A! zkW;kIY+W-{vr#QDn-&bKKv%D>(be^pl@!$)&W2^{PE)57_aXa#0? z+w(jf&1uwoGqagiw@j*=PKvUvnr=6#qgNSET&<<3%{Hyutfcaju`jg7s=e75Y?JRO zx4M>H&gSXm>?@h|l{Gq-qSx}d*E0EA^h);Dbf8xK>mkdnQ^V2Z)Rfq&c)(h@tQ)%K z=$2XcFAoG@{V{af)T-#Moz>)8~o*^CPYQ>AF1s>rd2!noV&EpEeG z-M>4x)wS})lab_=DN)eP65FcZG5D2?%G=8F*403>EB>|6(Dy>lJ(w25k>rh;LuJ5s zs0K1|ix9bcBAOf@7h4&xgf-i$xm}ahyGug>vTit??ksmX+C6boGa6mU^uh(+JN<3C zyO}J{4@Hv8sL8e*bwe{t2I~eITHR@fsk*7wEbGzn*tbsy0lb~a^7iRS zG&wmbzSkMuZ03zHno%!y7o&la`y%!k%zX9gl(}a>b2slDP>yWyI#gfSQ)F3Qh(?mR z$$mYSGEc z1sm6QdV7+E@t@L;thJB)RCSRYH0TFT5{iG#{VLlY^reFaeg7uz5U&O@aYI6_Tq2rG zCdKVLUJq;V-ck2Hh6By$1?|&*4nM)0w9s^zmZDCx);rkyN)Q})`3c-{Y`xInmpybX z`}$h@62mtl(Wb|jR|H}nA!BxWKV}U#*KamIIOTLH+0uX=z1Rwwb z2tWV=5P$##AOL}Bq$J`k6F!TbNmt6@jMt z6@)yEA2vl+*+^+Lm8bzk!5dXi_l57=L;*uI4Q^UYhvfmwD-aG4pb!k_3r zev3`(HalqVIn!Zwm6iCb0Bk7}Easd4xX=H?- literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk new file mode 100644 index 00000000..2681bf59 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly +UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx +QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey new file mode 100644 index 00000000..1070b843 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey @@ -0,0 +1,6 @@ +-----BEGIN PRIVATE KEY----- +MIGkAgEBBDALaw+r+kOT0kY5O9E91HUwvqE7p4cTqrAJQ/ZFcgtUz9b8wPL23DOi +XM8Bf77RMaCgBwYFK4EEACKhZANiAATosxBnHncqCn6C6d8Io16Gu5nLUBhDvYNx +/ORur0SLexInMKUrRyc2mFp7zT6XrUCTmKarZJC+7iWGrKyyngkwTxvxa8VVaGY5 +1C/5dObVsA83xko7GOoMHYVtvxFCYJk= +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey new file mode 100644 index 0000000000000000000000000000000000000000..d692157b964d70cbbf1254922bcb56d1c49eb5b7 GIT binary patch literal 32 ocmY$}e>x&D)=^fc(!oyn*GX-L6^T!d1SWd$sC*GgUU(%D0My_OWdHyG literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..197d49ca --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIUf6wM/e5Yoqad5ykzdyNMmFEkQpwwCgYIKoZIzj0EAwIw +aDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQK +EwtleGFtcGxlLmNvbTEOMAwGA1UECxMFdGxzY2ExGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMCAXDTE4MTAxMjA4NTYwMFoYDzIxNjgwOTA1MDg1NjAwWjBoMQsw +CQYDVQQGEwJVUzEXMBUGA1UECBMOTm9ydGggQ2Fyb2xpbmExFDASBgNVBAoTC2V4 +YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEaMBgGA1UEAxMRdGxzY2EuZXhhbXBs +ZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATgOHkZzn6C6MieVWOZjGve +0h/taMdxQKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAdBgNVHQ4E +FgQUnOwD/If5n4yCIxCc2kik9+mRsxYwCgYIKoZIzj0EAwIDSAAwRQIhAPNMC62d +5EsJjkqZLSuq9GyZDk+4fsHzNS6lgrlzZfuxAiBygZt2ee8Z8zwoZjTRXvcCj4Df +5+YwFqOjgPXdXg+nTA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk new file mode 100644 index 00000000..2681bf59 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly +UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx +QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..6b7395af --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk new file mode 100644 index 00000000..0e34740e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg8vMuirOjKSGHUNNF +qYlMP7ZlaOE8xD4BIV9UjYApuQyhRANCAATVFCmMnRB4YjYASeToLpW905Sr11d7 +eJuWWVEXxRXweujA+2XIvJnu9oJzfctuEgAixaNfNLWaHo7AAdK1WOLw +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..ef6b4f00 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk new file mode 100644 index 00000000..b2ffa67d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgfRcMLZfkPxSPSjxY +LOcLxIeUCd7C71EfZH9Jyj8cstqhRANCAASpl1xmXmNMex/YmPK9ew9sI4JW7w5B +e4whAaHEMEr4K9QWbmGUtZPtr3EKEHYbhA8BM2RdFkl+09fvew76T9tQ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..71cde348 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArOgAwIBAgIUJbPbRHo+tTwYRVq0zJ2p3bzYtdMwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEdXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABKmXXGZeY0x7H9iY8r17D2wjglbvDkF7jCEB +ocQwSvgr1BZuYZS1k+2vcQoQdhuEDwEzZF0WSX7T1+97DvpP21CjggERMIIBDTAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUPgf/xHQ/Nru2 ++JEBpLOA2OClo6AwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFm +ZmlsaWF0aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMS5leGFt +cGxlLmNvbSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQCl +X+M3Rp7MEAVT6N8D7TgqOh9Rmtrv4By1WVmeNf/ZAAIgb6Cb7Thh7y60I6OlxdOw +A3bsWxA4xq8q3gCL+/I2kDE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..cec4dbdc --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk new file mode 100644 index 00000000..5ac8d89a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWUNovBTSm43w0Gne +wH+gjOv4wnAUOes4Rl5xRfJNkFChRANCAAQYGe+D/gw4IbjDBD5XQutFqjELjXz+ +WayBTKOK/gZP4lqwqp9NqWNWI8uiVilHKrKD24GqsM3+h5d5q2UJG5Hf +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..47b9ce88 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk new file mode 100644 index 00000000..807469b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2PYDX6UQs548jvq0 +eP2rClDYv8JoiZeK6qJcXHzvQUqhRANCAAT6w4XqgWi8OOT6uYXZRaGkquFsFtsh +rfS8J4KB2c6WUDkUIHXOio6hLP2mNFTVNMGnRxF1LSpMPEFxie5jaN/W +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..7798a595 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArSgAwIBAgIUH4qT7e5nHhIYhhXrdGPnEzHWMhswCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEdXNlcjEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABPrDheqBaLw45Pq5hdlFoaSq4WwW2yGt9Lwn +goHZzpZQORQgdc6KjqEs/aY0VNU0wadHEXUtKkw8QXGJ7mNo39ajggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU/fDcOzrRHtLF +QnXNHSVg2ln0UmgwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6IlVzZXIxQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoidXNlciJ9fTAKBggqhkjOPQQDAgNHADBEAiBK +C0p26m2dx0Y9IEJ93KWHgr+kCXtJHs+mLh56CbjkNwIgOyqY7vOQ6plgUpTT42b8 +Xp2CkVyqaw+hsUg+F2lxGsA= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3ec323c5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk new file mode 100644 index 00000000..e4097d65 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGnD2h1/mDGeNIadf +fP/pROrbeZRifCe8Z9VIGAQ3GoShRANCAAR2wsRMRc5/mBRrTbjfZ/4FD6rb9fPz +y36ATZQx+o7Zj22paPHhXKHOOZliP/n0Ax5EPeY8DejzDY0mo3CV3voZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..e2606736 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk new file mode 100644 index 00000000..58eb32bd --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWPQgr/DLwEczolSb +mEznYJZXe4gNhPPAcnMmQrLgolehRANCAARyGsnOftmnTa+flGDLKdPJbj+C0Cla +aaY5zkuAUT1ojNk/ASQv22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92J +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..42bd0c82 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICczCCAhqgAwIBAgIUc5cHVaZnLnq0g7UZ8bveQ2VJADEwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMHsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ8wDQYD +VQQLEwZjbGllbnQxEzARBgNVBAMTCmJvb3QtYWRtaW4wWTATBgcqhkjOPQIBBggq +hkjOPQMBBwNCAARyGsnOftmnTa+flGDLKdPJbj+C0ClaaaY5zkuAUT1ojNk/ASQv +22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92Jo4GEMIGBMA4GA1UdDwEB/wQEAwIB +hjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQhJFtMm0+ApEOidrRbUd466PCe4jAf +BgNVHSMEGDAWgBRYLwES7lJq4i67F2AeLU35NxkbUzAhBgNVHREEGjAYgRZBZG1p +bkBvcmcxLmV4YW1wbGUuY29tMAoGCCqGSM49BAMCA0cAMEQCICaXvUWDxu62xHmK +TXMvTTVgSYZE+Q8hCOfnlz9OQJyaAiAtKzb22ZNDjW/ZSjsKXJhsK1+CJC52CabN +ANE96bx2Xg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..5c30e6a6fcb95c1b5ac8706e24c9eed66a377164 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAUqMHeJn*kG`a+IC*R2-bLrUi(~IUA4F!!?9h0=<5fUJrB98cOi5Xl^X4@U_!P!Id@OBsLdC5^5(oQm!-26Eb zAOn2nB!+0E`o|PYCt-s-Dmc;YF%mV4jDr!6xV~U@-XcT_AY&WxQD6e0lwr%@g#=!3 zVm4qAFSLkm(G3;<|FL+H4iX^yiJ*}Iet4`9P#)wKg*4WTxc|RX;hH2khrBg@eAERZ zL<%6H#JDiM72}<{kjNClm{XSjKdb=eb3 z8kyUh(;&Nhbg(!n>Y-L6zz!M`Aoo(8<`n~ROP}XTXxxwuAD{A@o}z+oTD<1k%Hdvw zkt&D*3Lx;En~TGFC6t#83Fa+vI&m&XAg`>sx(TZ?uBvwU4mJ`XEWQnRF^(fP*xL^u z_KBynIVTd-)*tl@e*C<#rLEDJ8XzqClmJvJ2+1p{zedJ`Aw77^VKHj;9n_`W%KO&g z9v~thvrwA(W?u|nIn@<~ji|f7V^;-Q&i<`pqOLp~0q=COGDHd>j9fnj3I{;;guMM= zjr`IwXsiOg={Bx(S-*O+s-pIl5+E`Vs_?cdtgs&rX>mz8?kpX->PjbpBMYt8**4Z= zG!Z&P3Ls6}=|pg0Kgi_u*vd#QfFS4_pSrlYpAe<@5WN6kG|v(sThhjwp>G)Z~56C^+t04A{ke{&{8Sl VTY#2P&`z#G_z9V8@4Q`LqN^o*gE{~J literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey new file mode 100644 index 00000000..9091d59f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEVHAMGD123d5QVhI6LAq7sEU8frN4bN9p +gPiKwWBLljpCGQH8kBbQoyEyFFBGndyWgalkLrEXJNv/VGAWyDEeg6c8/fycfJW4 +iq8Mk1AvRAVMJIF9VwjHdwQ3rMmzC15n +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..6008c92c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICIDCCAcegAwIBAgIUDEK12gHn0vyqLETS3DWGJrqUksMwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +MS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN1A0nR0Orkp +ppOOnvCoIiIFfzpBdwWQCJ7FEx/iF2H/2PkOws6qEN2sBh2WqByWR2c7EIdmgvUu +ZxSIEXU2TO2jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBSpWdz/SpIKYXgSaEYa0XBEvF8TGzAKBggqhkjOPQQDAgNHADBE +AiAPu4EVW8V7ocl2hRGI+jAz4aBfCiiW5MX3+vYbDCtyxgIgJoeEFVulOhxdEBBe +YKUNAAVA2pkMYUzgEWT743z0jhY= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk new file mode 100644 index 00000000..f9b6b7a7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvjKIcywt9dWmrXyU +EP5BS3QS2820krnIkXpMxcUfL5qhRANCAATdQNJ0dDq5KaaTjp7wqCIiBX86QXcF +kAiexRMf4hdh/9j5DsLOqhDdrAYdlqgclkdnOxCHZoL1LmcUiBF1Nkzt +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..907fdf93 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: ca.org1.example.com + keyfile: ca.org1.example.com_sk + certfile: ca.org1.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.org1.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org1.example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..602a4e572fb291bdd121f02dc9f8e6ab7ae96b0c GIT binary patch literal 61440 zcmeI)&u`mQ00(fp&d>gO-Lxv}?X_K{29j<`*Hz)cw zdC$*|U)Ed83p!`CY}pl!(`ji)l4a?2N+n4e5epGZNGv^K84^oCEPF3`Z{?8RBU198 z>Okb7)E@~;eLMZ1^nMZjv$q+Yi+)WmM#6(%4yciDoPUSpfn5-Q00bcLzZKYiHxP~` zlk$$mwSvKl%;tJoFKV3CRLdxJZU^V{+006ou4LX=$kMUS-D7l8FVWkX{QR4l{A7A& zCZ3=*X6u@vn)OP7*|cC-1-f{1g)XixEF`E_=j)cO^M<;?8meAmrgQlH@rs&iXa#1t z=|!GgUM*2y~0G~N;N@kwrOp!k}597p3o|*bY^3)O>v;y z;!5^fHczi)uVz*kR_KKUUCQTfWb$|E_3YhAU#+^=BOY&_9t_7OCgkRt3#^sPx}j@a zx6GP%y~hXZ-9sl$t-_w7rY@u}#-9q()y3TMYBoWuHWPyWSP9ytD)Gn@Y1C=;rmzvM z?me8->RNgBR48_RLY8#1#I|bp3~?u;ing-cZPnN8DeqRG|FM*FPNunFD0VA(qzuFX zRbM7f5kmL-!m-g&xtVcGShcOH(=}PGz1Hs|YlqXx)_R*`wk(Qc)0A4*NN*9V#d(Qs^JL~hpIBAb?3WVPM*USCmn!|0?akH5k8H|zdx z+@(qVH4!<-Gz+adllYO9pEP8d{C-hN-%#RxRu4`Pj8j`vKg8#N*p% zLgCo>xcotDbhDW|!e~aV*j^3$O77Wlz+mR7SF6k&1Dcb(b3i$^!RttUVPBEs@tJTa zmK*QZGdu#~ylgu~27i-2a)z>8`e~s|&IRMl*j&{PeyWak*!}ijUJFY&X zFp9r%J(suVSs3pn?burT*e_MHlh zC3|OO_ZGu5BGHPrr83jD45K1$Qfi*D>fqaj_<&Fel20Y_g#1h%ldr@oUJ!r)1Rwwb z2tWV=5P$##AOHafyikF&!9a32YT0Y4sS>MdHg`VNr=9JyfdlrWoIMdGFg)OpT zcxN%MF>^k@a7cu9Ju;lzdZErcEA!63&isFnJd(&y, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk new file mode 100644 index 00000000..a3869e94 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGbiPTe+OO8PG2TQu +00tnxr7sU1D/DrPshhXHyyND/7uhRANCAAT0Du/ENv0FsDjpCcRxrlW8zJqU3mYB +YengujzLKbirqcKlmmon2uWm4vZDiLS60b6Aa/5nfLSNatAfhyenKtez +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..2e43e9f1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk new file mode 100644 index 00000000..c1f9eb1f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt8+ZSv6BYejhJK/E +peNwqBja0KCe2vKwffqny1Frd2mhRANCAAQKmzIKjGZnFmh/yK0FRRiY+dnfPubf +RsFhSlE0li5JXcBhyBpgi9+7R3280q/SW9+xuEMQK0nSqoXLPeC+UrZU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..7e06b913 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArSgAwIBAgIUB9LSFJbuP69HlDI8K2SpPTBn2nUwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABAqbMgqMZmcWaH/IrQVFGJj52d8+5t9GwWFK +UTSWLkldwGHIGmCL37tHfbzSr9Jb37G4QxArSdKqhcs94L5StlSjggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU+wgV82ZCI689 +LNyFs4c7B56yCRwwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIwQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNHADBEAiAe +MRREuRJHh2iXJ2WPf7R1KvxecnPMloR3yDG50jOYNwIgKBoK5xErYt1DWgnVkEZS +1ZEVaQDJlz/x6sEqnJmkmPg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..a6cb0e25 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk new file mode 100644 index 00000000..931f8076 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghB1MF5YZXvp0exC/ +ilHXOoMC65o9zOVFC2oc7DPGqO+hRANCAAQcmOyY+LZZTLSHLmuAUniwy5Q3mE3f +x+GHmBHaCNrIJzZUITw0XKQRS2FCT5UC89OY1SSc9WrhR+MXgJVQkvtF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..274bd58c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk new file mode 100644 index 00000000..29ad249b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsxgf5OvUl/sjxL9e +iu74qhsKNsyAY6u99fumKce+ooOhRANCAASx6/D/olnbL9yJRaLqZ5s78OByGvb1 +/yeEs+YxR9eyKNnZ4O6IKqf2IF3hxNP5rY+mcey3Khxi41aoDv++BOFV +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..f3f29b9d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDjCCArSgAwIBAgIUDpmSDWSCx8uN1ybq8hBHpqHk4+IwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABLHr8P+iWdsv3IlFoupnmzvw4HIa9vX/J4Sz +5jFH17Io2dng7ogqp/YgXeHE0/mtj6Zx7LcqHGLjVqgO/74E4VWjggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUUmH/JVFmmsgN +1VsrQfNCA63B0u4wHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIxQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEA +s0HoNc7f21bNcod5zq4wjE5aKWNP4qLfePX04KGlQA0CIDZw8DUTR4AOuPoM37Dm +MKEFHoiOD9QajnX09mkaCbOf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..a5a867f8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: tlsca.org1.example.com + keyfile: tlsca.org1.example.com_sk + certfile: tlsca.org1.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.org1.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org1.example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..2bec9c10819f8a35260b8ffc67c5ba74db37845d GIT binary patch literal 61440 zcmeI5ON`q{ddFMtms@^lW-><4++@!V)}3~DlN2S211!8GMNyPQsVPy^l_!vaBW0TLiU4!PwLAi)B;>;?#eNm1Q)OX|mZ z#`f&QTXeTX7K_EIUw!=7M}91KS*OL`XSM`BswoFy_^x=tXX{+0tOo^o= zHY!nco{c_O-Tff?(A1(;s>Ecd(nBmB-+L4t>H|}@PMndg=!2+Yxk|K9l%j=7KL02x zkG!@!FumzXSD&7kn(hRrznD*zPb^u{t@-hwOi%Vk!_~qDx;%89sOfl*qWYv~4yIAh zv~`f#?mdbQ^s(F3wG%KHFQoQ#d$kx#AA=L|1&QU@QZ&V;sY+goB9EfSC0?LPjcAT- zJX~tk)$Q2Zd-}oM?cGm54LvpHfaO-pv`pDEU1zwseq#yj;-2V3N4E8sP*DWK_g)f= zRtmgWVIM_%104`t&h;pIMN{@}{%q}j(CbeD8_?^Erwe*rZV~Tq?dCoWt(lIdPlkO9 zcrquTuiW|e$x^qYi(4DF|7nd6uBXSFTf60hS1JIU@MNiwpbA?*xV61||9ly=cZ)bm?+SK*@W1`{AwK z#~)wSh|@}(pr_xro|bQJ?>>GUdKRBoKDbzb2mmV$y8Y}DH67s0UbSOqsfkx+i$2tQ zuG)Tac|D3c`oueF%Z_I0=ZTg)^iI=GOy{KMx-YNCD{Xoi!2Be8d(S@H+TQ)-lhALS zsoOxGD~xOn)$`TurJ677xJ1kr+I3dv6+sIQUlo+MCSI>(3m2-qw-?{u+T}mF$}$!R zfa~&{)6Kj8vG#j`ls#AHHnMo#FRm|-5sP~+0lK84tKiN}@8an2?D)O8uKt3`tS@)& z!tnMcE3-JHy|vzc>q8Y0xlZ(#1_^X=E4YlqglK%6+0PjSVsi(`2qTaN(D)tLCSQcI|fP3D+R7Swh^yLvR(zPYh+@6LSBN9$*K z(1ko0$b)`#2^YP<9 z$n8|XgDCX-LH{1=6A(?Z^h4FP(NW8jgpo*+;i#n5CjfyQ-(z!Nc@Kw~jfOT;i# zi6^lZf})tN$FYR0W0uMN+B@a;K03o9Y`5A(Jh9LV0 z0zScl9?XBD^X->A4uXYdIld5O*pkGjc?Lx2=BZ(U=Tj+(VW>gbpnRUD48D@V`x2qY zolKi=wA=N8#vMECEK?KOL!U7ke9mq1vkt<7{C-&Nuz7*%auix&>9)XBtHLBbqpGw~ zsDjd@R5w0Wos!G5g|=#wL%9}j3#G1~_8Y0HDCWZKgdVH5I?3Bryir4ag{zDj80iTj z?x(1ErabFc5hYXTG$ghq(8&B`)I_Lh++-GRVC+bVWgVd$w{$M;soccM+l8?rQF_`( zCdCx%3li@aQ;P;UH1qxwIgH_KEW|a;%@NR%Wau0B%9k7+T1Q zSQ=En32Gbfftu6=TAc3-(-Wak!O|n1ZB84tct@@mI?9Y~3bcB9a9a>BuOV9ys38}g zpJ5`fTD@QapyzG${aSUNmZmN*fCeWKxG+8Kb7cW1DTC!0=4{<(GZey8^zk6o*88-a z_wo2~Ki<}?v@4hUc+Ib2Q_dsvz7sawOmo(2ip7#>Xlf$Y>9fNlxq(y*6~vdd3|p^w zxvrlS>s*$w3vP^*JBGoQf&I{_4pj^X{hbk$G}TJ7G$k-pqjB1OB}Agc%n?oTK9!=h z(|kCaHpI$NE2S1^gHp!Jr^BLCFJ#J91G5~YVjF%YFpv_`p=rZUyHusdBx!aOFUuo- zG@58e#zYJIlG@}@!RJA*g+b;LO}jqFv%dfuLz{sa8v;v=*M}h4t9BL^}DO+N|KC3!w*7=FZk<;dk9X0Fic37#?!)7_&Q8461 zsTI9WTk{$Oc3@`7mPF-f!|1oWo#L@5rYNJ3p;9zUnRG79AU!N$W7-61kUX0uW4T(! z80>eMx|hui_w9T;o?w(tx8UDa`K}mNHIt(?o}1>9DJcetB#RP`Wv4G|Omr9~-NpD{Ac#oATLN zGmX^BbwWb-Ng_4w9b+gHC}C-?gwoek!egU#G|7lZg~135?`K)MmoHLSk+Iwa^?FKp zJv5+%;))X1zlIW?t79N`X&We^1%}ErBG<^dRPv^8%3Nbqs>P=YHW@0l>PTZPHW0SU zY8ZYwh|e__lxmgYDpxU!W)@Yk>Xdg-QlQ+IgWY_{K@3V@D-16(R=B<|#7aFvV5zE< zC?r#aWb}(|vSfRMF-}j>TGiGIt)nJI@rD94k&xPLVwynsMA4dPML$f%lwoZ`;gf!{ zA2XQz{t=ILQ|xt0_`8onx9^|%guj2VqqwejAO~_t#7F`mfZ!z(1f~-}_mVLsj*=}@ zQ8XQoCE_@VATjips(y?*1Abt;|5E+bxSFZTO(*a45re2Slgd~Zv1*nA4%IvB2WEy7 zW=3UC-PeXhSyf3W2|j!37xJv%OEqefUehM0z&8M{Y{O5Vda0Q(>!VVmh8ra(+g9vC zPsIx3MPK)7S2yXW<}QpV0$;b;0Zs&P6vPQTqe`bW5hTXWj+L0`HRdXa`!$J@XhS{o z19;#j8U667Qy|c^UtlPzH06d)vE|v0B=5H@E|t$|$62Mb&mfE?%W@+=>yD_3gu0zV z_lPQs<1mKhxT3jVjU(cCHqFJvVxP)6$22$Y38dVmXC#(&agGK4GA&Se;NEIL73m{i z4DJW$aJxeZb04oH%zZ(sLxF_3%dVviu}0HkJDc_d8`-CNY|+#PC8eU_iNrCZ;~lDX z>PVIamP=7JgDy4lK3gWNY#%ohL>i;?d?gkyOu9;CMzv2*#Ijt6Y8a&^4V=MVSm|DI zLvcYaR3H~3!!vSyT&bldqXag|*txJ&7sirQHOh@9yDui&OtIxyGqNaVr!r+yUT&sf zShJAo)Q+0v&M;Tcwud=%pUEm@2SjLYZK7<9k=g1-SFvTn`7IcPndmzl>BO ze|Gmz!75xJ0Z0H6fCL}`NB|Om1Rw!O01|)%Ac0pSAZ>j9B&3rhi6L47Phu*eDoITv zumqUIg`o&|0-umk9oJ(z_NtGYHs^&B8m3_=P9}6c){+@3IbhP1y1nRo;rk~;k@Bgode!O<;AGiJZ}=c|#7y|6%+;c(W^b4;04#gZDsT z{2#{u-+ugme$55<|2H;&x)%O9_<#!}00}?>kia`i;ES!z+vMjjCk*xU%O(uH;Rp9` zX}(ZrdA?ApXO~m8GBZhz3g}enC);$U*UxnEeg55jPxM9{roGO5p?qeL zJl;2J+Hf4>!CawH&#`A?AJ6bIIj$dN@$xJj@1!#*!Mm8|7=&x|dq)kUu4h=}$o4vk z=7h+r{S24yRQpEph`?FAT6_KZLKQo6l&z+1duSBGXmvOcTi`XoBRvwU9B}Q<# zH~~{@wOqfg4oN&8FMC$`^@VWXH>ydj38oPy$#A|fO%HLEpyP=tQ}W-05MBlCTO@@3 zD^HxfMhMR)PEvYUD3#bzDVu3yW<875j$1?t&5b9z>KqG}TZ&CnTpZ~X8^OfM9PQ@f z6L!$>&{WNEs$I5O4x>%BDvPPCH9MLlhHT%-+FkqDxZ?f)m-qkRKmCUbBmfCO0+0YC z00}?>kN_kA2|xmn03-kjyu$>7`Ty|#{~hjN*fdB05`Y9C0Z0H6fCL}`NB|Om1Rw!O z01yb?{|`lez6O5a0tr9@kN_kA2|xmn03-kjKmw2eBmfCO0`C@q?a=1h&W)Y*e-G~e zVf_Ey>Ri|wNB|Om1Rw!O01|)%AOT1K5`Y9C0Z3q#0DS*{l?dF11Rw!O01|)%AOT1K z5`Y9C0Z0H6fCSz>0zv$LEArcGk^hYRbL4L$e-imaumKlH01|)%AOT1K5`Y9C0Z0H6 zfCL}`NB|Oe^8_MW>z_m%*HQIDOCReN`rhXHr;&kbIxY7s<-?8jgNQoNHQn({**Z(T zx4wQ9QT2gmwoFy_UL1b!21u4$Ez>e(&vc!$+#iJ2_af%J1aEql7R3LzB0pS<{7d8~ zkw1_8H1fm9kKTL(VTq6cBmfCO0+0YC00}?>kN_kA2|xmn03`5&KxF-s(85!It@qYH z4J|$d*!*z)Ahh}nVB_BUQRu=Wfb}5t!V`cS@2~IeEI$AU;{Tgl=-S=qx7~2#CJR>K z0tr9@kN_kA30x%b{Qb>arT1Ia*i$(HK(Byr9y#?ClExen3LI&+@f>j1REZjL5ZLL;DICC`h(9Nv|EQI-7tsV zKpq^HTuUE5c=TW_TccoSkoCcDKDs~G1|PzT$3Ff2d#EGTlJL|Kv5L(?(6g(K!?z3KqKfOQ70W!d1_Kc8AS z>~i{7o*5J*O?yGjmIz*RUg|uCuyEAM37&lU{QZp;o4EML)X!`p)#~RwhDn#ZSr<2q ze2N()eLdMjv`oA@V-JPHdcjCAjO`QCoG?6+dxI&rY!h!E_qX5VuD6Mc^jErU>6&>< zHt}ogXExyiou~}2(Fuu5VJcrV9m6iTF2WBageVrLtp*xXjtTG=#bXkyikU;RIvQoQ zbZ?xL)#3=0_=-BAS|+%1R<7#vKK@luip%+b1*-^fUzhz=mEwaNXI5bYtDpkmylV82 z(Q30jVocv|7`8H~(4^zmN24i*#hhcrNDT=ot>gXav16u{ae7jt3|zio6<=Arua)Aj zquu9*wmN=&V|IDP@Nqf*>w0-bD&CM$Je!7Y-G93A@tx;IU=)h$dIxijKN~V6%NUml zFCma-Rk5>Dr)+0%J)bp=QVlCiM~PV_-LEl+!m!2X`t}jlY1Ix-*}kGcTyzUwxEv|n z(hU$;U+ub!N31#$=!)L(j;9Z7T>}w$ouL5a7h~{h#tRm^n&I4_UP-wYu1vvLbag3KvKK5`Y9C0Z0H6fCL}`NB|Om1Rw!O0225m69`@b qa0do, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk new file mode 100644 index 00000000..e9a03b46 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggqc1zbFFuHAzpMBx +PW/o2Nd1QaF2T2HhxnCElZs7mMihRANCAATbIGXRjemfzFkvZULl7J28kaj1LpFk +vdL/1Bugo1NOND7S3wKz4Ch0XbY5JEVnjHAstd/zgmlVOeO32LILbT7D +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..3241ba54 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDBzCCAq2gAwIBAgIUSOvvLzUR89ElH1ZGMFz9GIrxsFAwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +dXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABNsgZdGN6Z/MWS9lQuXsnbyRqPUukWS90v/UG6CjU040 +PtLfArPgKHRdtjkkRWeMcCy13/OCaVU547fYsgttPsOjggERMIIBDTAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUgmokzoyDPqRjnwgxsrSN +rHXjcU8wHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFmZmlsaWF0 +aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQDg1Ml8qNlg +w4wmPOgLUPFlgRRhRhcitTq7Ufy2KYt6SQIgOKF6UW4XT3a0eMUJeNYBfvXqbb+g +tlBmZSkhTB960JM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..bc0a4eff --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk new file mode 100644 index 00000000..a6fefb35 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqnm0pBGWkoFnN+uy +qF7zUkayuu4UD3O+Zz4QoAQh6sahRANCAAQruxJMsAqp0N9niEbYOnJRaPz6nHFw +5jX4uG2WRA3BvnvpvzzARHEDdYXNdkQ1foDkR4DNXYK3MWdnJcceDk/B +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..d072cbdc --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDBzCCAq6gAwIBAgIUOrSF3KOx/0RDTXWnyzsSZkCQNAQwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +dXNlcjEfMB0GA1UEAwwWVXNlcjFAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABCu7EkywCqnQ32eIRtg6clFo/PqccXDmNfi4bZZEDcG+ +e+m/PMBEcQN1hc12RDV+gORHgM1dgrcxZ2clxx4OT8GjggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUJaJVR9h35V4NZBolzpIB +IXNxuWQwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWVXNlcjFAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6IlVzZXIxQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoidXNlciJ9fTAKBggqhkjOPQQDAgNHADBEAiB7RFHSsAcG +B/TozCo1T3/dZwXIuMrE+DW6d2tRI/wSVwIgN0W5IbMTpdj6BVFHXIfgPrDvEM7o +NA4KFpWG4k9ijBU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3d8d6cea --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk new file mode 100644 index 00000000..518268b3 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgn3LOuo5Zc0F6i1Z5 +7Fgtmc1wwBs2vk9/MHGUJvCZ7+yhRANCAAR7h11jsTuxqh8je1jeT8yQ9LuK4SZU +e4rQriy2RzOPziKrg61OPuv1dSmDbo/Tx8HwjMCf/ykUFzGoNzjpBj85 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..a2dff217 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICbjCCAhSgAwIBAgIUWvhD/4fB//gFJOSoCfOjHTwfCswwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMHsx +CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4g +RnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMQ8wDQYDVQQLEwZj +bGllbnQxEzARBgNVBAMTCmJvb3QtYWRtaW4wWTATBgcqhkjOPQIBBggqhkjOPQMB +BwNCAAR7h11jsTuxqh8je1jeT8yQ9LuK4SZUe4rQriy2RzOPziKrg61OPuv1dSmD +bo/Tx8HwjMCf/ykUFzGoNzjpBj85o4GEMIGBMA4GA1UdDwEB/wQEAwIBhjAMBgNV +HRMBAf8EAjAAMB0GA1UdDgQWBBRoDF5pgoFgdSUIqRJ1rvVFV+RO3zAfBgNVHSME +GDAWgBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAhBgNVHREEGjAYgRZBZG1pbkBvcmcy +LmV4YW1wbGUuY29tMAoGCCqGSM49BAMCA0gAMEUCIQCBb5CGUbLWE5z4u51spZXr +n6+0OzNQ40NaMoFF4Cb62wIgDMUvns6XUCB5COg4qOzoZQz5RweXyHafoydA6kol +EsQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3793ca60 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk new file mode 100644 index 00000000..846c914d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxsTESX7rE9B6/e4R +9lWQYTPydhzUEGyWHToFEYpUbwShRANCAAR/A7Zs7b3/ZyZds+FYaMg+zdgAKJL/ +Rpyj9BHTtaYmBW17aSSy/wARfRwRTV3hqvEX5DiC8jv7HMDzSkSyZD65 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..a5ce3e85 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: ca.org2.example.com + keyfile: ca.org2.example.com_sk + certfile: ca.org2.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.org2.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org2.example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..f5f055a2c17b67bdd1d2b3d547db2c38c09f52de GIT binary patch literal 61440 zcmeI5ON`^#TE{D0udehXGsCoMW`UIMnbGZ{x+=Egq>@3XukARFlQ<8@&I>gqzvINQ z6UT{@T%l1n4PvAV5}Ui>iZuv<5GxkI;!12;AYB0xJ2prlBsLc$9>Z~}x;v@Y^xW>A z8TA}@S7IL@pU3Zf{-4i2=Tz0IMbp!wy5sgGFB)HaXDt+3`+hXKwzl>?@Dl+)&$f5K z&c?F?@Euy(zijt=YX|>3xOM% zRq*e!1YkHM00}?>kid7Dz>{Cw*xo%j2t9Q?Nwzdab3Icx70J^^$Bw0*J>H~vnh@xy zK#)Z`dhhJ%d(r!*8m$vNl_U83SR%3aAUe`qQ?icjabMQlsBAfMv{V+NC9zn15S7MW z$8k+>cHGlu$EK>;LH6h4Dblee$(pse9;E3>-gtC2F;|mDjvX~^??F_X4or6z^~}Bo zBKHRmqOLY^dYXC+I^(6#f!05pjHOLLMr=u-8Jdq~=qw=?g(&hMTH#ra;9JoG-MYV0 ztIO-LxA*wH+uOUJd=h$WEC5ToZd#_~nT|bL-oLg2cKJ;7zAg2&=TK1u!}p#OjEW_; zD$)<416KnCS7SYhUQ(64>pxq&8?^dkzy`GXa&|$hOZw5fTf2o%LTje2YSYos0-nq< zXe(!Ne7w@^==GJcQ;H44(86K}B5)@(U2RF8N@7@hPCKe?exXvIj zO>OjI@8$}!7va(Sr~5B(oLJ&Svc@k!Vu>WM&gC|JcG=!u{N~m!bN8~+zsTwseX)P* z@vWWh-48zuJsvNLY&*81jZQwpD@8pCi{1z2S#7ZM&3fL9FKN=%nt+t|_V&YDyAMCS ztP&@MI7UytZ#=GD-`;)rF!Us`D130U01*II8Z`UqEo$1pnZ4}9&Po+8jTXJH4IHKO z?Dl#PwY8~t+>vb6(q05w(#SgrJ2vg(f#W>CA1}4(RRD`j_V%8WC{>o|_barG!69Vs#hz>-NENh5I_!F4r} zlG92O!_&GhDRDiH#kG`lB&!mZmQrb5Ny+jNiW-iiVhENxK#>C^9YxZgBG{)0vX3C( z6Kv?g;(v5;{QSg0u#q&wmZB8R3v8C9z{uSqG|aJVhMZFrF-#hS&ys|}ierD$;(w+Y)GnBb`M?#FP_S7(JHbc{|LR2}@(Lp2AG6V!t$z1wzaE$h4fHeNJHg zaz>1E8Bzjavqe~@=a&Uy7KCvulMOHB#DJXY;+z&Zz$>T{MRJ8ImIcLbgHk32pcD;` zte#YN%9TVcI}WpSd)8_sx>B>$mFIMuBbAejJ6ts=;`tKNC5{-K#F=t*SZ$UprAzA^ zi7WyM-*40xVOiqh1W1qx$B?rjQ{(V-m@sIDqD~G7pUx2oOOVv~i0;jNYG_yEn8xy+ zkyNa#6RQjrrJ3oMbQ71`Z91bc`(bUrAFF^$E7cO(QBaJ})c1`tpEEdAHC$!d#uRHh z#mhp9=^6%I19n4Zx
    =3F&Jh6z1IlLSW*t(Ko5K(q0PKvZ)vl3;xzL#QVaaXM>M z#k`cS^XX1JQO8Sd(y`_PmJGAa(sbOY`nkX`c%(~`hM#o^F;+JdQ?sV;k1BI^-?S%E zK{EAO(VNmf8`uYr@FeN@VTPr@1R6z}f%zI7O;%euilAxT9+|Bsk0_vx!sXzgk?*u- ziGkd=5Vq@>YA%nqYwU>aXM1wP8V6zRes-i_qFJQ!PTNe7?S6Y8Ggc?8GS);k*(7TQ z7j*i?UVR+cyv(4MZ1Z`Z0_UvyyxnA{RVF=a&)IRi+3Cnla@4LRx?veZo~0^kP10JF zAg}{7pVkGUKpMud)9aQi)oO+?N;x7!(u7GK@!4E$L?}#{j0w)1a!?^2Q`>%%9djFCR_26(+D(%6Y_7@bM#arcXzs`fmk7L&9W)rcmo~ek_$%Rs zOwgswdFlB4vun!=NT_|&KBs_qN|QAm)8h#g)#ECPB~U$)#FKF(q39}_N=Z5@BMIc& zpn%wO1+0}Plj22lC&eII*PDfb+D&W_qfYk=?f$riJ6tFZh+A32@wqsnQ zmbR+n=E#<3{IDX9dmsRr#6%`Zbwvb6!WFNm6K=&QyT7<2JC1iC1u~eB^b{V~_0*99{60N}BrsgVr4*9Z<5C<|;~*H3 z6rh0Lpx;NyUEue1YR^@#G3jJtxK74mMmArrIh0=R<^*4-M*dr;db!awOwEb>iJRII z2&*n|Jm=FV9w$rtgG{S29kl!D8Sn*w%i8j@fm>6p=4c-kS`FL?^LD-?_e%o>D@~St z+RI(ql%IL-(zZc=&se}Qs7~oQ!Jm|b6R3WEBFC# z!=zuL2!cQAplEj_jHkm+s;i-0O-RkE>EgJ6*V>|nyH(emVf?&YnVSXINTTJ+c!H|6 zekLqCF=3j@`CX3EW3!%^oik2p-W`zLRKmd-8aT)#N8o{1s%CtejQQ2T?_ss5_}=>-&5;J}2~rKUf34FOwk} z1}UT)MVrazV@W^8b&~}x?F@$b7(0&B0?}DS=4qPg5-o#olWhha$i0*2hVZ!uhf8IG zBIN|dh;p$(C+7G#fsO|4rW>}C`$&0Ss^UmV;+$+2r{p9C9Hk5=PV7;#DNkN_kA2|xmn03-kjyoChBjYp3{aqLJIfw^vv?nMUI{o|KZ9ic1MJt)r=gyg|xF!IuJFolgT`>QDJ@nJH8~?cV_uva|Zvz21{tw6h;rKrs|A*uM zr!%17_&=Nh^?GMOT{TcF3okPR3XcDunHdMi|Ka$5FrzD&_X)@U;rKrs|9`XN|BHJq zc>ce(`9Evn{{tUzg9IP}NB|P}P7wI~v(4p6@&oO{WkRp{MgE&vCPZacmkDt;+9_$} zYIz#(^zyzu;7T3RqWV=6EZl+1gxO!e)|;(Tv)dODTIv>rj8rb9! zVBlc%?A4bENuHa>L@^i7BJobWQ0>cv7iQzwsE5+8Hc9?!Xy1xuLN;lArDZ~kDqXxx zhy}}pvV=(!V=z^@LeAB2g{fIgp&rZit0L;r4&|BM#(u3mE%Wo#yxqq!mSV|LWy;0! z6{pK4W4T7Iz-Tiqjn6r!6882B#WYUN*o57v>?hM#E)&`~tANP4WkRoe(DCb0K-!d3 ze(xwbE5-0aqbKmpz(fmTJJnL40=|)DLYFHb`3lQ~D7qreTiHoNNs*Pr7*#V#CtJ-W z-K^R0Ft&_UMq|Y#_Vd|%I4cb2Bco!0UjW-MQ;u6IPl;(dKH;>PrI(A8>l) zjPRt~$rK%hs?_^!FAdg@UA|BV{!^dD}J03-kjKmw2eBmfCO0+0YC00}?>kN_m` z783~8|HJ41x43~})gS>#01|)%AOT1K5`Y9C0Z0H6fCL}`Kp+_Z4@LfS4g7~2BmfCO z0+0YC00}?>kN_kA2|xmn03-kjyj=vgLz`b-AOT1K5`Y9C z0Z0H6fCL}`NB|PJhya}be-RZJ1_?j{kN_kA2|xmn03-kjKmw2eBmfD#T?B&h|EM$-Tk9W1Y{yo# zLra@z7W&TS`X>=rF>T#B4S9cK{UD;anyT5JDOsnXch=Wq5k+%7Q#TdKdv^JqYam$C zb<;8>&vfk5*zbkb_af#Z1#fm57L5OIMSi#z`G?3)B7YM3_s9<;KYslcgegJ-kN_kA z2|xmn03-kjKmw2eBmfCO0+7Hn0+IEPLQ8J}w%%F)B((ezVDtU;gV5P`02_DKW1(}e z0M>)hb8i5yy}Q1*v-$!c82{hgLf39Tz3GHo*J-c|H%I^yfCL}`NZ>qyr|)jwNI%}V zbL+QyJE5I{rn%_3znJ|oCVh+|A9pg%Vx^~ck!i8!3y0-+`%r2ewn(zu?;=QRQ1$2I zZow$zC#XBLu@Oe2*f2=(SATHNmipSgPw#c~LtZn?k>^V8A>nzhDUUsEbnn5viDZp~ z7{7Gy*B`7#pEy0uU5eqkAmVByMzbltctspZ?VI+}d0nzb8aUR1p7!3SL6S=;O0uLJ znzrdJU9rgZvI|zK#XHtYjRFE^%1hg>V_ALh?w`#p<#93nON$9|6=s8=8qeS@vbv&> z#EUV6rK`?l@aT)D?{1v2iSvI&{nRF8hGh;DDchC1iZK)BIOX7p^7ybXjyoKalZG{^ ztk$Lpn?Wds=`aZ^H$S|>CSC>WUa8*u;7IXPRu~j(I~i@eAvxHsJuB5Jy+&1euOy zrp6o{(iM!WCFNGprUb279L#&de5~nXt>PcmQgp`^O1bWgXrT$FJO(LVq7!FrLa|J6 z=bX8vzFSstG5@b%6#?$6qQ9(Cym#%?D*C`Gh(Kj8>pfJoOSD~YtQz`Jxr=k+;Zbf{ zw$Os&)*4nOg~&!hiFY#PR+^b1GgPk?XSFM=;v4KeuIvk5Z|8BLtzRM)7vsOGmCs1U zYch%_v(SyZk2gNN^|TC(LUtVQVA21cb{XTmIM0n6>2ZT|GQCzMKB;tb<rh;*HjUoWL zXFcoLi03?xvk|_c9xdH(oU!cfT%PU)wSDwOF#f+8`Lngie?|T|^0$${0lRR61Rw!O z01|)%AOT1K5`Y9C0Z0H6fCM0cZ`>JPlIsOS0_f)T^*f8ejnlK}(phZ% Pf, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk new file mode 100644 index 00000000..78d98a7b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtGB7iTQ879pClG40 +AtLOGPQgYBIGSFIk4NBMKGx5DzShRANCAAQhD2s2Bb1nPAT+btXQ+qBUB+qxYlrd +iDtj7LnKwPiRSRU6s7ID5SDAFovKKzTsQMfd7zHspXzi0GYipe/i8s6u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..cf18a831 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDCDCCAq6gAwIBAgIUEib8wk76yN/4KWkTRGpi1KUZ8YcwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +cGVlcjEfMB0GA1UEAwwWcGVlcjBAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABCEPazYFvWc8BP5u1dD6oFQH6rFiWt2IO2PsucrA+JFJ +FTqzsgPlIMAWi8orNOxAx93vMeylfOLQZiKl7+Lyzq6jggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUhFCi4xC+d8Bq0OvdhVGw +2Mg1GaQwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWcGVlcjBAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIwQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEArCXGbMEa +laOtX/WWUEOuPs9TOajfHekY1QLZxlfudIkCIHHD33nUJgvD8K3vdjwqll9jraSg +vOhDLocCPVmZt940 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..7f5848a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk new file mode 100644 index 00000000..4c3e8917 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgKCUAyMLQ62xjUO2v +84CTmyJMMm+afMpkhqc1e+rIsOKhRANCAARW7N1MfI/r7koQn5nXByUAbyFV2DV4 +5lNBGoykw2jivQ6oTDk6sJ1RpCn0X/B+7xsMPlVNMoaykt7j+U6aaNhM +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..19b3e5a7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDCDCCAq6gAwIBAgIUMn1hNeOQOx3hkJwbpMNhBlCmQiswCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +cGVlcjEfMB0GA1UEAwwWcGVlcjFAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFbs3Ux8j+vuShCfmdcHJQBvIVXYNXjmU0EajKTDaOK9 +DqhMOTqwnVGkKfRf8H7vGww+VU0yhrKS3uP5Tppo2EyjggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUatrJ2UUH3F03hVKQmbAt +I32sk1EwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWcGVlcjFAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIxQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEAuNpcPBzd +PGSlGKV/HmQU1tEoCtijW+SZxORz8zZm42ICIBNPxM/JPojI6/HWHKGeye94zMoP +t+KL94ByI5nWP+69 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..5030ffff --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.org2.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org2.example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..02f22ea2d321724f5f99ac42efb3a36fe05f45cb GIT binary patch literal 61440 zcmeI5ON`q{ddFMtms?|7Gm|xX=BDxNVBKkVi=;$71_-<)MNyPQsVPwpYT-2aCMAkg zi*r&JqHOAEON>rn?ryg=PVE)2y)9MKpsFYy8(h=Q&hLzQoqK# zeq`1u+Lp*-Rk7+y@Gl1bJ>T93 zI~&grz;|S6|GM38tsVT&@b2yJuid%5z4qR-JAWAcvz`BpKHYh|^Ov#I?d^Mie)stH zkHSCKWdOq=0Z0H6fCT_AOO3aPI#nd<4>26ydldJyktNy3&UheeqquCla=cm-;?-uQ@+dBi zebXIT{_MD~&5kWqbHdACj;Bb+wj^uzB0b2{m;AAJF|&~-d9D+;9RE>Vn+~nfEbdza z4MZLcAH_%7#O-V9F&K=OLWkPmVm7um0T*Jc0?p9%c%Cj0&59659>tI9EJxJEc$pR- zuGH%KdhG2z{qWxQ?q{Dxo*E0llCE2}CHa=?c+2~@R=_Twi9d9tf%XC_ieRa|7X;(Y zD$6(NNAclE0|ZxNJ&IpbmA%_PS^Fex^{0RhX!YgGg{>~>nGd#h%b!KoEJxL*-iZx7 znPbpa?&A1(rP@b|v%UNA$C0PwMUfrXQ8e%LGrCgL)3EqMP@dHWyWFgo&G?!oU9Abod2eq&y0!cG z`s1}Wy$WD)k-fbyzOl8v`{}2V-#k;d zk+x76$@Y}<-R+fUdk3O6?tzD-`?6~KfTT}mI#1; zdCuwfy?x^_xV0IY}t-$19nHAsbKGyW6|FyOA$W z78W)J*5NHa?yWTABIt_t^T7b`#O0Z~DaHD~17_5e63-jY^b?Jn%y1ynX;KUjB7zY_@&Mtm6g6&_L=)k0gzt;1bO#nwhN*ZK{ktku5gO zT44fnQ0ceEq3z2IYRgW&RHwi>yEX52*eTECX5BeE?siNwDtAb)+rWD=hCI);sdY$u zQG(D8tWr)Fh%#vyCuYA_JL35~VN{Dmo}>wj97G%K3?f!$cC!_D0W&Hjw5mQFv(pCQ zq8&49;R5Amq<(@4SmUVNtI=&&SBL$HJ4q2qE-{a$D^-t6@^ZoSr-s4GbipkKUGLYT z3%Q`H`O6aW<@T**B_z~=8qVC2hn;FwwsUf}50&t(Dgo1#vW|rfM z35u6znKmnR_9a?GW=TJ>&(`p$&UbQT%bnHBO@s5rM0?n`uxzD^O@~IMUhe4{e&p6V zs^I2Nq++s}tJXp#tS^*M_yv_vZkGDoWUeJtgN&Y#m@JN+BCBD7#J-{u-V6;WA%8&$ zJHLPuo~vUhc7*{@LK_T~1w?A+7E;Mtfh95GxZcKRGB)+(c5AHCHXRDvRV9qR7{nKv z3v#vVxWY88npHv-tTkgDG{+I{i@|O&8EhQP1t0k-2PF0#8Wt;XK^W;Ny%9teHbF4IGR<^Y!XkW(>RXl zxwNhWjr>3K11U8R{6O>MT>T39RNGZ6#)LQA7Q-?5)}Y&};BrEFch#@xO{qCiI(1(~ zfv{TwSLXuy)GuV|V3-%%(_wdzn*rYdxUynUIQ3GCQ93{cv7IvNPRW!9)uDn_C(FL> z^{#F<$S+(No(H~ew+EaE;3)7@dQQ|&OTr1%pfr(_ye}?PFcq`~LLd$0%nx9Jn`E3s zPn`meB!enN5PXkHXUeEONp;$T&ZsjJ%cQIlT@2+7+#b_*x0f)RquD%BHq*m)o42B4 z+$0k%ZD=L=(rggSa^8fNQseYU%BBm$go;V?vYTRP;4hOLkqX^gH6PGqBH+XO0Wxa# z2yWry)wzW)Nc0F0uyEPcyur6gQYhyev;CB!HtW@FYdpo<+8h^8(&hxs6Z)wm+2Cj< zPqYnED0XHE0!i~VQ+FohNyk!Zc85u8Y^g_>rx&7WrbmcIy-Ri(bQqQU*W6HCD;Jb7 zElr3(G8?KgOGc&Xcp_Csfpd~;)yE^LG@sU_^nju|M_v^;PE0@i0C%37>(TJ@p0IZBXR$wtHShf~*o7M;00}?> zkN_kA2|xmn03-kjKmw2eB=AxMnj24^L^66Ng(u}~GKFJuT0+%SR#FrUm9i+RfQL>w zOwFhnDgCmKn>K}w?>vd5lUOz-BNCoT%E_dj&7m1Z)^%CWATp*Xnx^GasH(kerW=c* zzU~>)^+m3)d$!@00I=@7?x%R+`~T~aAFaLjcUyl8zTo!DL;%kJ!})(W{}1Q?;ru_G z|A$KWR+R9niQ*UY#KOzG2?gi>FT5cK=l|jSfB0rs_#P;n{}0~-h4cS#{{PL-|1bJn zc>jNE^WWE^KLsCfg9IP}NB|OeHwk>Xy}A6B{7}1Uz0m7^aQ}wZ3-wml3+c(aFwWN- z{z7Z%x-F;8=Yq4HPVOp2g3!R3&%6g&lyv&LSf5aq|fgy@%NA=|i zEiih`u8?JN)+LDOTxBx0MH5li;_8h--(f9}s`_ZNI9AEJMd9<&=qOXlkadQejRU-Av{;HQ>?cr7VAQ17 zs3*Z1w{F#oX0drrH6}FzJ?dpFyqvKEBWK#xEwPWaHZr zLb6w;y>e^r&G$=%>?AQsQnPt2Gvw726v8*UT=%{;wi6@N@2Q5m7;xrUs9_=tIq8AM5jIJ)Cmy5!ps&?2~vDo6m{i<9~&f(9vxN8 zQk#%oT?j?0-64DFsxvmTQB;)*f?*X#ZZ61-o3BF%uY>kA62jo67f!yE5ZXZn6N0Y7 z?F&wuPfrqQSEsW^PRkN_kA2|xmnz&lJJ zT>lU6|KH&ThE;{y!4?=^FS8H%I^yfCL}` zNB|Om1Rw!O01|)%AOT1K5_q==Y)3ZNc5dyg{|kKo|J`a>SQ|(H5`Y9C0Z0H6fCL}` zNB|Om1Rw!O;3@*}{r{_|z%WPv5`Y9C0Z0H6fCL}`NB|Om1Rw!O;N2n+&i`-4erqlE zZ?V6R{Z;IbVt)V*;06gm0+0YC00}?>kN_kA2|xmn03-kjKmxCyKx}LM)0pErigsvg z6U|27-(3GJHc~7{ch5q;v9W#-Q%0JqIld*?XQB7k*Ap>C8~K)QDU$y@`TbiUSkiUN zwj|$jowL{z_uJo&s#Wzy4Wd`60mOH`Wg#7oP!a++R;bE9zX03-kjKmw4!WdhGW*nBVdbmRWr z-|p{3cETUdMlbzv_BS!1y`sv&qyC=C7d5hHYS zcw-v_D?Md04s-m@cON*?Kzs1{15-a_G>58J9z1$5k?e68=8wSFZ#;StM^Xot zvvgjUY)=EnS~w~`_&kih99x!@L(8%Jr4)-CuS)=mP}dC0^GDL?uL4RwHVn}`N4Y5e z4bh47IfSKD7cTJRXU{&^xL^~Pe@y+%CK6V%L9}XzZVd_2bw?$tjypJt z99U+z(xueNi7SlT&f&aSX{_3W^vl?Sui1)kwu#I1FErVC=XrBB@hj_RHsJ!DXnHs4 z#JqIUVy2Z|aoT6pR*9MQ{QhAhjZ~CuJC{c06oMu_X(*-(E%&IKGQHHC8G{^ud2~Xt zEzo%{b^YhE^2U|oYW_cmRfM>2ivF@n@!_pAs~7;QAVTH7ZuGD+l|ik?nEebH6!QAe zt*YQR?0tUJPYdYLKn{+&!@1uBziNNznrMn)hJ|c-)haHI3^(fh>y?$a*5F?$EZ0lL z)%b5}L=0hpf@6JM!EM91hb=%Q*709CgZnMIg>c@t5juOBT%;%i}Y8Z8yH?9b6vk zpLh7YW@`qRu>a~57rldvS7#kx8x1rS%=Bv%0UGc5*nTnMB|`xbp8PDF|KE)La4q(a zvA>D^F!o=uf4=PU!4OCQ5`Y9C0Z0H6fCL}`NB|Om1Rw!O01|k+1j1JU+>wDEs@hN* k`QelRwsq<=hiO0Ln2A8~^|S literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..4b474ba8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUOya/oTe+7qMcKY3TkoQfUUz9zE8wCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABMEU5dpAp0tg/aUsZbtKJawjYfU5rPXprVXtVnhWCbqTB0YqQSRhqbuLBXyZ +0fC69aj5hM/pNaZ/rQbHL1vitfKjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBTHXy/A06QOhfnvBqXicOlXG6eIJjAKBggq +hkjOPQQDAgNIADBFAiEAmsZj2wdRwaq3n4oDEp6mWvv8rcAxfuGqZJfjvhSZujMC +ID3hvwL0Y0zZEnFQozSX2bkqajwNnHiXyCbnCbwVOnE1 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk new file mode 100644 index 00000000..fbd5d2b5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2CjqsrVQX5u3VWNZ +w+pzcJL4+D02OaRoTsKY2+CeeemhRANCAATBFOXaQKdLYP2lLGW7SiWsI2H1Oaz1 +6a1V7VZ4Vgm6kwdGKkEkYam7iwV8mdHwuvWo+YTP6TWmf60Gxy9b4rXy +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/ca-test/docker-compose.yaml b/hyperledger_fabric/v1.4.2/ca-test/docker-compose.yaml new file mode 100644 index 00000000..99e68a69 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/docker-compose.yaml @@ -0,0 +1,92 @@ +version: '2' + +services: + ca.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.example.com + hostname: ca.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/ordererOrganizations/example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh example.com ca" + depends_on: + - tlsca.example.com + + ca.org1.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.org1.example.com + hostname: ca.org1.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org1.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh org1.example.com ca" + #command: fabric-ca-server start -b admin:adminpw + #--csr.names C=US,ST="California",L="San Francisco",O="org1.example.com" + depends_on: + - tlsca.org1.example.com + + ca.org2.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.org2.example.com + hostname: ca.org2.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org2.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh org2.example.com ca" + #command: fabric-ca-server start -b admin:adminpw + #--csr.names C=US,ST="California",L="San Francisco",O="org1.example.com" + depends_on: + - tlsca.org2.example.com + + tlsca.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.example.com + hostname: tlsca.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/ordererOrganizations/example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh example.com tlsca" + + tlsca.org1.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.org1.example.com + hostname: tlsca.org1.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org1.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh org1.example.com tlsca" + + tlsca.org2.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.org2.example.com + hostname: tlsca.org2.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org2.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh org2.example.com tlsca" + + ca-client: + image: yeasy/hyperledger-fabric-ca + container_name: ca-client + hostname: ca-client + #environment: + # - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-client + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config:/etc/hyperledger/fabric-ca-client + working_dir: /scripts + depends_on: + - ca.example.com + - ca.org1.example.com + - ca.org2.example.com + - tlsca.example.com + - tlsca.org1.example.com + - tlsca.org2.example.com + #command: sh -c "while true; do sleep 1; done" + command: sh -c "sleep 4; bash client-test.sh" diff --git a/hyperledger_fabric/v1.4.2/ca-test/run.sh b/hyperledger_fabric/v1.4.2/ca-test/run.sh new file mode 100644 index 00000000..6d311234 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/run.sh @@ -0,0 +1,12 @@ +#!/usr/bin/env bash + +echo $PWD + +docker-compose rm -f + +rm -rf crypto-config/* + +echo "starting ca server" +docker-compose up + +docker-compose down diff --git a/hyperledger_fabric/v1.4.2/ca-test/scripts/ca_server_start.sh b/hyperledger_fabric/v1.4.2/ca-test/scripts/ca_server_start.sh new file mode 100644 index 00000000..a95d611c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/scripts/ca_server_start.sh @@ -0,0 +1,54 @@ +#!/usr/bin/env bash + +source env.sh + +if [ "$#" -ne 2 ]; then + echo "Illegal number of parameters" + exit 1 +fi + +ORG_NAME=$1 # org1.example.com +TYPE=$2 # ca | tlsca + +ORG_PATH=/etc/hyperledger/fabric-ca-server +CA_PATH=${ORG_PATH}/${TYPE} # e.g., /etc/hyperledger/fabric-ca-server/ca + +echo $(hostname) + +# do not recreate the credentials if existed +if [ ! -d ${CA_PATH} ]; then + mkdir -p ${CA_PATH} + cd ${CA_PATH} + echo "Generate the credentials for ${TYPE}.${ORG_NAME}" + + # generate fabric-ca-server-config.yaml + #fabric-ca-server init \ + # -H ${CA_PATH} \ + # -b ${DEFAULT_USER}:${DEFAULT_PASS} + #rm -rf msp/* ca-cert.pem # these credentials are wrong + + echo "${CA_SERVER_DEFAULT_CONFIG}" >> fabric-ca-server-config.yaml + + # Update config + echo "Update fabric-ca-server-config.yaml" + yq w -i fabric-ca-server-config.yaml ca.name "${TYPE}.${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml ca.certfile "${TYPE}.${ORG_NAME}-cert.pem" + yq w -i fabric-ca-server-config.yaml ca.keyfile "${TYPE}.${ORG_NAME}_sk" + + yq w -i fabric-ca-server-config.yaml csr.cn "${TYPE}.${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml csr.names[0].O "${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml csr.names[0].OU "${TYPE}" + + yq w -i fabric-ca-server-config.yaml tls.enabled false + #yq w -i fabric-ca-server-config.yaml tls.certfile "${ORG_PATH}/tlsca/tlsca.${ORG_NAME}-cert.pem" + #yq w -i fabric-ca-server-config.yaml tls.keyfile "${ORG_PATH}/tlsca/tlsca.${ORG_NAME}_sk" + + # Generate new certs based on updated config + echo "Generate certificates for ${TYPE}.${ORG_NAME} under ${CA_PATH}" + fabric-ca-server init -H ${CA_PATH} + + cp msp/keystore/*_sk ${TYPE}.${ORG_NAME}_sk +fi + +echo "Start ${TYPE}.${ORG_NAME}..." +fabric-ca-server start -H ${CA_PATH} diff --git a/hyperledger_fabric/v1.4.2/ca-test/scripts/client-test.sh b/hyperledger_fabric/v1.4.2/ca-test/scripts/client-test.sh new file mode 100644 index 00000000..44712bde --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/scripts/client-test.sh @@ -0,0 +1,182 @@ +#!/usr/bin/env bash + +source env.sh + +CONFIG_PATH=/etc/hyperledger/fabric-ca-client + +# RegisterUser CA_URL CERT_CN CERT_O USER_NAME USER_PASS TYPE ATTRS +# RegisterUser will register a user to ca with USER_NAME:USER_PASS, TYPE, ATTRS +RegisterUser() { + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local USER_NAME=$4 + local USER_PASS=$5 + local TYPE=$6 + local ATTRS=${7} + + # Use the default user as requester + local REQUESTER_HOME=${DEFAULT_USER}@${CA_URL} + EnrollDefaultUser ${CA_URL} ${CERT_CN} ${CERT_O} ${REQUESTER_HOME} + + # register with the identity of the requester + fabric-ca-client register \ + --home ${REQUESTER_HOME} \ + --csr.cn "${CERT_CN}" \ + --csr.hosts "${CERT_CN}" \ + --csr.names C=US,ST="California",L="San Francisco",O=${CERT_O} \ + --id.name ${USER_NAME} \ + --id.secret ${USER_PASS} \ + --id.type ${TYPE} \ + --id.attrs "${ATTRS}" \ + --id.maxenrollments -1 \ + --url http://${DEFAULT_USER}:${DEFAULT_PASS}@${CA_URL}:7054 + + sleep 0.1 +} + +# EnrollDefaultUser CA_URL CERT_CN CERT_O HOME_PATH +# EnrollDefaultUser will store credentials to local HOME_PATH/ +EnrollDefaultUser() { + if [ "$#" -ne 4 ]; then + echo "Illegal number of parameters" + exit 1 + fi + + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local HOME_PATH=$4 + + EnrollUser ${CA_URL} ${CERT_CN} ${CERT_O} ${DEFAULT_USER} ${DEFAULT_PASS} ${HOME_PATH} +} + +# EnrollUser CA_URL CERT_CN CERT_O USER PASS HOME_PATH +# EnrollUser will store credentials to local HOME_PATH/ +EnrollUser() { + if [ "$#" -ne 6 ]; then + echo "Illegal number of parameters" + exit 1 + fi + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local USER=$4 + local PASS=$5 + local HOME_PATH=$6 + + if [ -d "${HOME_PATH}" ]; then + echo "${HOME_PATH} already exists, ignore re-enrolling $@" + return + fi + fabric-ca-client enroll \ + --home ${HOME_PATH} \ + --csr.cn "${CERT_CN}" \ + --csr.hosts "${CERT_CN}" \ + --csr.names C=US,ST="California",L="San Francisco",O=${CERT_O} \ + --url http://${USER}:${PASS}@${CA_URL}:7054 + set +x +} + +EnrollCA() { + local URL=$1 + local USER_ID=$2 + local ORG=$3 + local USER=$4 + local PASS=$5 + local MSP_PATH=msp + + [ -d ${MSP_PATH} ] || mkdir -p ${MSP_PATH} + + fabric-ca-client enroll \ + --csr.cn ${USER_ID} \ + --csr.names C=US,ST="California",L="San Francisco",O=${ORG} \ + --home ${USER_ID} \ + --mspdir ${MSP_PATH} \ + --url http://${USER}:${PASS}@${URL} +} + +EnrollTLSCA() { + local URL=$1 + local USER_ID=$2 + local ORG=$3 + local USER=$4 + local PASS=$5 + local MSP_PATH=tls + + [ -d ${MSP_PATH} ] || mkdir -p ${MSP_PATH} + + fabric-ca-client enroll \ + --enrollment.profile tls \ + --csr.cn ${USER_ID} \ + --csr.hosts ${USER_ID} + --csr.names C=US,ST="California",L="San Francisco",O=${ORG} \ + --home ${USER_ID} \ + --mspdir ${MSP_PATH} \ + --url http://${USER}:${PASS}@${URL}:7054 + + mv $MSP_PATH/cacerts/*.pem $MSP_PATH/cacerts/${URL}-cert.pem + mv $MSP_PATH/signcerts/*.pem $MSP_PATH/signcerts/${USER_ID}-cert.pem + + if [ ${MSP_PATH} == "tls" ]; then + cp $MSP_PATH/signcerts/*.pem $MSP_PATH + cp $MSP_PATH/keystore/*_sk $MSP_PATH + fi +} + +ORDERER_ORGS=( example.com ) +ORDERERS=( orderer0 orderer1 ) + +PEER_ORGS=( org1.example.com org2.example.com ) +PEERS=( peer0 peer1 ) + +USERS=( Admin User1 ) + +# TODO: Fabric-ca's existing param support is bad, which reads user.name as csr.cn, and ignore the true csr.cn when do enroll. +# Generates peer orgs +for org in "${PEER_ORGS[@]}" +do + cd ${CONFIG_PATH}/peerOrganizations/${org}/ + + echo "Register all users at ca and tlsca" + for user in "${USERS[@]}" + do + if [ "${user}" == "Admin" ]; then + RegisterUser ca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=true:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=true:ecert,abac.init=true:ecert" + else + RegisterUser ca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + fi + done + + echo "Enroll all users" + for user in "${USERS[@]}" + do + EnrollUser ca.${org} "${user}@${org}" ${org} "${user}@${org}" ${user} "${user}@ca.${org}" + EnrollUser tlsca.${org} "${user}@${org}" ${org} "${user}@${org}" ${user} "${user}@tlsca.${org}" + done + + echo "Register all peers at ca and tlsca" + for peer in "${PEERS[@]}" + do + RegisterUser ca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} "peer" "hf.Registrar.Roles=peer,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} "peer" "hf.Registrar.Roles=peer,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + done + + + echo "Enroll all peers" + for peer in "${PEERS[@]}" + do + EnrollUser ca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} ${peer}@ca.${org} + EnrollUser tlsca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} ${peer}@tlsca.${org} + done +done + +exit 0 +# Enroll all users +cp ../tlsca/*.pem Admin@${org}/tls/ca.crt + +EnrollCA ca.${org} Admin@${org} ${org} adminpw +EnrollTLSCA tlsca.${org} Admin@${org} ${org} admin adminpw + diff --git a/hyperledger_fabric/v1.4.2/ca-test/scripts/env.sh b/hyperledger_fabric/v1.4.2/ca-test/scripts/env.sh new file mode 100644 index 00000000..d9b3c0b3 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/ca-test/scripts/env.sh @@ -0,0 +1,166 @@ +#!/usr/bin/env bash + + +DEFAULT_USER="boot-admin" +DEFAULT_PASS="boot-pass" + +# store the default template for fabric-ca-server-config.yaml +CA_SERVER_DEFAULT_CONFIG="" +read -r -d '' CA_SERVER_DEFAULT_CONFIG << EOF +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 + +tls: + enabled: false + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +ca: + name: + keyfile: + certfile: + chainfile: + +crl: + expiry: 24h + +registry: + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: + client: + certfile: + keyfile: + attribute: + names: ['uid','member'] + converters: + - name: + value: + maps: + groups: + - name: + value: + +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 8760h + +csr: + cn: fabric-ca-server + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: Hyperledger + OU: Fabric + hosts: + - 4462096fc0ba + - localhost + ca: + expiry: 131400h + pathlength: 1 + +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m + +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + + +cacount: + +cafiles: + +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +cfg: + identities: + passwordattempts: 10 +EOF + +#echo "${CA_SERVER_DEFAULT_CONFIG}" diff --git a/hyperledger_fabric/v1.4.2/crypto-config.yaml b/hyperledger_fabric/v1.4.2/crypto-config.yaml new file mode 100644 index 00000000..e4da8b9a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config.yaml @@ -0,0 +1,99 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/c77add2f51bcdbb2d97bede84718a3cba45e3d94e16fb816b542242fdc82798e_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/c77add2f51bcdbb2d97bede84718a3cba45e3d94e16fb816b542242fdc82798e_sk new file mode 100644 index 00000000..5ad63f6d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/c77add2f51bcdbb2d97bede84718a3cba45e3d94e16fb816b542242fdc82798e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOlzTDZVorG063EmP +8q4sbNeH5xAFhX/CAs+eb5K+gduhRANCAARmx9eNxDyRwJGx+/NVi5VNn7cuvFxa +7NBpwGWFExfH3A68cxAkqylG4mCBzkB3a9Ga065gSfIy0yM9TlE1c6MV +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk new file mode 100644 index 00000000..7ddf3c35 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgyIGMzdKoql2fXs3b +arjJ3U+zgLTk5UjW8b5gTmwSvJChRANCAASATIisZ9C1qFZS7/F8W19Q+OnlS+mv +K6VU3HYD3nKvHA6bTeDoLGiTY6fdIyhTqQjzvOViiigb6ITqPggaGfKR +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..15b3daac --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..028ae5a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..f14f45a0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg9Zk7oxj3K1vwIHMe +hUh2bXmZUBkMIaZ5zFPfzCT0XJmhRANCAARPnJMdFMwQLwhfV8vdRLilbWfPDuxH +LG1uVVMmNShYMyYhuPJS8BlHZE8r2JgKmBDL68MLByk6HCCYweB9EULw +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/bbed34c9f94bb882840eb1a07cb01fc8dc68717f2c3319d69ec66c52859edbb5_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/bbed34c9f94bb882840eb1a07cb01fc8dc68717f2c3319d69ec66c52859edbb5_sk new file mode 100644 index 00000000..cb31efca --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/bbed34c9f94bb882840eb1a07cb01fc8dc68717f2c3319d69ec66c52859edbb5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbsf691UEDnIfHbRE +jEGHLYPIzyxWYxTCi/W/XIHXl9GhRANCAAQ1s19fx7Yif1mKjTNDTPBTebYhf/oK +yPZlcznzNxHWrF1JMc4JKJqWKWz9QfR+EVPVEa+pSee6PwNiL0kYUuoy +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..65a3b212 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQd/1fU8btMDV2aQC+RLuFADAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAENbNfX8e2In9Zio0zQ0zwU3m2IX/6Csj2ZXM58zcR1qxdSTHO +CSialils/UH0fhFT1RGvqUnnuj8DYi9JGFLqMqNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAI0iYoQmpLfeNe/CwEFr2pJM +SvLh0hnICfJhrqNoDb4bAiBrhMquzDLbbcSYA125Hd/mJaJJqsQiBCyrYG8NGv8q +1A== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..4d278355 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..b60403b5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgzpvqCcrREV4wh7eV +UU3cOASN5T2Z0Rdfjnjm2oITbwChRANCAASPgWKBRTgZ2EgR4bqH2f8H6g84UYjZ +l2JuOXNQqLbJSMM4oAzrdgNl0D4QM/D0/nKUkYkkdC8YQnhMj46qf3j6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/0cfb2889d2dbdb9d29f9ea536884c53154f25ea69660b7f6c4280d34841ce6bd_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/0cfb2889d2dbdb9d29f9ea536884c53154f25ea69660b7f6c4280d34841ce6bd_sk new file mode 100644 index 00000000..20ea8c58 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/0cfb2889d2dbdb9d29f9ea536884c53154f25ea69660b7f6c4280d34841ce6bd_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg0zhxu4+gl3S/wTzf +CWg0rA4ex+wdYUs8Y1PeB/pqrsmhRANCAASRV3ibvAZ+N+NyvQv6eczFxljH+00Q +5JtUE0QKzrbdlHMI0oRC69DVK1yff4rcXj6eZHDXtQP0j10pVW2SW+88 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..303ff547 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS +hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg +rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC +dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..989c0c6b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..64090c6e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt4T/aR8d5cmzOHna +0e2YzlXkj9dkVL8Mgut2E37t4hahRANCAATLnB8kB/3CofOBE4yXcjJv952GD+aP +uxdLqKPfhy8MNn7A/J1b3a0UCTT1tAALiY2sXpDiZHUuR1LChX6pss4/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/1e05ac513d93a02f6b298f96c02250777ab82ec0e1f18576fb7a127f370f2af9_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/1e05ac513d93a02f6b298f96c02250777ab82ec0e1f18576fb7a127f370f2af9_sk new file mode 100644 index 00000000..d5513c62 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/1e05ac513d93a02f6b298f96c02250777ab82ec0e1f18576fb7a127f370f2af9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1yoeNpkAGbUU3YON +u55lHKXRdjSXS9d7MWWdnyY8RmShRANCAASvTNKF37957+E7MvVtN6XLQr8YUy7B +WNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2+JPx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..9f161d7c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/ba6daad2e0f63b9a83f5dddd2e37a65bc0abd1b5cf4c9a8d9702239077a24d7a_sk b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/ba6daad2e0f63b9a83f5dddd2e37a65bc0abd1b5cf4c9a8d9702239077a24d7a_sk new file mode 100644 index 00000000..92302142 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/ba6daad2e0f63b9a83f5dddd2e37a65bc0abd1b5cf4c9a8d9702239077a24d7a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg+mLFN+eRAoHLiYdG +IFhIdJwgDPQl9wk3V93zdahZl8ihRANCAARgQeQieUX7KfrJUeI6SMuvIr1130cR +dbfUxnMJrzhIp8c22ZJTVOcmDjyb/9BRbZYJYU6ogQYQuu2YX1/SNBGT +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..89ecc09b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..089e220a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt +N6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2 ++JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi +UHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf +mFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v +RpYrSwl8s0o= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..72521eb5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdKgAwIBAgIQHKMX+3OM5SrKlkgxz4UQ5jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAELq2RjqnhqSlFt6MTHfOqIc8Ku3+9gdXuzwlyWRV+M95idfEI +4J2UwQ1tQeSvan5TRz8Cs701wbBQjLsWiurGuqNsMGowDgYDVR0PAQH/BAQDAgWg +MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMCsG +A1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5MAoGCCqG +SM49BAMCA0cAMEQCIB4gcTyYNFMGBLOQpxxM6ce41bBN2Y2sgowm6izwShGGAiB0 +dD/NjstJ0xyTKt6FNTfyaPyBbE10UmYN7rqs8stx9Q== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..16eca9ba --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg7bXiPl9wHFX7H89/ +vx6tGWPMKLjwZba1LfBo6y7pUEahRANCAAQurZGOqeGpKUW3oxMd86ohzwq7f72B +1e7PCXJZFX4z3mJ18QjgnZTBDW1B5K9qflNHPwKzvTXBsFCMuxaK6sa6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/6bbb4b3c3656b310abbcea1e9250b318f825fdaafb690e4dcb207fe5cb42f8d8_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/6bbb4b3c3656b310abbcea1e9250b318f825fdaafb690e4dcb207fe5cb42f8d8_sk new file mode 100644 index 00000000..fba19453 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/6bbb4b3c3656b310abbcea1e9250b318f825fdaafb690e4dcb207fe5cb42f8d8_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPbcUvwM2WKMfjaal +/eCZuYS3+xA/Phrym+5KfN7XrTShRANCAAQf/ozDqb+2UCP+V0bhShEuBrq4NOUH +uD+Ws7my3rzT5qk609Dms2wiG+2ciR4P2GmVS10dU1ixl4SBk9inG7Fc +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..a8106dd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..f0448705 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..a8106dd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..f0448705 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk new file mode 100644 index 00000000..0ccaa64f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg0CIcNGv5FkZIONGJ +keB3fMJG0cGsJ4TocmXS4BUu9OahRANCAASdGN2i3FFHqewWsjoB3I2U0RXDSjXe +0ABy8MJlsRPlRQcDGqYSkfCydCjHxdvwefumMYu6Q66E8HrmbcuI1D+a +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..69dd232d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..c40c7ff7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQYHOuGXnRUL2+7HYijDHewDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE6ae+LdYQfKLLK88LUNHsDLCkuCUj +L9Z1ri9IkRG+R8lMDA8d5XENSAgLUaQSnJx2CWR6Qfnvp5DAzvb+VPOQgaOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgtTPYCjv59GI2TuftNo1O2w3YreAk +zzPiN7iXrWI+TOUwKAYDVR0RBCEwH4IWcGVlcjAub3JnMS5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMsAITtql5zPil8/M0tg302vCzccX9kz +4D+Yjwb3eWA/AiA8xduUTMp8UvTBaGEqK6SdRTgNG062TJzM2Gd35rO6Ig== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..6f4a036f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgdESEV4OuC9NSMXPa +JcmA5d6G33Hqc35IQGd1krEIyNyhRANCAATpp74t1hB8ossrzwtQ0ewMsKS4JSMv +1nWuL0iREb5HyUwMDx3lcQ1ICAtRpBKcnHYJZHpB+e+nkMDO9v5U85CB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..a8106dd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..f0448705 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/6ad7ebdffb1f1eec7cdad85ad997f6d495f50a64714906777507b8f1c3b777fa_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/6ad7ebdffb1f1eec7cdad85ad997f6d495f50a64714906777507b8f1c3b777fa_sk new file mode 100644 index 00000000..da08f3be --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/6ad7ebdffb1f1eec7cdad85ad997f6d495f50a64714906777507b8f1c3b777fa_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgEGUuXYaz/3p+8m6V +CuQFtiYizCx8g7XBmtLv8xrUPTGhRANCAARRG13VKoqFcogXcabGgh4DgreaFRcp +brfH0Mq+YYDMPmEU1yBqjK8zt0bq90dMg2pEW7iMz4EqZZcuWAw1ExHV +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..df397bc1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9c46ed85 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRALPIJX52GyVdU5nJ3jN6LdwwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB7xz0PlxJ3Ms5AeH1EgL0jqNVCf +p56IZkLETCoD+IjNJEwQwh6Skx9ip+xO/ZthfTanHsHLcLBS2zxrVM+S7XGjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUz2Ao7+fRiNk7n7TaNTtsN2K3g +JM8z4je4l61iPkzlMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDSlvwO2v21gbJJtAk6cKj4yp1refnF +cpzkhhV6PmEedAIgZo4wIWcKSjDyAJMZVzHgC+YZQSOg1MwMk5eVv05gnn8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..a02d26f1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgKr40TvXIDVnshWt9 +0c3iC5G5WLoNg7l3YFbotwsQOdmhRANCAAQe8c9D5cSdzLOQHh9RIC9I6jVQn6ee +iGZCxEwqA/iIzSRMEMIekpMfYqfsTv2bYX02px7By3CwUts8a1TPku1x +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/b533d80a3bf9f462364ee7ed368d4edb0dd8ade024cf33e237b897ad623e4ce5_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/b533d80a3bf9f462364ee7ed368d4edb0dd8ade024cf33e237b897ad623e4ce5_sk new file mode 100644 index 00000000..bccecd62 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/b533d80a3bf9f462364ee7ed368d4edb0dd8ade024cf33e237b897ad623e4ce5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOcv4f1XPoXIuPG99 +czFkI3fkGSvmnv4M94HACGUDx/uhRANCAAQ2d0OfsGLyUuc/HO6kmAkEONX/zTCY +EO1NkGSzd9u5+IQtQxLovc8FO7U8pTamGM65mJW8rNvp12RsN33hQtpm +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..a8106dd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/admincerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/94c1904939ceabae0c1ce591683206c98da94b93e5daa1574904fafe1252ec54_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/94c1904939ceabae0c1ce591683206c98da94b93e5daa1574904fafe1252ec54_sk new file mode 100644 index 00000000..4cfa40e7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/94c1904939ceabae0c1ce591683206c98da94b93e5daa1574904fafe1252ec54_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGH37Avfh7cNoGI48 +Fp7iESX1sDNdSqXOhRh7+/O1rmShRANCAASgOxCx396B6wYKDwFapbKEpDO306ok +dM/kDcWWpA3PJesfIug3ic0Fy+eMcXJauPgudD/401mXzmnbmWr71WqY +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..a8106dd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt new file mode 100644 index 00000000..dd1ad583 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQK0PORh5GRX9wchuIgRY+aTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmcxLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEwVeQjWfHEvJ2qyfu+dsHtgskDQnF +K3R3DB9oe4Ghg2CXSJ70MesNZpoRyVokD6CNx266WCixU17NjZpzNHp/VaNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUz2Ao7+fRiNk7n7TaNTtsN2K3gJM8z +4je4l61iPkzlMAoGCCqGSM49BAMCA0gAMEUCIQCK3MMTrd/Gy0IXKu+dEWBCExWj +RZz4w0JQ7getdJrSIQIgIEySAbLPMlIX5Kwe7EhbRkYnzz8t8aU07gaQnefoZL8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key new file mode 100644 index 00000000..f04adb4a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgKFNlF+JeD2bc79U7 +lsofwxCtjpve+ZdFU6qDZvnMd7ChRANCAATBV5CNZ8cS8narJ+752we2CyQNCcUr +dHcMH2h7gaGDYJdInvQx6w1mmhHJWiQPoI3HbrpYKLFTXs2NmnM0en9V +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/admincerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/admincerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..770b9078 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/admincerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRAIlVC1uxbqdA+f4kIdwsyCUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAER8oFbdL2 +QPhvIF+hyCMyO6PFz9jjyxnid9G6Qn7whbbVQdhFLYV59oOH/9kLl0AYxYc/5GHm +vDoCPWj98eo2jqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDRwAwRAIgapuJbZ48HVPpMXBj8BalYVpuftUUjDUs5cd9KMh/jo4CIE9R +QYBMT4wHyYw5kPUYLAypDBsYYygiakwirNs5EvXy +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..781b5da1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/86f9ae2cbc05f6668b9ddb42a88098b45651cbee04ee21f36897b461dfb58a89_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/86f9ae2cbc05f6668b9ddb42a88098b45651cbee04ee21f36897b461dfb58a89_sk new file mode 100644 index 00000000..3b9a36a0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/86f9ae2cbc05f6668b9ddb42a88098b45651cbee04ee21f36897b461dfb58a89_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgdjlGUYrZ6aGQ0n+o +qHzvHiU0w6bxVk5Ags8yDR/zaZShRANCAARHygVt0vZA+G8gX6HIIzI7o8XP2OPL +GeJ30bpCfvCFttVB2EUthXn2g4f/2QuXQBjFhz/kYea8OgI9aP3x6jaO +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..770b9078 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRAIlVC1uxbqdA+f4kIdwsyCUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAER8oFbdL2 +QPhvIF+hyCMyO6PFz9jjyxnid9G6Qn7whbbVQdhFLYV59oOH/9kLl0AYxYc/5GHm +vDoCPWj98eo2jqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDRwAwRAIgapuJbZ48HVPpMXBj8BalYVpuftUUjDUs5cd9KMh/jo4CIE9R +QYBMT4wHyYw5kPUYLAypDBsYYygiakwirNs5EvXy +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..536d35db --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7 +tTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E +AwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE +BXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..d6bce85c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAN+5E4hZ9F7nZSIWONhaF4IwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDjdx/rXSJlYeqdqHe6KgmKL8V3x +a78WnMv6K32rSqTHOUH0xHd9yWCjekxfLeRnsU0390j/JC2HttqpkPdFavijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCC1M9gKO/n0YjZO5+02jU7bDdit4CTP +M+I3uJetYj5M5TAKBggqhkjOPQQDAgNIADBFAiEA5vHyshEjPIRnqiGQhPTyxfxs +nFS/Fgth9lGPzhNSvrYCIAfeoMDIAaRhVoVdFRuwS50DlLvBLxRrI8mNrPmY4VDr +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..2301806d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw6+nY/ZCCAJMwxii +KrrFm19rezjWp7DH5KhOt4A0KpehRANCAAQ43cf610iZWHqnah3uioJii/Fd8Wu/ +FpzL+it9q0qkxzlB9MR3fclgo3pMXy3kZ7FNN/dI/yQth7baqZD3RWr4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/7c19ca70568313f9db2ca1627657d880234c798c52cf81ff1f80d88a66aae1e0_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/7c19ca70568313f9db2ca1627657d880234c798c52cf81ff1f80d88a66aae1e0_sk new file mode 100644 index 00000000..9e9f319b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/7c19ca70568313f9db2ca1627657d880234c798c52cf81ff1f80d88a66aae1e0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg3IZjYgIJhp95IBNw +SrmTIzexRroUrONJSRr+p1yPPVyhRANCAAQdrPqusjcXqUpj9fttrqLFxtA2VUVH +cjTfRKmyN98yQiNIwcRogL029HtQzAeeDgNQpAPwgNw/9yo8HkOrIMCh +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..70346c3f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..b9e631e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..70346c3f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..b9e631e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/25bfe9c4fcef7907a964694404e4e2b8cac073915e0731bafcce718f0ee1f5ab_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/25bfe9c4fcef7907a964694404e4e2b8cac073915e0731bafcce718f0ee1f5ab_sk new file mode 100644 index 00000000..67912ee6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/25bfe9c4fcef7907a964694404e4e2b8cac073915e0731bafcce718f0ee1f5ab_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg+wzBZTTQk7cKn1gq +/8eaEWl/5z+ktgH7fL4+WY5ec0qhRANCAAS513j6IbzTOh7C3FhInOwGAO7RPNeU +ptbtuHoAfWg5mMQJf9mjZyDid7Kgl/sx0FComCWQ+t+ZPZxQXeZF0UfZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..44de4920 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..7eff6dc0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQEcB454+e8KyLRj3RZXGZfDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEXAa4egT+GvXT1H9Nt7r8dlB4vxr7 +w20TGKR4BuS887NNPT7x6smjJphXPWFDggDYWerP5cYhoGFGM+8q7F0iZaOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgmAnRgqptaHU6zAjKCdwk5QxDfy/R +RVrqTjuNp2o7LhcwKAYDVR0RBCEwH4IWcGVlcjAub3JnMi5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMeLIPU12omvXr1WH8ROGv6n6iBd6kza +Tltxo6+dOB68AiBrQ70UQIecAH0l/kPTs7PC8YyoKBf2GHDuNvYB1scesQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..3c778bbb --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgDDcSJSHFju6bO07R +pW6aAw7hJiVLTwoEl8WcfD4Q8SGhRANCAARcBrh6BP4a9dPUf023uvx2UHi/GvvD +bRMYpHgG5Lzzs009PvHqyaMmmFc9YUOCANhZ6s/lxiGgYUYz7yrsXSJl +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..70346c3f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..b9e631e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/387aba683c3d0050ea972152655889637b1b1d9fdfbfea0f7d7b101aab6b293e_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/387aba683c3d0050ea972152655889637b1b1d9fdfbfea0f7d7b101aab6b293e_sk new file mode 100644 index 00000000..c77e78f9 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/387aba683c3d0050ea972152655889637b1b1d9fdfbfea0f7d7b101aab6b293e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOzUNSBhpVY64H0mx +PCHgUD/vIHVvv23AVid6ix4KJCmhRANCAAQ4Y8Q9B8/+jxyl/jvTUKXUO8aTapD5 +TQxSNAGgho4EpBMoM7Hn6A+hkFBZw87FgkfLdawqHxNGV29acoM7Fmga +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..9d471633 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..f66c727e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAJYJiq3LTfE+MN9mjv4EVHEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDEmZws5l7Q6/brUQ3UlSJFlJ2Xb +xb3Yl79A1jaKszvhK4ylTxwzEDHuGgXWAIGOGAFIgjcVIAoEi8KhjwcWD86jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIJgJ0YKqbWh1OswIygncJOUMQ38v +0UVa6k47jadqOy4XMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIHKG81xIq3yokEg5py7ZriSkP3dWl4n1 +pO2Re8eWZl9BAiBiD3cVd6rrShCV8zgWr3Mpph2sQ7WCBgBqYpuaS85xMA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..bfd4e481 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgjkzgoNLxb9t6ssvM +yKrE4+UtyJlYp/Bypf0kEtkvshShRANCAAQxJmcLOZe0Ov261EN1JUiRZSdl28W9 +2Je/QNY2irM74SuMpU8cMxAx7hoF1gCBjhgBSII3FSAKBIvCoY8HFg/O +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/9809d182aa6d68753acc08ca09dc24e50c437f2fd1455aea4e3b8da76a3b2e17_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/9809d182aa6d68753acc08ca09dc24e50c437f2fd1455aea4e3b8da76a3b2e17_sk new file mode 100644 index 00000000..ef371854 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/9809d182aa6d68753acc08ca09dc24e50c437f2fd1455aea4e3b8da76a3b2e17_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgYJ1pB12oD3DmzasG +tdf1IFr1iu6pTTDE5D7NaMdppLqhRANCAAQIHc3u8B10gvx+KoRlHXVoxYiZQEjv +j12d7Cpq79k0EMs5d1kRF2vAogEgham2I87AanwJfz61GjZY72LQ+EAF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..70346c3f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/admincerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/a3968871febc28055c344cc33d19960ff1a047418cd6b6b011fb0b61d04b6a75_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/a3968871febc28055c344cc33d19960ff1a047418cd6b6b011fb0b61d04b6a75_sk new file mode 100644 index 00000000..059024ce --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/a3968871febc28055c344cc33d19960ff1a047418cd6b6b011fb0b61d04b6a75_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQguRvo3/jgj64UhpX4 +dR/o1L4QKH8hMnCjfJbCg6RlMhKhRANCAASIWskG9Fuvr2Ak2gx6MyuxKyRSjkGy +7u5upWWW1OHlQfz47SzwTVT3ud5zG8qK6RpOR/AxkOREkaFTUz1TxHSe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..70346c3f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt new file mode 100644 index 00000000..46748dda --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQUn4HktEbB74nn0EuxwDDVTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK9+jYRDBDHXICD5O5Xr2jGkEY1yB +pZrjVZG3b47qcFcXKnEhJhnva2nXr+UHSG61ZROTHrODJtsz79CgRjzX56NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIJgJ0YKqbWh1OswIygncJOUMQ38v0UVa +6k47jadqOy4XMAoGCCqGSM49BAMCA0gAMEUCIQCNzmUWrhyonoGaklI9J6zx0r7s +ObUG/WjJobE2unvBIgIgE95C7DRIQnt5WzzOZ6qILiy+3MhtqW1drS55+D7Hly4= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key new file mode 100644 index 00000000..f6ebd5be --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOC2geppY+O5KwdDo +rQyrIuW/cKr96EAAwuoLXKZGr2OhRANCAAQr36NhEMEMdcgIPk7levaMaQRjXIGl +muNVkbdvjupwVxcqcSEmGe9radev5QdIbrVlE5Mes4Mm2zPv0KBGPNfn +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/admincerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/admincerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..66ed2406 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/admincerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQaRrCap42f5AJHrmDIFEXvzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQU31K34vm4 +7Dx4OLE5zRAUf1wgv/dWmY1QVV5Erj2OJaZNEqr+TcYAdrIhMkG/IZ0tLUBjsltv +Hq2DpzhDtqYIo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCB8GcpwVoMT+dssoWJ2V9iAI0x5jFLPgf8fgNiKZqrh4DAKBggqhkjO +PQQDAgNHADBEAiBJQOmNIzQMb2zkVSdZLK2ZIoDWF1dsXRhjsO/SKgPHEAIgLeon +WSU6JKt4Pq/WEya3bDmbS18XhVNgNa5j4C+7aVQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..939ed360 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/f82d0717b173d1944032da5cb2788d5472f5ee5df75d3c6c2843d35603f76021_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/f82d0717b173d1944032da5cb2788d5472f5ee5df75d3c6c2843d35603f76021_sk new file mode 100644 index 00000000..dc6e8a92 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/f82d0717b173d1944032da5cb2788d5472f5ee5df75d3c6c2843d35603f76021_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxIHX5grSPsN9q2Cm +dyc3Dj5dROjTA+v6EuUYIxovhhehRANCAAQU31K34vm47Dx4OLE5zRAUf1wgv/dW +mY1QVV5Erj2OJaZNEqr+TcYAdrIhMkG/IZ0tLUBjsltvHq2DpzhDtqYI +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..66ed2406 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQaRrCap42f5AJHrmDIFEXvzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQU31K34vm4 +7Dx4OLE5zRAUf1wgv/dWmY1QVV5Erj2OJaZNEqr+TcYAdrIhMkG/IZ0tLUBjsltv +Hq2DpzhDtqYIo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCB8GcpwVoMT+dssoWJ2V9iAI0x5jFLPgf8fgNiKZqrh4DAKBggqhkjO +PQQDAgNHADBEAiBJQOmNIzQMb2zkVSdZLK2ZIoDWF1dsXRhjsO/SKgPHEAIgLeon +WSU6JKt4Pq/WEya3bDmbS18XhVNgNa5j4C+7aVQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..07c1c4a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci +ASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E +AwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB +uSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..c70183e5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQO2Z/HCElG3E+7L6JkQHqFjAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7yRqtot8VjlYk9z5Ud4hfVtSivKN +LUObvA791CxeuMdhdjdyVXz4sgxkn4DGmIgJLbf2s4O/Sw6KHhtyKdCLWaNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIJgJ0YKqbWh1OswIygncJOUMQ38v0UVa +6k47jadqOy4XMAoGCCqGSM49BAMCA0gAMEUCIQC/0D/S4Z2UkS1QsT6OIi4PpDI5 +l3SXacAaN/qQpgfRDQIgVCt1dJO2py/ARvHrEu2rXYOBvYrJijFQKkkIoV//cNw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..b6241f2c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgarzu0XYrP9ScO+Wr +FGvqFBM3vQUUDTY57X4Wc+xTwFmhRANCAATvJGq2i3xWOViT3PlR3iF9W1KK8o0t +Q5u8Dv3ULF64x2F2N3JVfPiyDGSfgMaYiAktt/azg79LDooeG3Ip0ItZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk new file mode 100644 index 00000000..fe3c013e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglQvjrXdvWmS/WH7C +x5vN9HwsEDXy74nu72xImmwXBU6hRANCAAQPD4LkTiXEvaKEOOF77gxRpH45HTxo +rWIvMwJI4ZTyOIejP1kvaRd3lsFr6Fy0gehoE8z0hmzpfcZPcxC959It +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk new file mode 100644 index 00000000..aa913b98 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghKhyCJtjNyxJUJ65 +rIZILsF2Ou5gmFWTROFTsLJPuUKhRANCAATsldLu2novx6PNHKg/kyEn27r/YqZq +tDnWntlNIs1pZPHAE/efAAzE1FRaptxsZQ9qVZh5g0erLXe+1Sz1mO00 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..aca66301 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQOTUD9xy42ZLTQ4hhADTJDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7JXS7tp6L8ej +zRyoP5MhJ9u6/2KmarQ51p7ZTSLNaWTxwBP3nwAMxNRUWqbcbGUPalWYeYNHqy13 +vtUs9ZjtNKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgrzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0E +AwIDRwAwRAIgbgn/Vuu7fJHJKrrJHbSrUkTZAbFfa+EGBcqHcv6jXC8CIAk8HTmT +ccG7gHGCEnH7rhGKyBGy19Qc5hGReLeQVeHk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..43b0f00c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANyo1bHNt4jxnauCiFIeceEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDqu5UEyrHuw5TS+KjAGJiHAtKb5 +GAjCCKJ3qoDJLTQghKRQQUa4EEc012NT4sRTA6dS+2BgmK7eA4rvacdkMrKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMcvbSLKjMn5X7h898+0FmR4jFau +pL69wixjQtsuVoRGMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0cAMEQCIHFBvDhL+VnABTujMgAOz/S/EXkrbc0U +UkFiVuRedPdLAiBgrDFWZrSynPQQN60IurQCg08nY8DlcUAUamTfVcQKNw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..e3728089 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOy8GTfiFfxsE7Gtp +PmQ9jXK/vDycqMvbXY11ZxI4bUShRANCAAQ6ruVBMqx7sOU0viowBiYhwLSm+RgI +wgiid6qAyS00IISkUEFGuBBHNNdjU+LEUwOnUvtgYJiu3gOK72nHZDKy +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk new file mode 100644 index 00000000..0d7e426c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg8/NNTDRdHbAD+Z/y +i2VUZNaEW1krHadeQbGh/SmY+TChRANCAAQgjRSFd4+6zQ4Rl3hCbDcBggMRegKs +JeGXc12HGXCf42eDRHPB0JHMEfOULSOd/E7ERj5tgIPIUmcI/9yIb6H1 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..8aa6e098 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAPP10jryVrL+LaN1Qv/7xhYwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCCNFIV3j7rN +DhGXeEJsNwGCAxF6Aqwl4ZdzXYcZcJ/jZ4NEc8HQkcwR85QtI538TsRGPm2Ag8hS +Zwj/3IhvofWjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIK80gxRY6cRuF1XsFgWBo6dlsrj38ZJP48DraDgo5yPHMAoGCCqGSM49 +BAMCA0cAMEQCIHYbMvhJIg26aRsL6ho38VbR+pWFLCc4zuXFQXMSloh6AiBnMCg/ +rA0t1bNI1unNaIxrVAziUi8URBLd3mwGBqZCDg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..06dd8658 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMvGmkb51lBP8nmHdaIVbKwwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJfYYd2JnwkYJUHiA+6zjNjPaq3O +D7602qcyqfap7Fk4z2IqYQ8T5/fhTqH34QRGJaMvUxwOStrlojkOT0hwSb+jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMcvbSLKjMn5X7h898+0FmR4jFau +pL69wixjQtsuVoRGMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDbvju663SpdKOv8R8rOXPCl/VuA0Da +/0qAraDtEL5begIgRHNymLMPxHqAVJHNRG2Hyo/lTWA2wFOD51IaFS0onp8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..1f9f8f9b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghhRrsZfM7T6Wv+2d +HYCNt/cugSubsFunlEnlymKbyAOhRANCAASX2GHdiZ8JGCVB4gPus4zYz2qtzg++ +tNqnMqn2qexZOM9iKmEPE+f34U6h9+EERiWjL1McDkra5aI5Dk9IcEm/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk new file mode 100644 index 00000000..b6989263 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg/2sL7eSqetCNHTu6 +Db/Kc9eWu+rt9PK+Adma/ku/WMahRANCAAS+alHUgwsTd+T9CI31zh5LTGV//XRZ +aZ6FuaFz/Mp7zj/pU+rCLTr6n/D7mZP9f9uoyuPgcW8X16eKUMdoGcqB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk new file mode 100644 index 00000000..c60b49a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbvVp1HvzCFU5QY3c +KNsL0eK1ofPZeC8lciS/Bu9iDlKhRANCAAR9VvswPijrzVN4Vnt8rdK8y7NPgDfA +xy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/kyu8IdQ6AGB7Oe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..0be08e25 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRANIWPozfViRQ6Sg1rZ2wyYAwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABL2acgsOXR+/bEbcFiWDm3gnSVy2 +5+sHpye6d7VqjMELiw8ntjG0cQCH8RHMIW0TEMraF5NJyfkLRfqe8BBJSs2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+ +vcIsY0LbLlaERjAKBggqhkjOPQQDAgNHADBEAiAbNzlJperCFVfCnxxC0JVlzcWu +W709zi5+BX6zceCBuwIgWaG4odkgBign2qbmLqbVstXYSb0y/MqKtgBAMqaJ5dI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..3887df41 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt7wOT4PQw9MtEMo4 +FSxCGl/jR81/sbPGa8sANFZd2mOhRANCAAS9mnILDl0fv2xG3BYlg5t4J0lctufr +B6cnune1aozBC4sPJ7YxtHEAh/ERzCFtExDK2heTScn5C0X6nvAQSUrN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..6fc95319 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQf5a1GSSLd33cChy/MwFTcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT5/JiQwbJp +GZbT37mMK02v/XbBz7y4Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7Rj +RYp4NRNNzIQHo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBHZyZqLLiJzWF84UbJ458D7abj13FsVhX6Ip7woKa7EgIgLJ73 +Gaa9RGuVlNfXbE7wyskoSYQI2YzPNQbW8UvncEQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk new file mode 100644 index 00000000..6bb94909 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtAqu9LuuvEFZV0jl +tfonUzwXQb7LBKS2BbfRcxx7UJ2hRANCAAT5/JiQwbJpGZbT37mMK02v/XbBz7y4 +Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7RjRYp4NRNNzIQH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..6fc95319 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQf5a1GSSLd33cChy/MwFTcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT5/JiQwbJp +GZbT37mMK02v/XbBz7y4Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7Rj +RYp4NRNNzIQHo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBHZyZqLLiJzWF84UbJ458D7abj13FsVhX6Ip7woKa7EgIgLJ73 +Gaa9RGuVlNfXbE7wyskoSYQI2YzPNQbW8UvncEQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..b9d7e5c9 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAJ9DLwbAMizHgE5YOsprbl8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABKTkb0RSX8aMU5Aucigyy6kZ16FN +gYpnJAjuSzNEuqjm/8AFnt/eE186tOMstFTmSaW60KhGvnZTefTJUEJenb6jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+ +vcIsY0LbLlaERjAKBggqhkjOPQQDAgNIADBFAiEAhgZhHqMQgsjBObCzH9u64tDW +ENqXceYVzU707rddrZ8CIAcq38EhaZHJS7k02t3mwu3P5dMj8IIu1B3qIxMDfV3d +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..eb79f68d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgea8S29NZ+VIi2q1I +rBaeU5Ps9SYipKW7BIVsIfWbA6OhRANCAASk5G9EUl/GjFOQLnIoMsupGdehTYGK +ZyQI7kszRLqo5v/ABZ7f3hNfOrTjLLRU5kmlutCoRr52U3n0yVBCXp2+ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/docker-compose-1orgs-1peers-dev.yaml b/hyperledger_fabric/v1.4.2/docker-compose-1orgs-1peers-dev.yaml new file mode 100644 index 00000000..cb76dc7a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-1orgs-1peers-dev.yaml @@ -0,0 +1,92 @@ +# https://github.com/yeasy/files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 1 peer +# * cli for testing + +version: '2.0' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base-dev.yaml + service: orderer.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-dev.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-dev.yaml + service: cli + depends_on: + - peer0.org1.example.com + - orderer.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..2ff7f0ad --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,76 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
    This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== +AQAAABUYtQ2wYzM6MmG5tB6Ie0qltpvs3JlnVQUHwSDiKnZJZwAAAABKSTBGAiEA5J3jyJGAdp2zRhRc3aSDI93swq8AQSk0MlKHZ7GEB2UCIQCfeHjesFTk+cDmrsvm3hX12CkEHBH3lS0z6Wx2raEliwH/////MilIpIBqz+yisyJI0OGDyOsJ1eXvSK3zN3cwdjVBTMAAAAAASkkwRgIhALqI005NT9hateTXfLdPcch6JCNby+Oc9DNGM/cP8nIzAiEAtaoblrq1lFfT2DdHPeHk+fibo+45lkRjlSJxxbQUD6AB/////88zApVGdiPsE3jcb6MSEDrYohCz4TUfL0tqV6xD/NRyAAAAAEpJMEYCIQCyFWDf2lI1LEQWweSElmWeo9KeTiVwapkZhoZCELx1ngIhAJweRa9uLroIg6hiRC2ForSMM5XjWkJ29TXNcNRalxx0Af/////u7Q9Nl1249meI+Ans+MNR0Z/1gFJ27zGYO8VoJUg0LQAAAABJSDBFAiEA4CzAtL+KEmgHsVd4GZRMG7E+j0Aoz33woHKQE9URsHECIBChvN78ozRYiTn5/kDg2GB1iBkWhPzg9GGAoTkwW4tAAf/////IrAovscAeDgpTOdKW6wcrK5+csdQQof3Wmix5cJTdpQAAAABJSDBFAiAWuo9Q1/ML5+SmjD1QNo1Xfi72yLYIQnJa5jaymFd2/AIhALs51H0ZVf/KR5INdDvNbwWzHqK/Pcft4iXrTJARJrSJAf/////xsDzwaAue8z/TEfa7xts/HBZPk0H0igLfGQXOxM4kGwAAAABJSDBFAiAdu/q8R/bahM7tvJK3ktSo72MvC9336/rVyiHzcx9FBQIhAJh1HM83/Zf/gkRkhtTB1ihgwggKESjqXdsNML/ePNeoAf////8f5omKwHSmgP50WP+HoDlW23OogNKs5lOe/MQwAr2X7QAAAABKSTBGAiEA+Kg/rbBq+cDMcw8Xrkf+egnK2p6uYjuN2GvzZe8OIEgCIQCaELBzsqizE9l1+AEhPv3xK5QUHXtqjpjeOwxn7hzvTAH/////b9hcAhPP6YY1c1lqTV8VCaxBqRtXLmwb2v5G2SSaX6QAAAAASkkwRgIhAPPpjz52zA9TOw4czNgmULcE4x4+fmK/gbtHTPKt1Y6/AiEA93AD7sgUozNswwW4RhzzzLGbHxjwb2YgjtMcPkaEZu0B/////56ToFamUV55FvwElXhwjRiMIUbTwSY4rKyS4LcuB27dAAAAAEpJMEYCIQCO6Nc0iu2CqNB0dTq0yNvdKKZo2oISacTNDFwlNzjKtwIhALBqAgjWCvG+YwPdiD/QX5ZKQvfeMXdhZB7BFYlE9StrAf////8OzHtz2M1dN3102Da7bjRzR4VUqSMVQobdr2mFlI/Z0wAAAABJSDBFAiEAgVnteDvHF/9aZQLNh6jYFE+udMb8aUOlo42nFwIDyzgCIH4xV3pXa8AVEMsigPkYo3H2Pu5EzStEkMCZTSYXh5FuAf////94lm6fCi1EUqskGCSfpvsaMloE8DnQFYmRQagqpabAXAAAAABIRzBEAiBmVbExmOQTrI8aqJJtRhdWB1jPi1BFr9/JEW2ghz7YmAIgXbVc8/OYRnv8aZf2jIgeXypyJSk+u9KvQNFd9t5O+HcB/////2nyCWu+3nAV/uL7MH99fdCEZBt/SvXDB03HsrbfAyd8AAAAAEpJMEYCIQDJGZKWZzob6uWYptI0jvE60bnxXuuqgl0igq3wF8u18AIhALVJNOQP8BlKU9yqnQF8Nqk9u1OqRf4hq5Owf7tYVw1VAf////88EbFG1D/WLsNrczlCpSugw1LJWj8HiAijjQgImMuDMAAAAABIRzBEAiAExkdzueahfPyn/1g75lAQTAU4lAKJstqPi+u9MuSGswIgAXTY8JOKD57qtMSxN1geAy8G1HQOOwrZ0EI6Co3mWvEB/////1msPDet+om5qQfvnUhcVyYukoPh65YGnC3gQ2nvGzx2AAAAAElIMEUCIDBvOsct6dvrHsE55Oicw7O5vLY3R78OFl/Px3PzZpgyAiEAwAoWgA8WvxxxrGwpibQtl0sOwvPjZxMl+yyuUqHFadgB/////7S77O6BjdmG5auC8229XMwpqxNGFOMEwKOX4UCC/nu3AAAAAEpJMEYCIQDtaOAwMFK0H/2AwekFzuVUfpJCLUO3Pkc6YV5KRxRrtQIhAOyrP5LGJHc1B1O07+oZ1gj8zhWxssOPvpBenR+a12MfAf////91RrusmuHImA2m6MFUs2jrTfMFtvPyf/OPGVoTye4EhAAAAABJSDBFAiAiiFZq8raLaYLRJE4pPqPXwVakJTKbf2GycuTe7DF76gIhANlzmXa0QtNcMoMMssEF4NcnX376qZ6u6kskpVMmejH8Af/////RWFTR5bo0na9yCJ9HCyRVeiviUQW3gxo/GKYvuLq2dwAAAABJSDBFAiBuOiMHXgJI6oyrx8h1tM/Z8DbBxPNYoA7BUvyW0cts+AIhANNMAYgV9jxl9TZAYTaTgrMdV5zW2KSv6ewfA7pm13F4Af/////faGp/McLB3mpghVOybWM2Q0cZ+kVCjrPfWbvvdc6efgAAAABJSDBFAiAKIqJKj4F6LyTT+MJnDzyyXNOJziXg1F7rCuoIVjxcmAIhAIH/FO2yMKROW1LjX1c2dglqk3/CfMgwsVOyKbksrHXBAf/////SJv6pG5nFoxoDTTQPZHtyLlCVDJaoduuWVp766vOyJwAAAABKSTBGAiEAloTmCn/WE2LQ2teYWARKpKe4eLPwvUMuOE/kx+bJC94CIQCYg+T3Oc/+V0usW+0KTmlwhDOXOiSQ2UFdMDYU/DG+RwH/////9kDGDqQ43AIASFmYaYNvUyPvR0d+4Xyt3wdu1CiJj3EAAAAASUgwRQIgAo63YX3BYaKCUSyBl11BoVlMBfNMsm+3WWgr94TacHECIQCgkTq+pyKbPEZaT6MtyGH3LvaE6N0/GarF8PdOo5wDzwH/////1Z0qSbGIPG96xoqdJkncDd4/AgXhnY/a+AZTgfm6YcwAAAAASkkwRgIhAJ9bJ9/Tl0I6BMq1LuboIV4pDpZmMJ8PWfW8X2wgfTY5AiEA9aeRM9ssx4YUCu7gv3yKga3KYHGSjoIQ8cnwxlPi8EIB/////wJAGV4pAQAAABl2qRSUSn1LOo06Xs8Z39/Y3MGMbxSH3YiswMAeSRcAAAAZdqkUMgQBeMXPgcsgCrma8RMfGHdFtRWIrAAAAAA= +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== +AQAAAASxJMyn6WhjdTgMhF0P0ALtcErvRHL0zBk/ykqhs0BNpAAAAAC0AEkwRgIhANPJunhkiDI8l1/mFZPfaoBBxUQnNvNhiHq/5clxdccrAiEAymFoj0cvTAHt4F/8UEJtaNs3X3KTe1851ng1sZG2QC8BTGdRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZIQJ/EMMcsq1+A4jPUYeSTxKUCCul1MaXu8p/2Dpq9h231VKu/////7EkzKfpaGN1OAyEXQ/QAu1wSu9EcvTMGT/KSqGzQE2kAQAAAP0VAQBIMEUCIQCjW3/BlzoKiWLCQKcza1AeFJ7xZ0kQgejfkdx2H06WwgIgBO5NIJg6HQ+5bpvt+G3gO2bXvFBZUpWx+ztf0nQN88kBTMlRQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQCAAAA/V4BAEcwRAIgYG1hh+Ct5pGS9KRHeUzau46ppOcN8JqovGiSQsf/7e0CIEFl7I7fyd4Z2KlOX0h8igMBh64WoR5XWpVfUyqBtjGtAUkwRgIhAPd2R2PRd1f/3to9Zs+qatO491ndyV6Pc4WNuocnYmWKAiEAnpA9UmWV/51tU4NYidgW3kxH14Nx16EyI/R2ArNLxx4BTMlSQQTEvuXm27XBZRQ3y0OGwVFcd3bGRTUHcgTG8k8Fo30EoyvHi+shk7U7EEyZVMRLDOFovHjv1fHhx9udbCGzAWWZQQSVti0edqkV5e02lCmMUBfSgY0irL8qi9n6TPY1GE4VJH3H4aSL64LB/d3DuErFjOwSyPi5yoM0GskCmcaX/JTLQQTjOU8+6kC3q+MvStN2qA9aITKH0TYbVYDj/nDROl2wZm4lkyg7a1q8AdmM//VnnYw2t8rvocTfgbELxFw4Et5fU67/////sSTMp+loY3U4DIRdD9AC7XBK70Ry9MwZP8pKobNATaQEAAAAikcwRAIgdcBmbUE/yFzKlOovJK3A/ttho7oPz7JAwaT9JYewO/kCIFJa1Nksa/Y1+Ll8GI6/SRxuNCt2elQy8xjLsCRaf2S+AUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmf////8BoCneXAUAAAAXqRQdnKce+jbYFEJOpsoUN+Zyh66+NIcAAAAA +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== 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 +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.2/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.2/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.2/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.2/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.2/kafka/README.md b/hyperledger_fabric/v1.4.2/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..52706030 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSP.json @@ -0,0 +1,164 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 0000000000000000000000000000000000000000..90ad8a23adacf61d65da9e9b7e9ed8e351fcf4d5 GIT binary patch literal 324 zcmd-&$iyYfCC$Mk#l~@H&)27{O8iNs#hH1j#l^`PiFtXcIYRT9xaKf%VF)J(#c^>v z78K-UCMT9;=I06db1({dbFupur5pMN2M9Sxv2!tl7z|3>Tv z78K-UCMT9;=I06db1({dbFupur5pJM2M9Sxv2!tl7z|2WTx^ahxtV#zKsG-Yw`*QX zeo=91Zfaf$P=K3@Jt#FXCAA173*>|sWtMYx15G_!eWK!DV1_}%5VZ{XmEELLzdVqWsh*Y2=0glM=PFjmyd$AqV`~dD; z`6XPCKwS7EaOK7wXX6cts= zKT6Z^&!ytA|5W%?fcaWuN0W~Q@}U5mu=-9j7Cc5%k0g6rA9M~{O|lLbgT|=uV4}C+ z1=0|ehP!Ykaxk051(P8*siC<*%ZKk#nBWnQ3@Qv$)?C;_SkL%cLK`X!rv}3@x6Z9_ z9TpQr73?aRNR3D4zgFD#rQrco*>J)(kNc73va8k9$q&Nksa zIGat_#3Yh~*s9b{kmVBHhqY{l9YuwvY-pqUV1_l`g3}o^m9iyzGM8@)&ZkO_#qY@R zXD;}#-=0vtKMO3~hPCNv5wnSEZJN#J-2JQ{cTwf?-3BtvH(Y!!>JC)W9ggMLKH%Eq zded8|g)tY}y9A33n$RwfxZ$Wtg#Z*`{?*2t8}_cdEZ>KM^B7qpr-~;?X?!r5OBkV=o|b?@%Y z-h1~pY$9~;YIk;y&&xjN_kF+bcRpXRwRs-={)ZlX;E@~R|MTd-n1A=d`~K>Q=r8^G zdvgi%u_x3|T>tdBk0O8h@HOCL@bA~(eGPbW1H9toHJckJzx5a2`Ra9BHz{MM+t(aN z?a2MUW+ETn0Po!ZplG)=TeG=x33>a*Yl0t)q*?wvPKpvsu{bJ`^HRXEEKW!`jw)px z^;itmSrN@)6eSXcS*p@cha+C0(#y4`oQLZTHa}>xGb2L6x}GeN1;C*_8jV&+ti$2e zDmNu(sEFx&74{_IJ-(yRrlrJlW4T67DFdx6uBj4Hh1a?m4OEL7H)7_j5z9;|0xd5p z3?w{OO*CpzPoXRDde-Gc)uV(4Q56J&^pZxSoHR9>a)C-u&4R^G6baQRFETAkXoQ1R ziUbKiF&UQmux!Q|y>%H!^``g?-YA?Yz|e+-npKGtIgeb7z>?mOXw;^|rj_*-%j|Gs z!=upo=nUyarA95Gi~U?jvG^fSWBh~@BOdK7r#BTRswJALRrNW1G0p8+VoeU?Xv`nc zWiF9Lb&>`+zWm~m3>slkjK#Qae%g-|YJ;j-m}Kfxr5+^`DXm&a$r*cCmDHAA($rB# zC5A2!5=GsSbG$LkMvOdF9O9*7CRxkp^Vnq2DGow7HfUysv>{1YfkP9)inR!j#KN8s zEF}YU0_B2-!H67&wlgGZpeTns^NOq|^f)|^vRo?_FK5LGKlWqwiJKzT#vn89)s0vM zBx<1qWmoYW9#-|fRpihCy}B(7c7;Y%lp_V4MIG9wbD_R!+Mm{Cw2L}^j&4P4w{FQ=R*9FYVQrG*8=5W(qFVB%q59Mi2yEH`g7Ahn zfcdT_d1CiYN6!7`*5ku}{J_6{!g$9=o_WL&y7By;|8NiT>u z@@MD3i6wfFKRk!L11e;b| zfla7pCOs|ZQertl`Qw%nOXjjFf#xw?A9Z?0u>`j}YG6Z7a6Eu7b|+1GxoTxbN*qLW z06rY!@2{BWQD`nMdJ=vXx2L& zrH(nxa?(&@ktsDps|z4<5@GS3g0%o6Sfde3)Cq}9a)jV<5}M#7_(=_584Js}0C20a zxt&;<32<0Du`(0juy$evK%hvw5xCl^=n8VUIW8~3Ik{80U|IoVnjj(CXAsK4;EtK89JPI zAS6gu7xZb|ZWW?*CYCNVwNQK@PP>Mm617rO>HsCJ*W3!*D`b6KYa}i;?Su%s6j4^^ z6+Ayx==dmP)_gWn)*Y$R^u|5lMkbU#W^3WROgD<|ldczR!%`|{ zI3v`1m^$?8KI668Xw)ORq6O{6<$=2Oz`h{Djlg5!+aQu>8N87R;fZ$M#X@$W$l>Fk zED%)<5?bzsuYF-aL>p*hiE)msP(7t)js^M>r%UzVerqsGw~wR3f&u`@0SFXsO+iP= z2Fdi;zDb4re#);h-D1xu*nU3SYGoO+UW-S$<_woJiE_Tp@UB&^M5R8+>4}UL4hxl9 ztcKU9;)o?_vS7Owm2F21LF}b?o+BNP(C1sdwAkv<7U~+xp&kta7e+2z7|x-n2LTdb z!oYCBV+ZJ-`#;$JV6XjOh8>Cm+d=b&-Y?N#5qqePs4$fqr`RIO6j+&!n(U~bU>r~1(^+9Rf@{kR z8bdaMf0L=)XZOW~ICm_g6(&TK%Z?e5ZVWn;QY+EY@lmTnmn)Y--BXCG%i;zez2H#< zB!m%#;pa>a1XONiqOXX_(cYZNfyGunJd*1;9`BGcTY>H2OCFhKqgO&be4Ps!+{o!-;`V zt~4FQBAz@$iwj?nnX|b$0h1dZ6YvKyVq(~w&F*k2EF^0V1eH*sFc0!mG!xw83Sblm z*&(EbUVhO*5rf8_#USCM$ZRi#PGsLInGV_o6{eLM<7qU}rm0py5&M}q;oHgGbWn$M zu!6G!VKO=d_h3SFO7XMG_$0phS>mpwD%L}Ycaxp8NkGca1)9!k_?7@1wcQ1>ny zZ~hcGi!XvaQFC0otGeAm-$72Udf$8{IE~9gS?QWxx2rkGEeHT7!L`-cFGrAL>smZG zotN7^8M6nyU?M+{B*3X&P!f4{4tLbK9+O?QQ|`_*iX8!_A=du+;H+`$o1=j9d%Z#at^r>RspM3I&*wo=U#9VW)9R|RW`dVIe3Q19{rtI zt=GEFvS8KUYI%^y1aJx+4$ZE*==7Ze+!o)zCkQ6=SP&X~Ulf?%_*Tz;ip#%%3!e0&4O5BQ3h%T zHVa~)!-ha$6$9-EfnXr6u0kLIiWGgWdugyvsvI_$*8y;XQef+!zvBKe1;DVF6B?y_ zeyR=2Rw){a#l{1tPDhAlRjjmpp3jmag^kB&Ih=(=W=eO_iKIldD8XULL=jRRyoZKy zG){!$dBf9$l%sojdLC39B&L8q^728&L1GHf#`<}ck_pK4l|r8Cw#;@z$9Ya`Ov|$b z6J`=bqie~dgoa*9G>CvxfjOxvaf2vES*2E;8M{2*u1PGO?hQlHf>IY_J+h`}Gisc) zi`fF?R7IXf%aN9=+VW%qa)r=X97H7{oS}F(n`|mnS}HO*tv+JX-kzjt>qGmZEI)%N zYtcJUMouOryryIESZmy{(=%z3^~p=`?I#Ik&I^sQ5{E_>D4TM0BL+3KS~9|knFSkx z@&jQIkTP(7ec#?gV%!L?F*|VAIMG37NQH}#}d^Soj}QjTG!!S6`1=k z1B)FNL;%|%*Il8jYI9g*9v73)Rn=CZ$(6b*u-3p(y*1O)9#b#l(6Em>bfwj*8B{lC zqUBfk|6jqGhP$Px}3qg04?LxNNE@|2OG6fGhDJOGH)7_hD#&_bfJOm z<*op801a#}cLkWG24~^sFBB8UJpWuX!~JNtlA^V81uu}AYJIF7nyYU z4A`{>hPu;6tx~ps;TfFojfL=2CJ;g6XZA{(mN z)%xz{*N*^q6p0;0Vn6ms47qlwY4%D(*@6lb*>4SON3$Rbk)K9jiUU+-wq>|ef!eba zQr4{^V6Dy^yv0iDJ7A0GNPW(dp6&> z)P5e=LcV)9@~wsTGr#!deMxmCNYL1+{p2S!8t2&v%2B1{h?>;1c-`79?OzS;XQ6!` zK>OKM@ujByEb~crNd1@5es)znkoFS}8C-EVNjC*HoUDsuDo>UZ^w`!TNkL1LlJab< z6toFnvPP0EMT+uF!C58U^mB|JZUDJiE!4%RR4dT+4oge1ys9`=|0-%fa@sAFh-S^1 z;`XFC(0V35qf5FOmhH4GBzfP*!b#P|L%ee5F98glXA@H@>wiuml7h*88*OK%Izz|P*SQ7MwDX403R96lyM}J90~O{T5qR)KT#c& z89R!m_8`-T(S7pWX|djO2Xe9%_jB+NeVpo(-lg|-RdkL-{q^ zNEG@)IK=Z!U}loTSkfGYvel85|9|Q}hXKoO-6v;72_tJ2x>!FV@dD<1X-qS^;rg_u zm6QEptv|pk5i6}Wl2G@dK-9=&vz;&u%UQA-nHyj%V8 z>puLr*N=53raLTPIk#<>YM~NLCAc()@M`EjyKpgOF0cFSs(c_2T}9nzm-iv}(0z7Q zzPzj2)_sU(Tu6qz#w1rx&N6CxRBqsckchU!JeSjjbR{M<3w%75?k75Ulpx35?98jA zfh+kYKWa2)w$(5d--(6#^(O7b+Zu((EO}p7^}^{su2gE^#w3}g*_bqLyZj(pjCt{f zt)acytkmVx-MU?4LsIc#(sYsT!%W#`))HU>UcJk4>4+aCVpFToN)mJ`#wAO!AvNlZ zxapLJx(|`CYttqPuzDj(jS5C2f^%5W$V_T2r`(!Uyrzqe>q@wu>c#eORn4aZ-REl? z;D{8yG<2U`0J_|P;I4|7N7_nYg$II1r0~Teg=@{{nIo{hR5YJm7&-#mB8zL0(F+bk zDpzNTK}PS37J(gB?+NsgE7N-}ZLz=Jb5VzCGLrP6uKhJmnh<2aa~x`pcC7 zzX0x3gF7sDt+5Hmg4ttG+LCNds|;a6*5x}`J)+luQ;R!2*d1oT%U5?uXhU=02O48} zsHvBo>1v=XxNWtBk}dZgd7g5I`3G3WIJkM$bp9yWetWR*c&`Ju&!6P_;Y)+{fA?*? zd%rQV(>X}9`D(yzx>$&VJyf_&SNFHv-Tc^6G<)Ci5&*e)ykOz?ZIuGI%-3-JILK+& zarfPuE7NhX)X1%$yI6+46FCcW2yeQma7Q8`Oh{aAl0D>INf$et37R*&ez?rga4b1?1%hJ`9H(vv8pRZ_Obb=k!?dxUN z9;@!y){rwWG4@CB=caXa4V+oNErqsPHhd8gCY}mN3fw+eynz_GPn*t%x=$TguT4ji zk@cnMu1lM@t!?A7)9@m5_FxOR`6_T`Ic3z;2QaC(V<8A~5-gMGSCbBw6 z_96+F$hlYj;B98fe#EH1{;l75|0_TD>fRR~mHJ%$7L_Tl=95Iyn8}bJ_6$+ApgBMqhj#iJ3R+qnT z1^yO_zy06`?s(|KgqnKOTdre%_`tUxpg;YwhZ}D|=m>fI?qgs0jrSBk`>6*v`A2Vi zihuULPd)t5SAI16;;|<_^X{kae)`SdzvKA%H-67LeLnObpL>h_nKR#g$oujaH$Q)S z`**h$uOrS_bF?e*Ertef@pi?`_=jBpYE@UFLg`&Rqb$6xjHufPA5zxCK3{pmM<@1r+1kDtHc6^+p6{@|aUR3>l! joA=%KCF{3;_sMtb@v~2z4h{Z0^W6PE+&l@6E&lu;tOYzK literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..102da658 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1058 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDWlpRPz8OFGk6QF9dO7i7DjYrj/3rcALfOjNch2mD5HAIgXfdtDCAr5tB/cs4Q9op339wa1Blm6FMBnUxYhdLliHE=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "msuloxyKskRjNl5/BUj7gfSBR8W5jVk9" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:54Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "JvqEbFByjmpYPILtnSTQJ2vWkFRu6hZb" + } + } + }, + "signature": "MEQCIAS53WH4wkzyQto5i9r6QTtEE0YLAK8cDV7rnyO2XSuUAiAbjjcMgIn1E4pENEewIYvsm2n3BhTS9v5BshG4U5LUAA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:55Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "miKwcNOj4L9qh7bojmpSd36xeB1RW9Ej" + } + } + }, + "signature": "MEUCIQDqFQdt0g/4DJnugIuE9BVyFbAmPjxbJJyZq7TyorgOWgIgDRtZK9Co1dJidmDJmy7dbZ6h0oxnMxPXDCtv8Dj4W/s=" + } + ] + }, + "header": { + "data_hash": "CqeuhYGODTPxkN5szKUuxLcxXLuVSjRsmbdjvwnaGLg=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_1.block new file mode 100644 index 0000000000000000000000000000000000000000..8fcda2699905f4e1ae1369e874e36ccbca0eef20 GIT binary patch literal 18110 zcmeHP3$PnkdA1#M?Ht>QStqe`X%chEs}YV?Z;6zWeeX)zm3Fmy!Vp%g)#|k?X?La7 zYC6TCP|5&-hNdOFW+1dKFvBoRJ4^`_8k+KGfflAiCZ)86p*)7Bln@|O2t6xZ$=AN| zy*DN#l)0X@BYx6{-^kJ_TkI_>50ca&wc-f<2Y1y6 z{t)@nYxaUKz`u9Gzh7Db&pWtxb>-mWAA9VZ&sn>?KC;`UX4`5@F-@(9e0T-ivjRZQ zYG{^b@r69{`zxpXKRCs3!byUXWRB(tOr~b7faf@ZlnDZ>7j(?!a7^bUEREB&L}sV) zqL~PyZnoG>HzvGG=v6M$uW{23NKQ6woh)~Oa^J&mCqpfZzQ))2;Z8PjMNo#bQ;<)KNAq~Is6z%~!IP5DlD z*~Zh|2{DBi3eObaSXIV)C7G9amzvMOQSN}OmM4Rnk@D(BufZ>tL3OJ zndw&D5C%XE3u9hFUB+EMy@@nd4XLLZC66cOr+M})@fwfw4DJn?0v}CbI>i8jSpVWu zEQWFz&f$DJGcnO@xnJsK$H~g1UI~%WxK_%>m83N&$!bH-Yw9qmk^@Ho(VT88X`wSn zp`8q!8xZ+iGFHxHGWfXP%Jl;T-mfJGOh=aSERRL~C)OZc3J+4ueNFgPSg^?GojGZ{8R{P0Ox6%n0L9`r*(pHH`6G2rs zjU12lnZ;${a3~B_F`g0$4zn4LNe3EKl#a!R$!bwU%h^mE2!XL(kyx@P*(y)q32#zS zur_9UX{Lc%PQ_5PR6UX}1+{TnsA{?-N^0Jn1S*q`NaB+g5XBe27|d2RC6Jp}I&$KH z?;m~HZQnX`m(1Vz@h3ih=ZWi)@k>AR&KLe2^1j~%e_|Zmhum!-Ulze3Y%u7xRmExd zP2^J|1o4^c!GWBmhkQ7_{dx$$I5aZVR^Q5Nnq?z5A=iNCfvX1a3wmoG8s4f+6l2iS zZdLon(bp$dSFncBHtp5dt$|DYLGD~be)N3g(dVBX_TRQeY0*b%vwaq&nK6S!1P;Y` zIv*R-<4TIC7{yH}Ri{rkN*NieEKo`@DX%uAMzu<-Rj=T7tq|+f!{~%1F=cMU%T!os zfh+{llNh>eOBHyz>k1?`;Yoc0Ki#t52GPn-x!9r&lsov87j2iABb1@sbg4L{WFGEp z{su(gd`1k@wo6wfi*T1R z`SnfZELtg*$NMuI08db^hN;n$8*Ya6V)9D0mLZ9>7ovlgpRo&cV*z!N zHO}+^gfumtO=K7b_pyp1L;4#dFU?KrTPzNVOm+NEt#efB@M^|J4jwp#-3riazvXe5h zZQMj@Tob7+LZEjm6X7+7>`1A3)9cSpW&6t{HBPd(I$> zr=6yiF9-7QVV)mIHagFWi<-_iM;M*Rv?Yg1An3WpiMw%K;gbig|R|VL0Uv;sr3b5JYsgO~3`KBc)GAME6u>Lh5IxLxP?X^DTqij$ zH|#=VTy$#=HmcNvm3TM2g{!JPd;|ua-(3N_LE&ytxEmDy5`#iyMeVgU(^>uYF4%T6 zu-y#omzseg`+b6B!G)}az&b19(R^aEpgL_twAcvOJ$Wh34&gql2C^$r! zjlN}T1_Ui~0|Kc~ZVf5B}2uut;* z*9%tfS?7D+xQ4uH4f*+;@0lI^#CJZScD8lG96bFah5C~=K6)D`M%6clPMkp(n%EA;jCoot6Z8)l>jK?6I4UD9INEU-hT5wXa zTAfbFIX10ThHS#!GKIYu&PSle<2+H;@kqEas#=MuJWhF=Q`TQ2ls)^Lk9RSgPn)*V z_*kj~E1uHRLZ8<AC`JOM{dQ6Y%-8T?IaZ{rV^&6PR5z`sH@1` zrpwpJE|Ahps~F-_#iWFq!(Wi|xfsA~=6pDdtfi`kL&U@h&1!1C7!{PX)$3OXVJr{{ zAsnFs@irqwIS3dR$U;)kJ))3~jYN)d5@gEACuO5HD6`F4uH2=v(x4t{=&fHq=aV*i zReoGc);*U?!uMB|R4^OZv^luX1n0BK`%Ksib3U7lcjT&`LC$BB2cov%d^Qk1md#X_l!6B6Wn z*aTiHmT)jCbjMmTZ=tm)LFCI=$I3J&cE^m{103sg;p>*da4XK|>pti6$O_mE41YB^ zpG^ST4GhnD5qL3vZsV(sXEiWf@;=|&1>CO+@3RZIt>3)={|4Ms=YD*eP*$AbG=z4rjvj}ciLdGi6}H3vWp92?rI8e}vF@AcI#?#UC5M6LzD5hUhf zz2F9+QE;820ts+sZ@n8dYny7np^=KCY}*mer;Q;k7NpxfNL^`-*{s`kyB%D+n2$4U zM=_nY;%JTK-1fF3+zJl+#2$?L`h&i$UC@60wt|;{YgGRV3vFZ6gL4sm6Uv%oOVf&j z2K;`(0T#FD6gV`$(w$vl5?r;oLQ)&_`kqf776zKS?L;YXeDMfnOEGOl^)+F*w}ZzR z0nc4@o!v^#Z1%UE?>2Dt>`pFkzT98_ciYaJ*Bh(Yt(|n6Jq@@_=MQ3MHx(|^#r3VP zZee89HEY}Xq5wH}KL5dQ+ba&Pm_5Vg?Vu)Y+u3$)F7|=d>%n0{87TF3ukExo8@U1j z;2_vv3g3Yudlpt}YiF6_oHdvfu+P4k5)*Tf|^6onoY3^yGwo&*)zvQfswYSp4lCz~p1O{Nr4 zurkGZyUMXSk!`@-){-p)PbWKBnVW`kMY%NXPv-eO6oPM(6>riXZl&n}JJBCbB32_C zVxSZ+ThjuOzBFlfytt(0YjO+J6MESxa@}moBed$KHzP|;hfpUnlR6U_26|m#ll%qUDXR~R(9P_GP`Z$+~q!PZJtvR22a7kj~^Sn1;Gz^!7e003EQpk8lBgyFM6{W4@PL)g@xvdbNO$Yy-biG2rYQ7j*rlYfO0iwe?9lxF}ko~KNd3sw|UOJg+!pk|<)(v5hB3uS^eih%U8(#)2H zX4~#mdZna@S_5@R2kG=E&gC#R%PCx_#|_OWYr9X8UH;;>n2=_UWw^kEgz>2nD>2o6 zYn*RH8#*y;6q&-g`YpdSrA|KGio&f+Q~FR1x~To2(K;*4%2R+}pR(AZpHg`W}>ey8?k>g|RGT=tv?JO9ZF{KQ1{yh*z?r1?xP#1P+&xmkgwsC~IUI zQ`?G)&8$+^LJ>WfERPbwmN*FJOx;R5cra9_Ym=%S27z>b(hsAqGR1Op3Mx4(QJGbh zDAl==SVDU^J}c4LplRn|1&R$tkz$d?U08I3B{ynzX&#omz*-kK<4chxG>5~@p2J}k z3r(fEacr!3M!sibZBS$z@ez^0qD_Ww_;oL4GD3P*Y;%o^4r^SB1SgU`R>$Q~S_pSr zUK1EJo2(c6gG!`tk?f?M&+^?;U63bOZ4`nkLzOE9v{7R0615@0L}J;26sgyWOl4Y{ znqp`Sq(RjxxV@x}_P45WSw@!;a9|Oo-i%xendQ|DDv8UG!yDtfWvA#OOhs-%PQpIF zv7ygVVWtL-vDxVS8~(tJi^JFy!|u z+a%3)toAGcvyp>KgB=C-s{%NjQJP%^xB6XQ)$!X1l#+D)7W73aG!EPwzuXOv^wJ3j;?1e zSfgRVN=KNziAWq=-Jj<(=*C*B7bVabx;%7F8P@F3>hUG_vOZ{Vy)tV@>j*xt?GwAF zDT!P>1LO_Q1%GoC{MfJigxTYT>OQ}+0zSI3)IK4*#V$K|i}dUZA9jmf=B32Xda(;~ z;`ZY?r~Vhy``;gY`vV_p{`97wJpA?B52qUciu~=R;2rzGrb6piATK|+QZxrWX67sc zZ(ltyr&RW=K`rCL8ShzJazV(RwR2e>*Z?gTzI4y(pY28N+k5UDZ`lhcxohv)SzZMj zF1i|Zd4fAWr*kf4xkJ6@0NCArW@WECl8pFOLVh*t?)I}=Yq$O@49JNSmz|Uv|M=jF zjS+VZ@k@Sq+$fAuq0z2cFNe(}G*^V;7O-v7oM>{ouA{fx+e^}av8=hKhQ z$628sibihx$V$JOJKs006KLZfP*+hvoM_TLHU2U$Oi16}vxQ@#H^W@#^n3-T`j>0rAr2 zHQs9S$OqNGzvjq?1=*TIyLskapFQ>I)AwW^Y`r@8**6=H-f;7wH+ZbFpWNpN|q+aGyoeDQGP#W60icF^gkGEJnkf(_TPZkRNh@RjQp$i4rl1#RQ zMwM-w)nIa<6zLIT;Q7^as!SE&xhBB^)no=`tUW1Xu@OVzxmAOXOk#ylxfpP(Y#yGE z_jyTm8L>SeB9B~jrCo+ZXTHphqJxK6WxB-ajH zI)S4cPH+U@OpPowUF;Ov>0zuis+Iy&D54e85hZ4K3$j|%vzpqAsZ_TwfKWzvl%!yE zv8iG_=)REijO8kvrdBs!H?mo;RWNb`8e8?hSY(uCg?y`fA1ox*wVVI(A; z!0Ry@H*lOMov9(`iY=Z@;T&I!1aom|C=A9}Y1og@YPk~|v`Pk+2ce=b#MlKgN%~dY zGBZ5hVQ05Rz@~6i#d%sJIox5#Y|>YwLrgf*ilT1=-RK=2Knl9Zs@lB4n@5gm_8 z3f{z>agwc}cE4mQTD%&}7W~>UDU>x`5+yb3j(nw&AyUMs0Yve2uLILrO$*f4nU0+J z+;v|%N4xQDH(h`G$G-N3jCS5v?)b-B-}~_&ehB&cjo=IB!E=y@Oyo`p9KyTZc2iaQ z&5ngUEgsyD-1kbbl(F@I2dDSG62dP6jV!g%v9p?HJIIyDW#CfqvMxM8ukJv@tF@70 zcH7$3YR5c!M|61+ubEBDS-yP*oZ~fe^9u6R70CClSa0@Uw?%2*LutLaj?&bS#e)Ke z;yjZL_n2WRPL|C47L=-!7aFCkjF)C8rP=tnGNA{RQln8V5l$r+HmVppN>I46YQxJk zCNw}A0_j-{-9$qbc)8^Y6h7i9eFT5qqE`md%1^lPtPB(lV#14#ORgf6rQKv9KcQtF zu58`{L=t>T#27~@Rv`Go-Lgy!*GFsc(8B2itf+~7sH zN?H8cqOy)wTIGq()CRx{l*<@Bcy`0Bu%1nSd=1rrApAaq&vb{;ipcrHC27E<=v;^$ z*g6^(wNN&!Oa|4oHWadEPqt+=qfDwKSB+N2$%O7N1Eo?(m!yDPOtYm1$I4hrtvZFV zQI!e%Szt|c4ZJo*buLePi!UH_-6nLJAw-qJz2)336NH#gz)N%~Z}pN;85a|N0?)g! zjPOtJ?z90hM02{R10~u|XQ@ij8Ikrd)6rUOa>8cywqLQMiWnBgW5OR+`=n3MPoIgD z1e*jB&gs=*4l|lUoCw&t1ThFWmPYaYMm*vq8$uZqh*+zux2ej6=#U)Kx2j!VST1#X zOtp;x0qsqy12h)yiKRMTsz=A;P@$7c*a19p7Wl7xWLt!#CJ#-KwjhEZOMxrsGbP7xKN!Unq47BPge zfI3Q>r}=%R1t(`Yu@-rdxHykOC>%~>QOD^H<%mwruK`_iSW=G>#a?mTNQskvJkv`i zv^YlQnX1pXWYO=aG!stY1EXnc0xW@BwQ()@535+HiXJrM6E`0PeRyvl0S_Xsgz-9nFLb!wxU))U2D2tujTJ zNAld~F-3Q;F+O*$Ah)a_&#W>&)6?JBHk{5Ir!hW4E;h-_w9&U3O_PwhN}IJ~p)KL` zi?JW&cFOo{G5lF$e43~8vu9#_wixb+@xdHlFESQJS~q8A13nBJbes~4Qk8;~uZ;yE zPWP%@FgQt)9NajL*d{)dtEd*Bcp@Ciz<{1?;eHYiQvP7da5XXF=x&PLHjJJ{(a)dp zsS{R8WfY3`Th(-mY1Z2HvQ7%TRvzUhp@csXqRLHE>4h}>^qDx_!-DB1Hp_Pc1Y>4v zrNp2wkoBU>k#Mdh9D-!pH;_63S@g#k zp&t)ds!UYQB$8UGmx#J&-Nf#O^%3adFiRG7B8b%nWji{Nhw<^&P3zAQ%3gZbXS^HM zr^(n!VklLC9f|8np~GtiZ#y}smG6WJXAm7!dxdtpFE_&ZM9h~#ofsX+$D@{}j)tk` zpry#Iy31Fn7Lbx`BOl=7`Iv-Sz30jL>;^DfSs%`(D)F+}C&S{1NoZ;|9}<+L-R_h~ zVJMJM0SnT;NRt&p90ZIDWFaQ#V=|Wv4@8dbN2$1(jmc)ETTIj|nPQ7hOWkUqrZ;~2 ztWVNxm-%5ORvo)s48FlC#rzTgZm65w)h5;l?~lsGe9jE}*d)`z68zAzdId2~j|VgtV3hP|cj5S(*&k{I*lW7OJYYDk+353D1o};RM zR_hb(j@lx|@`$65%fZY2$cTi4=$he$5~EavHDG=uhr&#JKMH!H8|{1f-qX_bUTiAM*Fpq0KW__ zQ@uOPHO)aA_C7(SVdS~1It^t=!pXB`E%bodux2?Q&z9kf= zv6E`k(SXx*bs%>3P~kM4-QU{m76xWjv$yRp1dz@Bc>}*~tq8biI)?MdL64eFf7`h^ zTRN6s2@aD=SE)AJ&3;pJkc$ui4uS&(?2Rb0Z)UZ!vQB1SjGPapgpj^on{*p(W=qQ4 zX02d@&5TJtfgFL&fEj^(bYX521{bB9bxj?sZEYh}eHn5L*0^93f4!mFYc`!g&Tc(h znvhSN@JRBhm>9YL1oD>Sb8RscL?Zut(elH`Rwa#}J%&7R4Ed{L^Yb1B{+Vq#?koj4 zZY?vDjEIHUu%#vYjFby8<3X*8g_Ci(b4o!qK(EmiJ zvZ-u(rkV!3l}*o7(_pu<>6yY2K<(fbLGtO!MS`s+0-+$CO(yVGH4%*kis^P9tM|u| z7$`BegR&N0Dd%M-R#z!|G@;3yoyu36WiF8s6E(Oewq@HSk})GKbCW900Vb z5eBU$glS?6@G@IwOZ0O}Y+>DLVheol=jGt+KCuOOnJue{Euu?%3RqE0(Qbd5bF+SB zv;xycrhXI34yBpw(DR>QLpp$4lyRBR)ioE+5$o=pCkR&{aXdGag%lHv#=}t`9p#6G zJ`f_Mv}nT&k#UrO(`X#?#o188Ow}fi9TMwlrKkmhx<6JNMEwo1>(5xao$M3-K$WSC z$_@s6$?T|up{_E)Gpp29Y?|CM%|}tns~ThpZ4<;axo3kKo`bn74wO@hd4_Odx(*)O zsP<)em@EUcWZaY|VwTVh0T+9YfcY;B9dAYOp)xkJZ3l0He4-W^kWoBTXPKIpF=NGo z)YuMh&5qGwc1)h+M5>+82|17yuvTMS2PTtbnc0pZaO))xf~px+Q>~)>kRtH5##_^z?}K{SAb)1 z!{TN1Nt)BQo73&1gB+Y0yr>(FQ{aN>POYG{n{b=$rA3`-12fwTM#MmX5de z4pi+lOaws=f;BPu>^_!H0pLB*j@@q#OgIG)a5OhfomwxQ+g=4OnO=uSYOFP$>)Qjh zKd?3ADAW!;1OHqwH`lE&O3$MMEtydeJW{f~|GmtBGU z-Fe`B3t&r%_VviGY|b&wKnb?5^P`)@5P)-kK9(dpK zhxa4*?%&+UyY|CQeslkNFSo#gc}KgZ<9B{h8}DVlLfx|j_LiS%!t9QuCSHD#mj}D2 z*V@x-t$n`%IUy?FYX9KNm)>=Q`g@n$cJJd?f9k>8-}jR%&$|bqQF7sAKK_cF@SQh2 z{{D9^WsS-gAOBM3iSO0l{^a?EN3-v_@}EZEU3kTH7n{WG?byX1YF+cK_kHKPZ+PtH zOMmh0=id15pa0(BBgbC-CkTU53n$$V{PR-}IA&bFJoS!uejod@cUgb@M(`gWdieF9 zJXQL&&j@c_I7$8On=|)+`>h{)lzM#GeC?rU?)k(w9{SM}H{Z}NU!MA-<9DbCi_!~M z?EA>mr_MR>SmbN$(|=w%aMjYMl#kw*x#w1G@s`glOYgdSacSWs_ivy6!=oMdmwt;F zp7ZW&ulk$+I{BK%-~EkqPyP7%-?{dy525!he_#pRxdZ@MfS=cZQ8VPcf3gVnzI(Cv z-HW~NUOfAEFB%uz`=-~$DeJw}55DtL^5;IvfAjMKV}A87*C6>DN1k~9g||Mv@734b zdf*H9{{8p=`mPTYj)jj)SAO@=n#|q(*uqKezPDX*Sw^CN^q~CAo5D{&`QTS>xaO(5 aKl@hV_@T!h`JazJ4LlewfPK^7bN&zX{5IkM literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..c918b118 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,998 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEMCIFU5H1NO7l3onZIHUGpa0ujTT+rzZo/vDVbXUJkny3jwAh9cF21CiWw4F6JrO+mc7vBd24EbKY8FfuHO8wwOEyis", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "UWHpbPfWG5B8Y6AZhaPoLr+8iZz+Jwmh" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:26:03Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "7308vAclg9Mc1pEVaAxBVlGaqdt4ZxYh" + } + } + }, + "signature": "MEQCIHee1fa6c205VB5LkZL1Mq+TbqtfCuaizUC4Klh/wk6IAiBEvoZPqeyIs9dE6BptOgv/obXjzPvqgXx0WR5LqhWLYw==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:26:03Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "yFzTA2V+jIBgibPd0U9lCdiLyoSbtPqi" + } + } + }, + "signature": "MEUCIQCu/SoDBNs23Uf9sFgELQe/YbGnT6GEZQaCwhpSk5UGBwIgSeDAqBBvdz6WQnYDlDwtvesgLOiU4wUq/GCYPNzMMKc=" + } + ] + }, + "header": { + "data_hash": "MmGAggfMOWTvPMD6pU45rWrMye0CuDQlXB2QYOIqpM8=", + "number": "2", + "previous_hash": "fqnNQmqNZR0Ez1x3R0wS9iIGl3z8Kp+mzQ5KggGFQxM=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgIIAw==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block new file mode 100644 index 0000000000000000000000000000000000000000..c16fc72a5342f9a105f7e5716eed164c3404a275 GIT binary patch literal 4707 zcmeH~dz2IP701~Hmi5O=0vsR(i7OQ)K$1x&JE5+1UU|=CXYvjlAel@aljr6&lYj~W z78Q%4ShX%ns|!AgbV02sa1=@{Skx+L0fl2L9yx*{kKz%qlUnXMMPjk-XcjnIh z-I?E=-*@ik0&{bJh3c9y-Z7sy{`J|L#yoX+#N0PFEM*EOp1$%(`^v6mlWs;F807m? zuu;bw5j~GUTo^Jy1{g6SeAsA=z~PuS!gDc0)G%Y1Vu%9FNhf1GSLM>Y;@u{&sR;~n z72-O|-L6>IG_C%_NQ;eD;Uw#^nQb`gA$zQVve|G)4ad=_C60IC`C%=^BBHhTCIo?nu#iQUkEF1QoC8jBW_*UA zUnfQ^UO6A85@k+_q!_eb$T*HN7qd^G3`a0=l*|!DrWn=mAkG&pcpSm}9sX*JP}T2 zxm=Vd_*gQVEG2VUbFM&D<$4E}H8eLU2J%u~3n}~SrfZ=o;JSJw+1l9LPd*xygB4d? ztc@2>Ah}T9)L^F-PGIkuJx88ALl@H;wP9UU3rDnYYt)4B^1+3XSQKvM^q@>1a{Y^LQFJ-%;kX z9IsqE0F0iK%;eKaE?JtBE5zsY)%{QV*8_ZbtO#Gnuf6)ksfWw&Z-|flV#BiRmiy07 zMbEcQ?ee`ix$g7C`TI}ZIIl&$RPo?_*F=sEo_KuZ=wqJetjo9i2j;Tl4k`$sdh3db z&1;4~)wVJ?tAE$tn-|&J_EY1p86UlK=$YHLzO!ksQuWAG*Sa;eVVjoi?N~DJt1oA~ zr^~q;C%-EGbnu!*zZMp+s7JZn(aI{{7M0b{@}F|I+x-wVPirb*>9h2BoTb-+XeH3Ku{A zTZ`>aPjvirEk7c&f8(yuI9vBe8rqZ0cr)?vw3im{PA)CKOD;Ka@c8WYO{pWR z?&(~xa>?r>pH!+&oDZLU?A(-HT?@}BrQfSN9c!kfUpl+}?FSOmpjrJke^`(5(Ta%+ z*@LH-jZHs(LuyOYkh2!U=mW2fdHju~hwuF3^aER!Dwf${+J@Zf&8;5maL@n6XV2gF z<%H`$9rw%M-MhD3tghA6qg?I{C{+)Qg7z2Be=zds<|*OzhdxpNR&#^Zap?KEJI}1& zcGYo9lTtNTc=iM3#y#_9uHDpcdBc_g+%b9$JN(U;H-EM4h>z!%D*HFT*3dHYQdCq9 zgr;k!YZd33K=&oY*mYTAwAYD|GxiZ9L&JJ|gg1NClD#8AM9Y*($od7;fyLt;iIm`K zXJmR1uv(q6!2gO_eUt?*!K@I4alM$8pcol5vy>Z7^A>Z7vq))YhOR_BBu8Pn9v>M4 zJwb>pgKu|4d9$dMTpmS13j+;xb0b_~|4? zRt))l)k|rSltR5W9F`H3lVs@q?zEU?g=nrMv8*v$1m=Rxh(@b)nkIdsHmB2 zcql@8V6WGTN*x(8ZxxGKCMO|*2x85)<^_whoN|>D?U)h38ND+}Gn!1tcc;ZVEQ0@s z7VEGG}T9VOxWDrgU&DCI_=I!Mh~6PsKOhr zZJz*Q%O3g-v|2p1c&A+$b>z^@IWy*to!^=WzCA;^Y7n@45CEXDxlu7d{vW6~-=pl6 zO#rwGQNF+z>K)fk63&{@n{Cx-MW;7qk4n@OPYmJ`hv+9^_mh2RD4gMW(uzt^yMN6-y z2~uKZ-Lh#eBkLOf<|hi1KVy^yt9Dr2l);3?NejU73nwCJMYT2*vtd-yA!W5rf6kY7 zR*--c3Fruek@q=`VWg1vdAMl2o##3bj>wm2U~t8YVLL74OvuYgfL2$E0oF>S*&;{bSZh@ZgwZ5gtlBM6ZJ`v%gn3g$ z-|o}!6+0c|<1E8+?V_X(NCHD(QUWl{WjehZC(PWjjx!a9ubJgC9W!@7vfHGchE%Rs zShQs0)%^~&J-ukj*yH(aM_msSt8cmEgFVl*oF*5Jy>;KKw?SR!7Bs5RdnPUzw&LfH ne$iz!;p)~;Z~O7jit#%dPWo?eyvyL2y#>@|*a-Udj067x&i6@9 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..79b58a70 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "54XRg423soCyYJLplYNInQT/tOnuCw2y" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIHIOVdh/1Z22WaEq6u5e9AYx7TaBwdpDH70786FTwR/EAiAoTZ18vsYkQwbGvPZV8ua13NtPsg1JUdSL9MgkJ49JOA==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "CiIKIOLuczUoZaghuSzmdd2zZxPys4xuvpT+LEH+PSymVrknCiIKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEkQKINEJHwinD6o9lVlcA6bWfYNKPdtNHCMcZIoN+IK/1LrWGiCcLE+up3oOuozWcYV7+/k62DFvUwInwnc/C6eDo2qEkhJECiDi7nM1KGWoIbks5nXds2cT8rOMbr6U/ixB/j0spla5JxogaVLt4CLLrpWeG0qg2tR+hbyeHk6djfzwiFB5NIgLvnUSRAogGTRTTnLLpL7fAXOdcN0Vw8rxb3nZApkmvcx0na5aTTQaIAjafEXLIEN35+QiSc2lcT+oZRFt27TLWhlJsuW0OKarEkQKIPbc0GiaLbuBzmmIdddFhfPf8V6wBmvqnpCdgJWFzBOpGiDz/mH8oP0qy6aB+Bp4xSudS6cqbLv8xNOWaC0yXAC94hJECiDlkh+BUt/2jBhspDxrvgYM/Ec0FdzIF6TPiOaKyS7cvxogUlHGOcM4f1VvoRhLU3yX77aT+R0p7BmbuJHWdXN5qC8SRAogpf6U9T57IiuIEpiTI2LtCx/xExXuVLVIj8RXBW9uGd8aIJkUMttz/t4T7b0qYbDg6SuxLzxIS+C2YMr4sMMe8UcG", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "sr/W7bD4sHsxdWTL/5g99d8RB0G3VMYOy84HKpplYFY=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:26:12.136466400Z", + "tls_cert_hash": null, + "tx_id": "b65b3fc86442524dae6b623c3709a61e683e82ca24245868ea66b5af0becf4d4", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "54XRg423soCyYJLplYNInQT/tOnuCw2y" + } + } + }, + "signature": "MEQCIH2RbUSgw5BcJzWPK68RXqxTDDlCYM4H/o+/LYqcFQ0dAiBDASZQHQpmjJmtMqF39YTKSmoU6uBbXzpgGHw3aFnTOg==" + } + ] + }, + "header": { + "data_hash": "WT5LhAN+PVVzLC4BlGrv0ZP9qWlhlgydPJ5aoVtrzmw=", + "number": "3", + "previous_hash": "IxdVF/AC469AF6rmEWDPs4hRcvOrEOpQlaaMJH04S7Q=" + }, + "metadata": { + "metadata": [ + "CgoKAggCEgQKAggFEv4GCrIGCpUGCgpPcmRlcmVyTVNQEoYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KEhg+HVvGrmM5cw+nXE857kaynM45MC04dikSRzBFAiEA4D2rg4UY8XDD7U+aRKF+id7VrCL2RYEYf9rCgjKm/YACIEGQH4AOko6f8qZJOUMrN+yCJYdzZ4kB9FeGAos0S16+", + "CgIIAg==", + "", + "CgIIBQ==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block new file mode 100644 index 0000000000000000000000000000000000000000..b99c8b645a64869408d9159a73f9c031d4484241 GIT binary patch literal 4709 zcmeH~dz2IP7020SS(YD915}7B#KjiM0+~$S9I4JLlSwj@&1CY_0+Y#P@=i9{WRm!( z)`A>_YE@bh!51&_9HgLD(ZvVU2dH3GEb=S@RVr9&<*XHHC%Y`A)>CThpXQv&@64V1 zyEDH#zwg}71-6zZmB#ad{)2lb^Sj<0GO2OuHMoy`{rF`I7e`NLKU{(g{AAn^wdMeK z$Gk><){4{C#cy2k+0j@0V-_zT(sTy;{_M`9Pp+eSu8#Y9#t7KJ#U&5G%%*XVhRNsI}6#H=%zEe0!Z(ebb-nyrx4 zXf^1gg4L?C8U(>)HNnP6R1hGGC_)CKV1^=5quDrfgld=y%tSMuS25u#a(Z11}Xj-z2TOzQHH6k1ktAXHr$zabRR z$q~}0!IQZRlvj6P^Jqr zdMY-%D0KJ?4DTqUb3u$LGnkoy^+dZVK{5skNuV;|7z-m+F|Wf|@=#=#8MkISEL z57=X2cOXT$*nC76mEzK@S)h0K6Ab?EicpPP=6c}qk^V^w4>LV`M@a?e3g+{TH9l{Jk#c zZJhj)eD%;Zw?2~m*&k`YVgj>#@tHp_=%^YN z4Bb+yM;UMMGKC#0w;XIJF3;~DyLJ1iTy;<5(jRoc-nD#vm^P?2E$`nz?9gEHACI(A zZ>;LPdaZa#X73X_!sDrpN1w2)eykql^uAs3`=&p8%bSS>rT2(=pB_9ldqZ>T_=-E1 z-@Ihr>!Tl4Yd$^8pLy`hsXJER(xa~YwtcyC&D8X>XSTil%lLHox&hsX>rsy0HSreq z;ORx<(krh@ZD}5MhBS=b_v)o9cP==#@UyyF&&$@WmY?`?4~=trZ}`0b zlzd;PU*HxIa@VM~*6l3Bx!-1S`d7mJSjMPY$@V9TowZKE$lMfD(f z1~dawooxmiFCfO%7bQkVofrjEKQVd)y|0$DQb9v1$HR=HJ%N}yYDvV2N>XP$m2`J_ z6naRawK`>i{}r?PDGOYHSz#I#`YC#TfI!;-FL1MFxcqGH*1(+$*9!SO%j8gE^MaZli z4*07V(jrj__t`L`f}lcGf!=RUi=}AP(4HVIP%S3{xvLWLI%-8!!b=cW3#OfsfH@L3 zA$DEP9ZnKhP#ey{f@H{w)tn<{rlY8*(;=l(9feqig9YHT=`(E9W{3H2PK$L|1pf~$ z)?pDSJqXUq3N0d(sv!PBiobGaE(OfLRvKFJEE9r9k^E8Ks^(ohXB1IA+8m}0zscG6$&A!}z z@6DI?OlMx}Ze8~vbkCF@Z$8mIVW<3V#NMc}E$#^M^WTcho4ftM>EFEg?g%?{qG!(w z^KN?UcG)y{|DRMg2yfKrcTFBQ`-NlP5fg%>dFPQd8bix z-S6&xvd2E^lB+lT?Sa>-*ljQE9;@4aKXKKp_@v`4wdTv!D+Ytbg8=}IEsd%s<-g^e zw3jpk;4VbPf>@}xg!3;daGX;F9`W`IoK?2E&Bo%cn#q?nYa!X?OF5zy`aHe&w}d?R zZMTFr9P#$Igc$slP0tFl?OZ=a$i`&I+b4eTPxb%zqE`B?^O^=I^36qkp{7Bvs98uR z`$UZs6;=^0n-(&Pu(7Xxqfq5LMw4i@ll0OCDCGGRv`3PCB9PB<%B$Q8)> z)2^~5ScwF6xWOd)T_)aA$on}VDs_lLr$xZ?T?{a|r6TWOl6fnXblTi`tix?F2AobO zTF%AYxpoZAg)Mn9$#JNQMhv}O9p2Z~)w_E;kZ^>qXWq`zC=#;}ND@J4tk~;F$(|IA zIT4DEn)F^PTV_gCI9Tp75ke?uDW!r**ar-Oc7v_p#~heekg^#!jpWGwWuZza1QHOM z@L&{DB&(#OJxUmCMpLIHg&K}MlMS1`ki z)`-5tuNBJHN_()9^x$YE4m_TVw0incbGNNqykOeQRg*T3BQ3~_QkdVi z^y8_jK4~v~rTtWocH##8##Pr|9^XZ;dF^r%YHs{wIH=385e(=ZTmAt?Vny@- literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..866a36cf --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "m0yfrw9WI4riTvjbEC1aSy/kcu3hQuUC" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQCzBCyZINxv3VOAF/gtTsm9HKqgMJQoXbrtvR7Pd9ViSAIgRo1QWWGG0WKFYMre9rfB1Q5IMO342cCFftGLdzZg3es=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "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", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "HDQQ5M5l/sJx0BJiBvTGOTFSVFG2Ik1Vo9Zu4h+7oqU=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:26:14.874628900Z", + "tls_cert_hash": null, + "tx_id": "3a86efcab7147849a81a2ee79095943dc99194cc69625bdcc08ee045c70bd575", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "m0yfrw9WI4riTvjbEC1aSy/kcu3hQuUC" + } + } + }, + "signature": "MEQCIDPQJxhewOZTDh5YRzfP5Bwv7gGLuPiudSgP2dyQw9nUAiBc0pO1+EgQET+w+p/JeUOHwtYVMcqcRTw9aCPqCHoGHQ==" + } + ] + }, + "header": { + "data_hash": "3lSPhQJhPZ72OY3NIfXlx1YUjZ0JBPwwJV5x5bWmFoM=", + "number": "4", + "previous_hash": "UeMz45gnYdDOCSMCKkBEVVLM6huKjWT2buiVQQPvGAk=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgIICA==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block new file mode 100644 index 0000000000000000000000000000000000000000..91da34ee28a9268a071537bdc9ba42342662b83e GIT binary patch literal 5711 zcmeI03#{AJ8OM8XZ*T8TTM8*vX$Ir&_Q4>cah!KmQ2ol=PVD&RHP+5?94C%rCvg%x zVH@kVqEgX~ZFC)vA{Z^tm9dI41bx705!-l48=_R*TG$E$30Q^724ZE-y}jKn6xssP zG>J%w<>N2M-}!R>`TzWZz|b_y@bfP8)qG*@!YxmX*avpoudFZL@NlfW`=NK|-i6P5 zCG58j|7HJO56r*j&R_FipS9uemA|_8<+u74J$muVZPdX<#y8#sq~&i5!AlFl`i0=x z=|CHrYMnW>cE^!J)6V|Ek$c|mADNwRX=O#wG`_?siXdOIJkLXU4=fb&5T7sl9iE~e z_79(3 zpdytrXJWAmRmunDYTg-XacRN`NXY2;HJ-&&=Cv{!1bj8n%EEFt3;T>9i)6+FRF(+( zJGm~=%4JHWd^>Kveaau$O71wC3U>ATWXhBT$q3L?M zQ;O2vraxYfgxG`|aR%f%O?5k&MyL~0DVIW_d|Q!1flj(1xnc@!w^39M$Ub)scFT2} zKUJ?rDT*XC9T&}dFi--aLv|FQaYPgl6486hDiAt>+I1Qu5k!ybSsa*w5{l7!SVct6 z+l(dfTv{`*Mmw$w6&dRW6QXSA8eWceQ=JZKck@lmMv2Ea6*#u5@T55-Lx)R9r0T#W ze>GM{6^Ny1w4-}bK`PrbMp{U^m0DU+u~De%<+E<2j0S*1^7;KGyB4j6i4@#+8LW@# zdU(>#yWRE>6T`(uO)62%lz7=?U~Kmj6#h{~Sk61J`S!=U;^Q}8dS381X9qU#@m;ZR zo#*y94q6^PAM7|Ee4(!~A%3B+FZA^}>+9fLPz4oGKGD#uSuh_{tJQK7D{*CoR|^6z z6w6AvSymOWY^cvNO)zQ@Y@O;@0>PJnul2rej`j~tG2eaG8I~^{cf;c+uxX9U`z&vs z3tk@t!|Q?dnmG$-Nt|SoREpy9O}^RcLYruE~u@SuX|)CS5#X z0!)= z?|7=Y@xC1CGB?lEUfetTpDW#X=_9M2DX(e0K&*cIz~L454_02k<+_dEUBCLNId@OQ z9s0?ItC$1tTzj6pX<23G;LP`fuDSc4oVV%OHLtAw-ID#gCgL_9z5dAMSB}`$SbqM~ z1^G8-TzGiS+&9^6p&#u|Pg9lo2YPYVlP2HWw3gFOe&95dAB#JULt9;BK?w*mXIha ziuF=OiYI83QzW$8<2mqYfo_85z$Bo{ktjb7bS08DfmR`tZdnKhntafZV^yl1X9=D} z)v*{8IN2;rw7|&&5h0*MMw~?;5-0RHPMAlOGsimSShvTg6Jvl3ss`3YBICrHWf3{W zk_@R6;}{tx^ctQ`n|NtLaK0*+NG7WXkTH%85xRplm*5f^B~r>)sTvPcZIXs`%mg+Q zbYq0h=(%*NGnq>XBR4*VxlP#R4HK`=oJ$o(DyU6^VLXZk0*$Z-DRd~AB2qe}I-E@e z;oCTt%M+}7bTot*^(s*d>6${ThA)%%g%od13dUNMc&n5^J-}Uc#>y0Juh!3;OM6%f zJ`0!juoRe2J2<18T#AH6s+m-{fDxA5FrGtIM~0z2Sji}rogIas?WuC1h7tLc-(W>7 zjC4Fz!&wA+32CcRI~Fciv|`-H6seAlh}cA(@v0Im=iQ#N_(@C}goysHPC0s!`s%%w z$CvH>qx(>)tSF9()go_J{(pSte;{$a>^73|;n^ip=;Kw{lfE0lTre(_jo zdFi$p+cfO&5Ax4h{(W44V}B-REhbOrd4!2crw zc0QE=TZMwlRu1~0t||b%X=Ia;u7-+u3u3z&Ihs#<^Cb@wa;Wi~L|_?vPK9~Vr3f80 zQuLAql&(iaxsqrUt1Qfe(SWnc6apcb`-}oCqDqtxa5!OC^08>3T#$=d5u->UYb3j_ zkUiwWv*jvRcL~Vx2g8pDFv*2wNOQ_i%;}I(qL$2H92xI;M7*nKU`~jaGA!g3U8RUA zK%ySCi9xxT1+#H&+TeTv3RORvS`j(iG7j)0}$RnJY&NnyJowe zeqv_*;G+AEE=b1qyuaoH&!Y8v1~&WVCvVx(KRj>OKW<&OcbjGLla76>S7%}y?)=vc z#hV^E^t0@18ytqXZAyT);>_$yXubY$W7YdHQ%1Pt$X!>E!K1QJ{#;G zj(w$7oOxj1$ie&1T7xYfffIYT9K7m5@Akmfu5Y{LobA?))4{dV0Ra6&{gwgqbH*`g zuQwSr-Y5tSq0ys-t54~$IBPm=J~`pAjOjIj0E5T6o>9eXhxFKJB~mcR6Mm0g_lILY z@9s|kN0JlW9}NDG>oB|?IMzBLbhnf}=Dy&+_IvuGHd`ylO% z+*NVHU`*#^WWH)TEB4|4DAWWAGKhBS!6fPOBO(z573G3b^8;#ziQp=7*$cAYQ`~ai2RKjYiS7 zT8gVS3{`W!T2NwHG)5w>u?7x4-oWWK@f{>Ut78us)3W-IL zFj??8lYXX6wK{O7-SiNAR`sgd}Lw z5Vc?@7_k)ySHSJ5`?8|~l#WF`fU>o<3=_g-M&n5g^>&O5hm;Ym6A2ceMl)081b^O{ zNZEyUgvtscLo<9rH*6V0qH)wH0h&HVSEsP)y*r-C-8Q;?_U;wW&;RF+r5D}2>G|uv z<+F@Qn@j&T9$}vG|MJm$hAyU7Ua{oG@BHVk73md8r=2$!_!{b{oXlik@wH9 m?~UKG^>C~B{Rf1t7qoBO^}}!8iEuZ(1$rv%2UEt5GyVg(fMW&# literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..acae687e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,170 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "36WjwXpnw5wtGEe3EEalxThc2o02o+3g" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQD+J2/nqxLDPNjTNeVodm8VBiKpgfniRjw+UOEgRAONsAIgMBp/Mjm+zTpU2gRQjcxebhfaosFoQGihC7VzQ+i2Y9A=" + }, + { + "endorser": "CgdPcmcyTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRYzNVem85SVg0a29hMk5KK2lBNlB6akFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN5CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUV1ZGQ0K2lHODB6b2UKd3R4WVNKenNCZ0R1MFR6WGxLYlc3Ymg2QUgxb09aakVDWC9abzJjZzRuZXlvSmY3TWRCUXFKZ2xrUHJmbVQyYwpVRjNtUmRGSDJhTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnU2FJbDBzM2wwTDMxbEJFcFNYQ2FNT3k2Z0R6d1gyYWVPaFhUMDdnNGhKZ0NJRXFLL2dYSQo3c0k4K25ZcTcybHRMbkJvZldSUjg1NHRqTE9WcE1UQloza0wKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "signature": "MEQCIAuXu78PNc3GDHHgJa7+I1NMxfyI/zYllcUEpTgZU56tAiAXv/Cgjdi1EibIMdqFhVhMl6f4mWabu+WWWemXMXK+kQ==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIAwomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAMKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggDCiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIAw==", + "pvt_rwset_hash": null + }, + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIBAomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAQKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggECiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIBA==", + "pvt_rwset_hash": null + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + }, + { + "key": "namespaces/metadata/exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "namespaces/fields/exp02/Collections", + "value": "EgA=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/EndorsementInfo", + "value": "Eg0KAzEuMBABGgRlc2Nj" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/Sequence", + "value": "CAE=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/ValidationInfo", + "value": "EjIKBHZzY2MSKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==" + }, + { + "is_delete": false, + "key": "namespaces/metadata/exp02", + "value": "ChNDaGFpbmNvZGVEZWZpbml0aW9uEghTZXF1ZW5jZRIPRW5kb3JzZW1lbnRJbmZvEg5WYWxpZGF0aW9uSW5mbxILQ29sbGVjdGlvbnM=" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "lQoaiRMjcEsrPJCBjLIN6ZRAAsR0jdQF2f/1go3cDVA=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "Q29tbWl0Q2hhaW5jb2RlRGVmaW5pdGlvbg==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEAB" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:26:18.778746500Z", + "tls_cert_hash": null, + "tx_id": "bc0b62edb0cbf916f927f31a7733e18179c165b07c98ae8242e36f02d21f0bb7", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "36WjwXpnw5wtGEe3EEalxThc2o02o+3g" + } + } + }, + "signature": "MEUCIQD+Cr6rNg+4xYq0aNiBplkim3MGiX0DtXqG360aFNjPRwIgTB51Zgzf2iLgsA6IQyYiMlDYreB/tje8RrJ6OLwSEbw=" + } + ] + }, + "header": { + "data_hash": "3tyotBmJp7FjWw2X8Xuvq+LvASXAKV+1TuAleF3uCk0=", + "number": "5", + "previous_hash": "1TRC52JkFSStxiIvBMQve3Eml7pMacS4+RWoRBfmSTk=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgIICw==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_6.block new file mode 100644 index 0000000000000000000000000000000000000000..9034cf48369474a0054a6a3e641853ba3136ff83 GIT binary patch literal 4059 zcmeH~d#oc>9mn_Hg}dd1>|#L{uRQMV$_jhk?esByU|{#m%$e!yOgnR@&&aOR>2%uZ zbo!XKGgD%MMnu^lgg|0YHyV%_BZNRmc)HQu>~8RZppk&01Ouos5duQO3UPXS@47)E zqWnq!=xKlFH>cI$jXLWGlKpghaL5(@E6knOx@qMd9iJeJxv&p-z=n&XXjX&TepHlC!&^%yAW zl!XP$riBVq6a)_0>0)7mB<$5}dNi8C86m`4a;Z92I%KaRp%SKq*|8nWgF=WMrBKza zlt^7J^LlN9@)#1chaJpSLQbz*A_*+U?d0r77>24+RW8`8wW+aJ1I5X9ijhhwXxF%c zSC7OHvuzvMmE>B*X(*hkJ_7}X5j2Rpj3rq0fC@C#;%F^SmHH*OnGq(#M6RDsN_i57 zS)(uT6Sq7_y4fxtF?mWEn|hLUO9MTUHHE-3&sTvFCwn2%=r1RV{Z5AGF|uq%^XefI zc_<_U6ciY!sSrbZdaOFK5f!in8bfGj>jhzsWYM||M$99X*X zXm1-Rz9iia|FHYvh&+~_+oxBcujPJ5Gk2>&|^;J(vfeb@WKIz5H8 z5?zP2z?0#0O=YEJC*5x{^$||!W=V$`O4Ityww}ui-o>p`lPTc9|4O)Zz=6{USH+Yv zBU}>;9^p;ALK-T^4i(NZvK@Y0laPX`?rM%lV5t&9BklgJKA z-Vq|2Xr`OB4&PHk{1^*_O?w3M$e%^FXje-`_jFJrr#g$#q(^_n@%+XI2em2c_3qFS z#i(fkc94p~y2~3pD%wOh7#>2Xj2XIGLlRjiB%#yqpkC6pOrh(<%e8pYjP-ObJ8I`f z%{&zaWG9?$@j{@}|KOmWavJ+l@U2(Q`^#JVJ~6*!C{Ol3 zyZFr8pStFIuRXHiL1sA?&{Zn`sl^a?flFWZzlaL!OSl$?EL)m_Z4pDcI2PU zzwrHwj^n3y^lwRI_Y~~Azi{vdJ~6-a$<2k=AH8GK8@qkyLSy?KU%Vc_dUV&vzw@mJ zn8$zo)UKb!7Y}U$H*Nv|%=_m3XL#?M*Q9;h0sy%|T^*={sT=>w`wEBDy8ECW~8-8db3SJR7%&8}HlWRrSjP5j_r z>i_RW?OEMZng$g7;G#ZV(_mH9B4KkgQ8UO9J>iOm((!~%zx$4&yn76Dl-uW4a3ldW z!~vRK`(mRcBvOz{QMi?HOd?zA7LDvUUUq8bAQOqI#cWiL4|+vOscU&v>BkkOH{?Mi zr&)5E*Lw*<&#<{3ozKO|QYMq3#@%MFyG&EvYP`qkl0;=OjI0`JW@f0Tf2@)~V<4VZ zJ}F`fHsT2C5MtU|O-$KB8`Bw>!u4o)B_WRaksB(Hhf$Fc65QEoF)*2_i@?I7JKKPcf9e{ zz5Jhka`l66*LuD~w{E!d*i-(Qw2w>g>;p#z4_#8;d*1%bzS%RDZd&^Ng+zGY&DS27 z+$EftUpl{cG26Q3f&I^4(|FExoXUw?w;j9YLSS{y`dDecdh&8GmEk&pi^m_mCIP866fMv7#+O6#!2kNKF$?HWjj8Ooy55~ ziJeqz6rrkPt%_DLjZTA(sg!NiKoe`XR^0{@Y@80UG7U6Z4GpzJ6e?Ch8JDf#oJ*<3 zL@DfJ^C7SE_{keTkDmYg`v*|tW1gwC+qS%LcJSt}xV=Z#)W=Gx6Uomc>Ss=FOYT4O z_!9>%b|$BGo$2j+5kD8uKl#$8pRb=;do(DXh<8uF|55aJ8xK8p*At#I6X4eq;GPLE zI|j`0rIV}1pE`Eo% zQ)M}TlqEHwN)c5FmLsSdjiGLq8jvJ^St`phzZ?lgW5JLlDW79soL7Ty##t1N}JLy8T z(~!_|u%CzqBHge_+BU8gnPj8H3=D*Hb8TfnrT`18H1ualtis~C9P5w+C}0|wb9WN) zDp!%|T3rq%x>BBWCS(hll6e;6=gW3j4rBvVmmy32 zVjeZ50%ynrGQ&b-{>u(a7XwbSlt&R(h}!Y_A0Y^=gq3K2Q?6n?w+D)os^>z*yx*4T ztlN)Rho!1EX&2)Q9mgSmsrv-v6@u3w*&r<5D*IHRsTPfEQ7qre_bW+$(21p6iMW_S zVUVh|cy7=ywB!9$gA17)ru0lBPWAI`Ba||EpO@oGpcX}&0kqcg#&WHClH*v?vI))Y zhk#@tANOI9C!nT67TUwI%A`$VKAXo`2<@a@B!HV}U^s6x4X8FVYqt$#;J0kHY*Y9IKRO#SePP;TzU}36=X?I6~XDTpJ_Y+2}p3*TB5jh^~+YwAP zbYH>AtJA32%$p57i_{}Z5rsNN0lyKA#VS54S!c*xpcit)s4xgCtWQBvUtCBLTDxgf zxK2*nycx_*KgkjQt_aTuo;$VNcl^zje|&z&>WA-p>(*nhZu{Q4a7NzX`O#|d>}qgL zUvomdrmt)IdXM$>`Z)LyxCwl4eB=_%COu$;S#LK6Gr$sqT%R`~I?9PaMAY?%TTiW#jf6K78nFo_j{X7e+i`0JhZh8CB^kHP!Pm z@KG>jN_Ew0N{VXvW^}bywtREw^i8X+u4*c(XLNkIhXM;g-3-=&HB0`q`{}23Q}5_f zO&_RbH^qgl`%sG)^6+AE7?~W6A(P|o!%i*@_>sw_8xB5ziFxoBMOe#;tiamjJWUzWZW6`3OIg_DjW2)rbdBAU&{q0_39&A4rue8Y(r zF4xJ($ut-dAs3J)Vbj2LBJ9hja$6=_3T&#WQ3yt}|^)l*1Tk zfGA-Ne?j2Gc*Uvc!M;iIzMNie;-s95IiiL$uph2F!5LszV6S2HQjA`;X3|k%hUmb=9}Pu?)bZ+he4KXyO3Q=I+DxvdYp zn(vHG;eXiv?b6OuwoVsUmXB|}etT%wccYs=a^dXDr(YEIoL=Uk5pwjVB?pTWcfGah zNa|BRII5rJx1KC*JD|g7W@lf~U;Df7l{?puP6@Yv^E>r6*q2aJU;O2b>5Vs^-;2oR z#PK_>zwVZkdy@L(*T=xFF#y2m_^4-@`@Yt5aZcJ_T>(J4T~^y_d+5QpUs2$M=n7n( zUKF_CjygpNL~0Punh_sjr?S;V*pY9tMCeBpyl#v#H$jKNqv>6l0=-^kTcy=cLa3w|OLR&%Ma6m2(iqEgl}s?v%o zM6<(zP+GI31ZOm3h>@hyO+1s1qWNSpiS-(lbi<2djZ(Bp8={D%SQwhK(Zsxs9{!z* z1C4;}u=8<&#o$boga(8xZp|e!HeY4&BxKlfI5-^>dR(_3DD*mEQYki~-D<%IWI-tJ z4N>hJp1^&IX4cazY|x8kVeVECQ6Nk5t{yGAPba)(GDM-_Rm0MB2+TOX=E z^QC={6n|J-SN?5x*}21oy^p;8<=NX_SdiqNhxVRr?s@!;&rTlx^Q`x0=U+SO{prgO z-}mDu+0fDT5A42wbn2EnW`1-3gF^WHb-!PAuQGP8Nl!D%DtBZgte?LxdyolLd@2+)9HI*6VJ??nNHg??aZA%18!!f(`l#e zw71iCrWF%kfTF8{=mOyp3>XQBuz#SqK|&<*&_pB#2?+#{m6rs}0t*qr>FvEMA`v0{ zN&o1ae)ILT=j-{M-&epcE%{fjIe610-@JEk?*a9(OXv6g;qeE)@0|JkA4dn?I{cZ3 z0x8P1dMqA` zD?}toDB)po_sGuX#7(yrGR2bkTniMTMd>0yZ%F1Z0!l0m~W;1NF)~;6! zTEKe6U7bWy!Bm8)G&{;#M2AN=71-ES%&Iq|B=QZ&_nB(4(izZE(PdM*mM=sECEag# z%d{{O=(s?JQ6Sdjga{9tlmlcTAsAzNH60y_JU56l$xc2YcdETos$R{NS|}^^)KJZ6 z7<=}B_1%vI=D&&XpZtVjKXFQqirjdCb#WW~`l%=U_nZjsJ`sGx*E)zF z@%0g3A2MH0FM-p+4shzy{85`N`@urf8g*Mbm{-8O3Vb2Lf9Dc7I1g5S(Ybc+E*$vu z<$HgyaQn$>QJbZDyR zpS-7{(^Exju}wvbLNuIKbyg0z>9qz^8{(vCl}wnS3}da)GIM#+JFZP?GSwRRpkCY5 z8hD%6s+iJdUTa{{^SXssqivmI2O8(LvmIfi%1FahcRk1Ru3RC}5WIUL)LDmcb220_ zgPa_Lyep-6v9TAMOf|h31DNZ&^aQ47;;+cCU6iqe9W=8kkDMM;DS4LldI7c5ZeXe6 zuy9@HDddD?ZwV1YveFH;BlI*<7-5lcXwO@o@3Y8}oNB2!e!HHLTb;$|sONmm^}3Ar zuV+g#Yu$k>NioX?Y@d(8+E{1{sOS*gP@72lY~pZHZksQC1Tv zE8a7??68#^Hu6*qL_6VZQxJol51{9%ox!G_mG~f=XR0OJrTe2?S8uiH370q8L8Tv8 z#HcVHQ^BYjKLGy4N>$u@Ma2jybHAh*#*|O`ogj5&C0hA6Hjuh{jWLu5Kn#TW9Ge;ob zj=3lI%pd+u)VTJ!SMSMu$9naRlU}}j?#Qh#o@c!9`@&hz6|VQK?Cc#l&%Xbu)TO_B zbnAs}@<{(n_1z~u^u*)bt*44N-S^|K`B{STtt_~=kf+=qzTxaGr+oXm2Os{~@i#nu z?7{0!?`$vEkNf)RFMZ0l^2Pq*?$6zIX>ZqqmBY@*8#|tTY2NqcxtH$15C3!9zMV>T z`RYZmZxI0CTk`oo<~?uQK>LRa0Oa~Ly|4GDfM4*QfHSfOxVpLtxa4hhmX(<7Bv!EE zLBh!vTIrgL|Ks9D5Kk+gk}w792?R|D zF>S9W@{ZWTbO!Rc77MQ?rI9ckljYGMhO|mIF>IAhvH&8bK!oiV=`O zi}I#|ga$DZJsxdt%%uZ06k(&WwM3<$6Qyh>286)KE=wtvRzl70Y~O9)i-{A8+Gwx=bU@paW}D7!?nNrR+e8m uZsDxJH_knD2|g6u!W_6}-)-0LA8x(!o^M@s__sSA8GtEQdFIU6^z_^r+mo`f#|<{)jvXhKZM~%uiLvWlC8chg0&9nukPVMOFiA|DWXUmEIIz1weDE3qha`3atQXi2!y&B0VPV-@ zQcKg1neKM`MTq8{o^Dm$s#}ly-T(i;`+vUxy?P8eefJ&pZ(V=l`{d_8cmM6HU%m~! z)Bl6Zzy8YfdH25Vt?5q`hL^3K{@@e;@{#}gt?R#e$%p>nR^--qpZu2g;d}o0AD;Ne zn-9P0+K1nJ-TlZLA3qH4gg<}w*kSPK3V6xt;kA|3uRQdBo_NvvMasZ#8k%jZjjCa2 z9pr%(@QxJ#GFDBqG>gw?kvFW|;QhlXh7(Q`R8Hb(j=&^px)tyoN01UhU`k%cTn@){ zE{7#?n$D5wNvvSR{Q);!XeVnU-X-)hmoh8dq!plGTem7vX~1J`1`8G_yulO2B0r)g zSPs{PB0Q5sw1tMkbh=77IjG9ih;Ctp**;Ywi*R2PXMozJ2jx&_QVyXbn#A(62Bt)W zijlG$bQPum_a_`ar@FLQCX1p-Qf{H0t+Zb+}@U8Y@8&9`K#01_byi$N;WeMvPB|gWy)T{@Na(iT19`!2S#8~Ne8hozo z(%7_jmU4qqS&ryABiT^8LJz1RVaVqKF5_-o-Y7RzySa|qEsl9&cA00c60h($&*0-e zljkD|Os5z?5E~y{ip2sPhI2UIOpS~{S~iQF^bjqLlv0q4#I#~MRzDPlILXukmQ(6hwS*GR7X8{VDU>xmC+5_wJMxuAEs?}W4Iqj) z-2|qini9yJBON)_d2ICk|9;QiuZmwIefU+M{|{eGqrO*+F8kq0Z26w&v@ap-< zYu|nt`Q#8B$9la^Q>{8p(?A{=t{y=ixEdVISbEq))cdbqd)qoV&-?RD>&XAR3i-cR zo!R;IJ>gbpLAceMXW+(7s6x43Y?LBBS2gpg5fiW!bO+qj$+HbNM#4&SxKT`ET$%8L zN~zIMO1NFgM_WoLFk(rpI%~sAR7hxmG(^N%8oF#l6?m!b3M4k-Nqq!=yRx?p!j7MC z(fKwYx9|xs+AcAJ8bi6sVqro_Je;DunS{Xklo+Dzs$796iuTG9CG)sAn`K74016>` zz)_WPS&p`lsHbiBf}X=Sk+Vtah1>-Ol@qZDrPWR z!gJZK)Z=JnIKhKh6R$BAs)qfjogy79z0{LItmaoiOM49g{oL)*I`3mZCdfmy3AQujGs|n1t=w?Bym*jdOt_0mgmkRsEV$pK*wW2@T z<90KA_=Vv7Jd1^p74QFOEcuN+!Bd=?sL%pDV!2HC;}e@z-kk6dF$6L9XieSZJ~p4-T?;4*x(#RhGP~iE6PUR0&q;tm!yxJyHSG3sL5@#T;d
  1. CrCCO3N**&B)@5P#*JjFpZ5(_&MpViO1e{} za;>e?Ilvak!(tP|?76YHgJEdN;R3u8lwD3vjvBgb1Z6H*X?AtI(23@CPA{^_meP^y zAYafr<$BGCprtr&B_&i+DhwHBtcam&c6S(-sNIlP`Pv1mhmj{&z|tvPI)zK8@Huu0 zkrlPm)C_0s+e^SLqp)QZ_MAsy$oV}@v({FyTDNJ~>l8RDTTMr^Y~lpFj*UONQDott@}Q+M&GOhRs3%4|Qx3s}7&#i?bF=8!3yw*=f>)SePif;rxQ3*Tc7)Qq zM91^s*d%SyuK6_pqdA7qQC#lJ<3>uHIEhR@$x7KM7N$FWQJ9QN7CTOxLc|bob!fC$ zdMv}ZIBkf2pCD8~2aWbZ(N5o&DE7N4LEx#gMaLS(W3I_&Q;LinG zI3c>6iRlLc3)ondo079rZZ_EslC4BH-NcQ6B#8LfjpJIY=`W3BEgv;{vSAX1KsTT*;uG>nWSG&hNQ=AS5S*gED>r)(y2%4jJ$42_ z!k}%08pDp$OXEqWZe?X(7E&GC7a(h`=YB>$)Lz~QpUoO|Atdfs7us405}ymgm3eYRlFb~HY>sRHw*5uB`q#i-9M50m-m z1Xbhxe3=l%NU-h~_@pkz3n8(R7Q&&p5or)Xk{UD<6Soitjx_EF{c?F?b;})PY=?YC zslvG7x<(U_0^QS8L9TYTG_r+adKxPufZbRcainaSXbqzYh6_o9x+9puOvnwFEe&f= zCfTMCZ^YOqqNQOq;bS+9Uu@E24hI(|r z(dS1ah9WpJV#%Wl1@KZiNcYpNK!D)!ObZ>#H9KD$7Tk)14N8i?6l;feF;$hn@#v=i zy#kg_;ZFzMv;#m(r*O*}L{10GZKjt$1=?sepK>&Q=L zjL&rU0oIa)JUS^zRLe0M%`Pr+l@3hAi0p8upAW`|+b`p@qv5_>Y0r~>o)V0j`%N&~ z(eT`E^xTUEI3BWn{n%I-X}x?m8}x-j1Jf=s0kTre6>4KaNKk!+3x_93f`ftMh-qR& zNeO5{lEY~4*Ud%DqcFZ!7$7}eoAu}W7-%5Ny?6y2Sdh}c&$9jPa>?JjgaMLx7v?r*!GdQDZwbqn?aoJW@{yO;0Q!rmN+8b?)idgrIZV` zDOpdzlp@N?B+@X5%?J#Z57Zphst$)Bnf48GW>6CSC@naNXhospQie@xr9K1(VlWyk+O@ zcEOC|_8>k``o&Jiks8qgi~2GF8>NDUMBLES(J<8_V0nV>E9KV2#`|@wgYA_S3@ zv6hvpjqH{YvwJw!YQy~Ae1A9A=NTj!Egi$>AoF|&fX>DG>}Ysyq%9r8spRN|cMKQI z&%u(6mVjFVZW)O^ok(nJlF?onG@)~3(5yo;XK!l8<5w2+&wh9&?|_5wOj|nI7tgf$ zh&gMtcJEPeK1QT%7v9tZ8J`sqT3o>`xoQgeyPY?7*}ytv2m-&%|Q#EA(pc^Epp2 ze?&Kc_zPFp~7K0zrT&qEeyJf zX6@Nu1Rz`c^IrU(N5#M;(|5Rd9Mq_3JA01J`Sh`NH8??3dsU^`X*x~KMlL}BSOw=7 zL;o&-9GbUUUtc6Uo`R`|=fO4`ob|~?HsSj9TeBOlKrV(2FWRzkQ|lR9b) zo0B5zQL_u+^ z=<*U4;U)N+HsLl;Fw1+o_4&4`+Y#a^B=}sY3cg8UklxWKiFa}mB7bF_3tE4rWP(2RKgE6rs zSzSDdw$c(e31$jXabk{UyZ|gcutUhcLnymjHVD{{P<9lyYUv;YllamV%@;Ovqh@Oy z%W2t))Bs9cmz@IFPAA5MR^G9qvd9Jz6e2ZJm~h|Mk;hyhuiH|g;ttxt2@Gj{z{&np zl__WPy;>V8R8Yvo4GEO-Je_UzW&-h zK}2{mKjn-@wpg8@L>cuFk$TF(eO5Zd6N8^E5EWs{*s}{FriGO^FwRqjx&C#VtnVDT zh#q|lHE%PeUYTOsoYA3uV$vdv7pmA1yIM6H%!sgfKH@|6iuMI-rCofVvJz7UiQ zkklh+*Y6h#a!4j*I@9MUhDuvbmrm3JEiu=Q?aoSjnO{4S5jW=|?l%6t;SY8j|DI5M zrW0@JMmiU4k3)V(&r(K!^OvfImc%Mm5HNglLhr^}TrlOYPz0oYtZ+qsCl7eg^&9_hT=2tAjHc7RtAWj;ket%4{Ua&frs=b5X67eoPG zMU4n6w`HdUW+_tuN&hmw$@!|_Bk z?xW)Tu;>6GR!WN&tSmB)<8T;_QD1_Iu-#N`Vp|chp03JTFs%Dgc@XzE#GXH6=vLCf z{XvDUjLLQh_>$R?849@7v*^XKYI&;Ag&67J__Qd@rs4}6ta)NHP<%U;yW%{CZqD|l zd01oxR#$OTo{l~j$l!3Y=Wtjzg{Bhi7&feqyV;J7H9>)`#Rfzii_{sq=2coT&@ef+ zqC2aq=&-6vf#5{4!|J#cObVfPV_XMannjg@*(-%ji)2U5Y?^Nu6+s$dl|c~ZC#qc0 zrw!smm#Fj!CLB%oa$%)XU`mtX#1Ml+kn5GLyxT$TfVrE*b?*4BhZp`L@{7ooFb{EU zlm6yHY=u`CGhe@AQ9U55ZwGBwE07L`eA+xYwO?w7{%C{VGnF++|!VsLym$MO;5O~ z%`v>{sEvGcq9HFvj<14~cieHui%#8f$LU3zE5V6r8>!jV%z=Ykh@20OgzUxsmw}66 zDB{(4%4xP^HK&20jjS#j>^I=p(}&+zP;wo(Xc~nTtDPncp}jge=ZXp7`R1X-nKs*E zi^c1?0bD*kuSY<5(PY!m^Nux8oq?r6dDhD6PvF0c7B{VdlN(V6R;yXC4i=2GL?i|- zH)pX&U^5@|@^~N`SnS#&wwmr*yKKReY@F0TleXs{>Q`FihQjVr};ZT9wEVVNMz^Up7h zJFk1{4=?)WV;`v!H{BUWkF6kg-2{H~TCk(E-+K-t_Z{9^n(Xew(EeR;285n!b@tKY zi>IPn$T>|Z;zMgEw=q(O))#COa%g=kp#(RaItP(-XdS9}H>Pjc41SnTEQi(}y9W82 zYqnnEXRm?P({{bYWod2ARy%9izq!6`SzB#cTg@xjx2&!9G-_rZ z6gu>N*Pc&aYu+jHdq=^N_MUz(z`i6-b2aV@uM=EW zhnjt7%L`r|3ORKm`j2n?%MbpS+=CbY=`rJ}*SG(6{ZPF8yVv|V!UU)zR~>rnec$}y z2V$!)yY{w+UU97AfXDyj1kT+1b@VNNarX_s`LOo3Bd0Ha-|DaZPWsm(fAY5%eq->N zTZ)ro%3Z%r-G1T2PyYDLfAr`*HzEINGfJmK_yHEDmTKN-?6N%V#i^y5cRNa7AT=*? z>SgaN|5f&{e*F(``PEnaeCojm`LB*1dEe#Nreg>lAdj3r`tcvVL&HD&-uu7Yf6EUm zKmXAOKmPu|e8XR#f6vSR$30J7`A`4QIC8psSy_AFkxzc^+b=p^|LnVOees>2D*pJ- z+3%cp>7!R3O29sp5b<4Xx?0ea}uj?NQe(@_miu~5^eMfre zqlZ5C&bPm(G%)G(FK(RZ531s)&hI|{_TJYH8Og_yzZT#2zupr6&$oQ{qOTshIjZ$xr|G@84d#?>lc5FS+nHZol)< zFZ{RJ9C6*v!RRZGed${2_Mm**4<5bYD|qgGUwX+6iS`%p6OY|?*AI@IHh<$)@BPe^ u*I(It^#`tfV^#22C(+Wob literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_9.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_9.block.json new file mode 100644 index 00000000..901c2789 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_9.block.json @@ -0,0 +1,1428 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRUVlZQy83enNIYld4NHBGRmZqalYyekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUV2bXBSMUlNTEUzZmsvUWlOOWM0ZVMweGxmLzEwV1dtZWhibWhjL3pLZTg0LzZWUHF3aTA2K3AvdworNW1UL1gvYnFNcmo0SEZ2RjllbmlsREhhQm5LZ2FOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDREhMMjBpeW96SitWKzRmUGZQdEJaa2VJeFdycVMrdmNJc1kwTGJMbGFFUmpBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQTZ6bm9wdzY3dEFBOFh0STBNYjFXd0lXSnhoZ1duMVdJMVppbWdCVWw1U2dJZ1ZISmpibFdmClNVZWxZZmRuNDhYN0JySlQ4VGJaR0QzR3I0bmdlc212M1RFPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lRR292aW9Sd1g0dXR2Yy9OSCtndW1vekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUd3eEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE4d0RRWURWUVFMRXdaamJHbGxiblF4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6TXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVI5VnZzd1BpanIKelZONFZudDhyZEs4eTdOUGdEZkF4eThUdzUxOHJKdnlNRXRNSDdTRVRsV0dDSHBaZGlUU3czNWsvcGF5Ry9reQp1OElkUTZBR0I3T2VvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NDdk5JTVVXT25FYmhkVjdCWUZnYU9uWmJLNDkvR1NUK1BBNjJnNEtPY2p4ekFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCV2tYU2RXZlpramg2RXJIay9uTmNjR2cvZHV2cHg2eXd3Yk5uUUZ0U1o4d0lnZnRTUQpSMzJtYTlBd3JGaVVlZlhXZlU3YjF3OW1FMy9RVlZyd1NkVi81cEk9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDdpej6pzYIHydgvT4JWnQK3rQMQkeZ4ziMu40tlM1lkQIgGaUIXJ9MXDS02w7ndclAVnoJYoecRX4Oze79i7DSmD0=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "DDXriL+pwFK1E7YJbvaFa9siADdZoSW4" + } + }, + { + "signature": "MEQCIAe+/JVlQsqkrddxjPpaI7O1vqa/htUEmDrRmPYe7eBoAiBtF1llstDCy+wFC2bKnl4VhMRW/bhI7wMW0h4ATDaqvQ==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "H5ZZzFDMiq9AWz4jS7W1TeF40KUZJ0w2" + } + }, + { + "signature": "MEQCIE3B/bAZITzyY1VgqA2y8EP0th5vWpZ2WkiaCANTgs0yAiAagC4u8j+F4TxDISlSJEqdP71xadADQEV+5XWbUkdktQ==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "7w3whgr2uuuVDWVeJgYpQhnTfr6+xe2g" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:27:37Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "RXHyC0fzHDd0gvavD+jdrmFDPYQ3OAkG" + } + } + }, + "signature": "MEUCIQCd/DM7bklt3FpQC2Ps/2AgMwbu362bsn8DpixWfNlrDAIgakCbrCsfnipxADHU2fw0mqPvVL2zAMuWkqBYdW9GTCg=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:27:37Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "bN149MiYjXs3JVSse8+O1Ew4Kz54F/oQ" + } + } + }, + "signature": "MEUCIQCrYVHEBG3eknDiAG5K3hLVUZHmjDe5QPAP4QAUlomXEAIgKzJIhzhLb8lKHa59mXUPrUl9wfqxxE6k5Sdd7uOE8tA=" + } + ] + }, + "header": { + "data_hash": "qeX3rsbpLOgUqqteEl6eEOllrJix4OXniwF7J82kKq0=", + "number": "9", + "previous_hash": "jYBm6SwM9ETPy61+CNdgOIQv+BnjXUwDmYKQTMFVdhc=" + }, + "metadata": { + "metadata": [ + "CgoKAggJEgQKAggWEv0GCrIGCpUGCgpPcmRlcmVyTVNQEoYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KEhji3B0ac31ExZyofmSd75BRFA6TfoTS08cSRjBEAiAqPzE1XQnWJ0V+MVdg+NIt2UJSpdYbLTlr00IM3WCH+AIgb5N7pMnuLB5wfacniIV/f0BNDF7UaunhmeRuYY3liyA=", + "CgIICQ==", + "", + "CgIIFg==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block new file mode 100644 index 0000000000000000000000000000000000000000..8b36b4a0e01bbb9a56fc2d2bf879f83e69894c4e GIT binary patch literal 29428 zcmeHw3zQ>QdFIU6^z_^r+mo`f#|<{)jvXhKZM~%uiLvWlC8chg0&9nukPVMOFiA|DWXUmEIIz1weDE3qha`3atQXi2!y&B0VPV-@ zQcKg1neKM`MTq8{o^Dm$s#}ly-T(i;`+vUxy?P8eefJ&pZ(V=l`{d_8cmM6HU%m~! z)Bl6Zzy8YfdH25Vt?5q`hL^3K{@@e;@{#}gt?R#e$%p>nR^--qpZu2g;d}o0AD;Ne zn-9P0+K1nJ-TlZLA3qH4gg<}w*kSPK3V6xt;kA|3uRQdBo_NvvMasZ#8k%jZjjCa2 z9pr%(@QxJ#GFDBqG>gw?kvFW|;QhlXh7(Q`R8Hb(j=&^px)tyoN01UhU`k%cTn@){ zE{7#?n$D5wNvvSR{Q);!XeVnU-X-)hmoh8dq!plGTem7vX~1J`1`8G_yulO2B0r)g zSPs{PB0Q5sw1tMkbh=77IjG9ih;Ctp**;Ywi*R2PXMozJ2jx&_QVyXbn#A(62Bt)W zijlG$bQPum_a_`ar@FLQCX1p-Qf{H0t+Zb+}@U8Y@8&9`K#01_byi$N;WeMvPB|gWy)T{@Na(iT19`!2S#8~Ne8hozo z(%7_jmU4qqS&ryABiT^8LJz1RVaVqKF5_-o-Y7RzySa|qEsl9&cA00c60h($&*0-e zljkD|Os5z?5E~y{ip2sPhI2UIOpS~{S~iQF^bjqLlv0q4#I#~MRzDPlILXukmQ(6hwS*GR7X8{VDU>xmC+5_wJMxuAEs?}W4Iqj) z-2|qini9yJBON)_d2ICk|9;QiuZmwIefU+M{|{eGqrO*+F8kq0Z26w&v@ap-< zYu|nt`Q#8B$9la^Q>{8p(?A{=t{y=ixEdVISbEq))cdbqd)qoV&-?RD>&XAR3i-cR zo!R;IJ>gbpLAceMXW+(7s6x43Y?LBBS2gpg5fiW!bO+qj$+HbNM#4&SxKT`ET$%8L zN~zIMO1NFgM_WoLFk(rpI%~sAR7hxmG(^N%8oF#l6?m!b3M4k-Nqq!=yRx?p!j7MC z(fKwYx9|xs+AcAJ8bi6sVqro_Je;DunS{Xklo+Dzs$796iuTG9CG)sAn`K74016>` zz)_WPS&p`lsHbiBf}X=Sk+Vtah1>-Ol@qZDrPWR z!gJZK)Z=JnIKhKh6R$BAs)qfjogy79z0{LItmaoiOM49g{oL)*I`3mZCdfmy3AQujGs|n1t=w?Bym*jdOt_0mgmkRsEV$pK*wW2@T z<90KA_=Vv7Jd1^p74QFOEcuN+!Bd=?sL%pDV!2HC;}e@z-kk6dF$6L9XieSZJ~p4-T?;4*x(#RhGP~iE6PUR0&q;tm!yxJyHSG3sL5@#T;d
  2. CrCCO3N**&B)@5P#*JjFpZ5(_&MpViO1e{} za;>e?Ilvak!(tP|?76YHgJEdN;R3u8lwD3vjvBgb1Z6H*X?AtI(23@CPA{^_meP^y zAYafr<$BGCprtr&B_&i+DhwHBtcam&c6S(-sNIlP`Pv1mhmj{&z|tvPI)zK8@Huu0 zkrlPm)C_0s+e^SLqp)QZ_MAsy$oV}@v({FyTDNJ~>l8RDTTMr^Y~lpFj*UONQDott@}Q+M&GOhRs3%4|Qx3s}7&#i?bF=8!3yw*=f>)SePif;rxQ3*Tc7)Qq zM91^s*d%SyuK6_pqdA7qQC#lJ<3>uHIEhR@$x7KM7N$FWQJ9QN7CTOxLc|bob!fC$ zdMv}ZIBkf2pCD8~2aWbZ(N5o&DE7N4LEx#gMaLS(W3I_&Q;LinG zI3c>6iRlLc3)ondo079rZZ_EslC4BH-NcQ6B#8LfjpJIY=`W3BEgv;{vSAX1KsTT*;uG>nWSG&hNQ=AS5S*gED>r)(y2%4jJ$42_ z!k}%08pDp$OXEqWZe?X(7E&GC7a(h`=YB>$)Lz~QpUoO|Atdfs7us405}ymgm3eYRlFb~HY>sRHw*5uB`q#i-9M50m-m z1Xbhxe3=l%NU-h~_@pkz3n8(R7Q&&p5or)Xk{UD<6Soitjx_EF{c?F?b;})PY=?YC zslvG7x<(U_0^QS8L9TYTG_r+adKxPufZbRcainaSXbqzYh6_o9x+9puOvnwFEe&f= zCfTMCZ^YOqqNQOq;bS+9Uu@E24hI(|r z(dS1ah9WpJV#%Wl1@KZiNcYpNK!D)!ObZ>#H9KD$7Tk)14N8i?6l;feF;$hn@#v=i zy#kg_;ZFzMv;#m(r*O*}L{10GZKjt$1=?sepK>&Q=L zjL&rU0oIa)JUS^zRLe0M%`Pr+l@3hAi0p8upAW`|+b`p@qv5_>Y0r~>o)V0j`%N&~ z(eT`E^xTUEI3BWn{n%I-X}x?m8}x-j1Jf=s0kTre6>4KaNKk!+3x_93f`ftMh-qR& zNeO5{lEY~4*Ud%DqcFZ!7$7}eoAu}W7-%5Ny?6y2Sdh}c&$9jPa>?JjgaMLx7v?r*!GdQDZwbqn?aoJW@{yO;0Q!rmN+8b?)idgrIZV` zDOpdzlp@N?B+@X5%?J#Z57Zphst$)Bnf48GW>6CSC@naNXhospQie@xr9K1(VlWyk+O@ zcEOC|_8>k``o&Jiks8qgi~2GF8>NDUMBLES(J<8_V0nV>E9KV2#`|@wgYA_S3@ zv6hvpjqH{YvwJw!YQy~Ae1A9A=NTj!Egi$>AoF|&fX>DG>}Ysyq%9r8spRN|cMKQI z&%u(6mVjFVZW)O^ok(nJlF?onG@)~3(5yo;XK!l8<5w2+&wh9&?|_5wOj|nI7tgf$ zh&gMtcJEPeK1QT%7v9tZ8J`sqT3o>`xoQgeyPY?7*}ytv2m-&%|Q#EA(pc^Epp2 ze?&Kc_zPFp~7K0zrT&qEeyJf zX6@Nu1Rz`c^IrU(N5#M;(|5Rd9Mq_3JA01J`Sh`NH8??3dsU^`X*x~KMlL}BSOw=7 zL;o&-9GbUUUtc6Uo`R`|=fO4`ob|~?HsSj9TeBOlKrV(2FWRzkQ|lR9b) zo0B5zQL_u+^ z=<*U4;U)N+HsLl;Fw1+o_4&4`+Y#a^B=}sY3cg8UklxWKiFa}mB7bF_3tE4rWP(2RKgE6rs zSzSDdw$c(e31$jXabk{UyZ|gcutUhcLnymjHVD{{P<9lyYUv;YllamV%@;Ovqh@Oy z%W2t))Bs9cmz@IFPAA5MR^G9qvd9Jz6e2ZJm~h|Mk;hyhuiH|g;ttxt2@Gj{z{&np zl__WPy;>V8R8Yvo4GEO-Je_UzW&-h zK}2{mKjn-@wpg8@L>cuFk$TF(eO5Zd6N8^E5EWs{*s}{FriGO^FwRqjx&C#VtnVDT zh#q|lHE%PeUYTOsoYA3uV$vdv7pmA1yIM6H%!sgfKH@|6iuMI-rCofVvJz7UiQ zkklh+*Y6h#a!4j*I@9MUhDuvbmrm3JEiu=Q?aoSjnO{4S5jW=|?l%6t;SY8j|DI5M zrW0@JMmiU4k3)V(&r(K!^OvfImc%Mm5HNglLhr^}TrlOYPz0oYtZ+qsCl7eg^&9_hT=2tAjHc7RtAWj;ket%4{Ua&frs=b5X67eoPG zMU4n6w`HdUW+_tuN&hmw$@!|_Bk z?xW)Tu;>6GR!WN&tSmB)<8T;_QD1_Iu-#N`Vp|chp03JTFs%Dgc@XzE#GXH6=vLCf z{XvDUjLLQh_>$R?849@7v*^XKYI&;Ag&67J__Qd@rs4}6ta)NHP<%U;yW%{CZqD|l zd01oxR#$OTo{l~j$l!3Y=Wtjzg{Bhi7&feqyV;J7H9>)`#Rfzii_{sq=2coT&@ef+ zqC2aq=&-6vf#5{4!|J#cObVfPV_XMannjg@*(-%ji)2U5Y?^Nu6+s$dl|c~ZC#qc0 zrw!smm#Fj!CLB%oa$%)XU`mtX#1Ml+kn5GLyxT$TfVrE*b?*4BhZp`L@{7ooFb{EU zlm6yHY=u`CGhe@AQ9U55ZwGBwE07L`eA+xYwO?w7{%C{VGnF++|!VsLym$MO;5O~ z%`v>{sEvGcq9HFvj<14~cieHui%#8f$LU3zE5V6r8>!jV%z=Ykh@20OgzUxsmw}66 zDB{(4%4xP^HK&20jjS#j>^I=p(}&+zP;wo(Xc~nTtDPncp}jge=ZXp7`R1X-nKs*E zi^c1?0bD*kuSY<5(PY!m^Nux8oq?r6dDhD6PvF0c7B{VdlN(V6R;yXC4i=2GL?i|- zH)pX&U^5@|@^~N`SnS#&wwmr*yKKReY@F0TleXs{>Q`FihQjVr};ZT9wEVVNMz^Up7h zJFk1{4=?)WV;`v!H{BUWkF6kg-2{H~TCk(E-+K-t_Z{9^n(Xew(EeR;285n!b@tKY zi>IPn$T>|Z;zMgEw=q(O))#COa%g=kp#(RaItP(-XdS9}H>Pjc41SnTEQi(}y9W82 zYqnnEXRm?P({{bYWod2ARy%9izq!6`SzB#cTg@xjx2&!9G-_rZ z6gu>N*Pc&aYu+jHdq=^N_MUz(z`i6-b2aV@uM=EW zhnjt7%L`r|3ORKm`j2n?%MbpS+=CbY=`rJ}*SG(6{ZPF8yVv|V!UU)zR~>rnec$}y z2V$!)yY{w+UU97AfXDyj1kT+1b@VNNarX_s`LOo3Bd0Ha-|DaZPWsm(fAY5%eq->N zTZ)ro%3Z%r-G1T2PyYDLfAr`*HzEINGfJmK_yHEDmTKN-?6N%V#i^y5cRNa7AT=*? z>SgaN|5f&{e*F(``PEnaeCojm`LB*1dEe#Nreg>lAdj3r`tcvVL&HD&-uu7Yf6EUm zKmXAOKmPu|e8XR#f6vSR$30J7`A`4QIC8psSy_AFkxzc^+b=p^|LnVOees>2D*pJ- z+3%cp>7!R3O29sp5b<4Xx?0ea}uj?NQe(@_miu~5^eMfre zqlZ5C&bPm(G%)G(FK(RZ531s)&hI|{_TJYH8Og_yzZT#2zupr6&$oQ{qOTshIjZ$xr|G@84d#?>lc5FS+nHZol)< zFZ{RJ9C6*v!RRZGed${2_Mm**4<5bYD|qgGUwX+6iS`%p6OY|?*AI@IHh<$)@BPe^ u*I(It^#`tfV^#22C(+Wob literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block.json new file mode 100644 index 00000000..c918b118 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/businesschannel_config.block.json @@ -0,0 +1,998 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEMCIFU5H1NO7l3onZIHUGpa0ujTT+rzZo/vDVbXUJkny3jwAh9cF21CiWw4F6JrO+mc7vBd24EbKY8FfuHO8wwOEyis", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "UWHpbPfWG5B8Y6AZhaPoLr+8iZz+Jwmh" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:26:03Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "7308vAclg9Mc1pEVaAxBVlGaqdt4ZxYh" + } + } + }, + "signature": "MEQCIHee1fa6c205VB5LkZL1Mq+TbqtfCuaizUC4Klh/wk6IAiBEvoZPqeyIs9dE6BptOgv/obXjzPvqgXx0WR5LqhWLYw==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:26:03Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "yFzTA2V+jIBgibPd0U9lCdiLyoSbtPqi" + } + } + }, + "signature": "MEUCIQCu/SoDBNs23Uf9sFgELQe/YbGnT6GEZQaCwhpSk5UGBwIgSeDAqBBvdz6WQnYDlDwtvesgLOiU4wUq/GCYPNzMMKc=" + } + ] + }, + "header": { + "data_hash": "MmGAggfMOWTvPMD6pU45rWrMye0CuDQlXB2QYOIqpM8=", + "number": "2", + "previous_hash": "fqnNQmqNZR0Ez1x3R0wS9iIGl3z8Kp+mzQ5KggGFQxM=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgIIAw==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.json new file mode 100644 index 00000000..f299cfa7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.json @@ -0,0 +1,332 @@ +{ + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/config_delta.pb new file mode 100644 index 0000000000000000000000000000000000000000..ad5968f68b4e5d6f67dd32a42559fc6fd70f159d GIT binary patch literal 5012 zcmeI0ORwWd6@aJjwC-H0=h3o|fQyir*0hkggPezR;~^xLya-QJRKx?)Oi)-#r1(V3y6}V6=&sDfgQv7f-lPz(<``R3TQEJG*O^ZprsvAF*aL?8iU4k|~N&(Szsh>y^oWv2NI)ahjgL;Ac z-o%*>gp3ADtCg#zl`m2$^7Phns252IGhG@KxD5!Lsj%F~Xi6lY-yG1>f6vaiiURoMh;K5s9Kop0lSpyg2qumRd$1#jQ3h?p^=qWvq?B0>X3 zSe2xkcZxMw(jh=l>_*#Orx{p{<THtC#$7euc(GW(Su&k>bzyowy$b)$xAa8ZOJV0qS)ZcBU)-u0UlNqp`XYgDNlDSK}-I5)%8Z&6T>=s(c;FD`Qz- zPC8MYdB-xPUws9R$Y4YMIz})4_^p(+Y)08wx~0rim%Dh`qXS{P*#*3zT}9i)vVbkN zkguk*q|-G`8Qyp%cwg7N^-S=-u6gU3;O(vnLxq;|jtxsh#(P&q?!AvnQO(#H4!94nJF{hoo`JROu$>B33Y8~qbRspaUI>SK0$~Y z5`?{mvs=?{oUB0M7=n{-#MQVZ?(0T3k|!|Vi#Dy5#Z_~+CwN1&x`pkzt4dln9LKgr ztF;-QjrJ-(+k>sBkIieSqIxG>mP*trVCMvZh~PxTY{(K4Ae9gEz5_<5P=*XH!vUH_ za8rhHBuP6%Cw;e*Vt+bz>c~@~Q70YxEuq1ymVMQQ*Of?Ub%G>+&8fiAt0F^#GQtc1 zcQ&xb?qtY9!!=%MGd?wfK#lnEc9-SXdrEyHHI>&060 z-CW2NWs)RL<+XXKlw_O_OTK0#o>hChvNB`Q-qUUl z2@*8#4h%AYEHRi7#Jfe-E9<0G#z>O2cBK^Wmqqi+xe_Mb zNq2*Wvry07)hp|27wBuR)b`u+5$+`q!#RL=DsJel%I5>#0exI6?Vp93O2 z9A-(ygiGP-K<&nTd6*c{E@`TKs$J%NJ4mBgSNG{OCV&PDLIoPu1+rKaJlY32Xo^KN zl1w(ly2dtJ+EQ{*QD~2`L1B7Nm#HGUXF(RzTg*TWH+?lsc&rRc(}1>2vx!mJ=Lh9d zy{?sDubhwCS~%!&6sSyN1ep$tbu8UFVW7*^by1KTu1En-piB=PU1i*6H(bHzqpNM0 zV#A&w^;}X?siGvYw3{pzd|DRJnvJJMLLnuEnO;RH5A{~Gqsp`*KxsN{PY|&}m>KYN zd88^)yHXNu&8M>h2u?eD0;`6-PFaZtg&g5>(}z$LEWSzr(L~Edr(yd}dRYI=D z7SMVm`U2B%X;!yzs+>?;eKIO}3}@)sLPV@2 zyUliq6o(=i7sE^RV$5R22oEgiVzNkx=7`KEqXUU&`*AAK$`W#`+)=n%Iiob_bgrX? zs%G6hZ~&WRKP^%l5fQlX@Z2-;-M{|T0$u#w(dVE2^5U)KJ8wB~E%Cm015C#r!k-0#EH*|B4Uqo0~cLD+cbqd@_Tj@eJ;`eEyaN?5y$W7Z(Emxis+a zOOM@r{*)Y3uo1`9tYaL*`*cCA73-x)$JN{Ul*b0U8nKoR?mb^ScW zFm}gdBc-C@Do|zZPFNWYvNf;Kz->3vZ)Zr`;R*e%nK zI%(9|>Zq40w?okq%w=10hi9~*4?~EUs%)3gmvBN}tafyaghV0LUu1jS5*`OsS8T`I zwTu~uzR-5ulM>Uy;Zve4C66mPxr#E0Z4a$>&Mid-{h^MF+@d*XwSAC63%Oix*qN+^ zSlvd?M%52{yX9}S`eDbFzcWhB)y%|BoSML3+@P0{K~SJ*H$&0r2rH;6va;Ef2`jfRMBaySy`zQD!vwA@r! zlIxVKmYjE&q7A%L8L@a{gbfJ3D#ZW`;~AqJ47zzAWTqe>AgB>EdSwzufJ=?%y#^TG z1r$Kw5{np@7w9AfER!UMA}t{2mnf>l&>naGNOhU-Q^m%BkDS9;?=>h6cnQ~* zg{~dpm?4ue9IHuj6{Kj*ir5#}6Ukz>wesJnVo6Dw>;#QD zVTwi>;ST9*ft+lksu*QT79=Sy9S&Nfwx3)qE=FqETDA|%4TJZT?s9%{sPjEFnAXzG z3Z1jp(>Vs#kOyME)9$#jcpm_w)aQeO7E)YZNqTitaY70oDqAfR7Mjt#$(uzkX=_cT zhUE)JQ>|5<2vLf|Zc-*>t;|wOY&YVVMz1wolIfEnul(FONbJ5ki*1U+)7W@!io#7% z_)bJ&U{-HhXkR%0$|m4W%jww!+$P}O5#Y9U45K^0;?FFE)|{ICfe)j)wyWfOQR$ajt^oE?Y`9rcvoz1`gAR+4S{E5Nxk>B zx3^(4a1wpLD(~A=PwG{114DY0B~1b<%gU&plKg%mvz+AQY!oap&1FgSN2M+|O1H&` zBSL-X*c>xbkg`uZ622&kWvod=JK<<^c`;F3Zl&I#?OloY(^;yl^gOaV%(RV0ll0lF z*~BZ|ctwheqY=cTdY@br&9$W3XnQAHA<9m)(iU`rvM9lk8;6E%;U!No@=>RwIBl{J zY{hjoiZ<5_7P5&%qK@}cEuJohhY?REa(+w~a6KBuxm=nuyB)hO_KT;oy>~@lzW(SB zAIcqh|IcCc|~=&Ntu_>;$PKM?rt z@hIK=IJNn4YV+gN8GoF**{N+x-50%i11hMu|s?Ir(*#oNX_is{@@#5 zG2p}B|Iri6H@#lI?59T_yyNKS|FG@$D}R6cYZw3hFZG$dtqWA+?#F)d+gHxsS$p`K z*Pj2mUl!lIm;1+AAAJ1cE$P_d2d3kUUii>QKZ1YhZ#P}@M&z!ecYgYX`-%_!iM;U2 zqc{9~&%PgAcKyuW_{A?XPe1k2;p+~PpSbmvgRwvEB&_)PJMZ6f=*b(mKXEYrUl7!_ AZ2$lO literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block new file mode 100644 index 0000000000000000000000000000000000000000..b6e1a691a62c538d827f7c6027cd73b3281d0793 GIT binary patch literal 13061 zcmeHOTa4paTArEh>8U+EmtN0~W~P8;wgwh7(QF*&=B%`6e7BR>i4!}Hy%NZ`IC1P; zY$uKl53@XgKw2Ro@x&VvAYNAc0xQr;h}CkHmWu>02noRmSRn=>ArSktoFtX1>aMBk z>fX6&)zwnFe9rH4j_vdP|Nnjd3!EIk_NCvie+7T*XU+K5x89+D;aC5N`RUL7>(5bt z_UhM|UwP&`-z@wl^0zMd8yEbg3o`JfqbKh^d3^im55Mt0|MK+7oy3h3du&c-6X%V$ zP^*rP91C@8m2$&GF}vZ6Y}>5ccBzck>!wq-YciO4Vx3u`7*=?Ury0 zIYwUjuP5Jn=TpD;-FIuhA*}wc`@*09)}3GfmiH&W{0-!<9q?@j`3nd6-B-Xfoyc(` zH$r~r733FR0^szt6M4x0efs#@FM>~q{VwvyFCu^NBJ%YY&-%BG-@N_i_J?FRL3)j1 zdWygb6rnJ?Rv-!j)ukzla62B63MAnP@&I2?-Dbk}`V}@?ITluJHf)+`k)F34PyJ3; zmTAH#7or@efRc53Aj=$+HV10XC?cGQD5(rZiY*yqV^cHMc355L3Zsdnyz3)3qNHN% zN??o(=vvh`hmvpQj4G1C{^GINHiqM|H6&xBU-c~v-LN?^AU$b75~4zf(zqQCD!Num zfyJpS9cv^aSsBs_Qx$1B6&0c)D)7k8VVeNk#H@4PmYNFF7K!O@GC+<+YA_HtOiuLn zGk6L$mBtnqgjTt^GBswy`h>dgvlV&(`z9o3hb){p$bpXG8t*mFK z?EX2?Oj`Bzel>78HnF))&<>?FuoTh|Ns%M7CD#`#4Z>qMiaPy0Wq1M=2$Hk-Ql-pv zn>;bK_&Q$F+JTCVlB|YTSaQH5!{kx{N*NvZ7&b3@2|bh{e52Z!ttf+ty2Yh!WcWg*Zq0quLSq8jOH z3KDe9dMiOIwoFd%^cT)lrUa%qGu>E`@Ns?Ej{MM4gCZ^ur=-0|hZ&zbBchbjlU|6a zV221sqA#Q5V=S=2d*%p9k5yg*e(t%NK@?T$#Tey~6^@ZWC`aXz8%K_rTd z%1$jUSjpUdU}C3mzv=wx-k=D1zfS<%C^P}LrtA@n&hS%V7O;hER?7zbq%-x~QPyfW zPJ?HLTDc?|Ic4INerv=_N!V9Q$_zBU3LX}VvZ`SkrLmo*z;H}EN;XiH1d&33Y%$@Jl$;84;@bVc-TvUZ{ojWJ_GDp9 zw0v*Y?vq(44tV!Y~0kD`*WbtocHzRWulin2_eEtx2Ov><@zhE~C-H zUb02DxvB{rf^Q3^Pzr?Qtis2s_r)(>g8}k+aI4P~7;=02f3?>9s|RADw+k%G115Te z*jVvBPM?q0U8mxB)Y4J8zIs2@Q;TNW&?D{L^P_raaB$BL_RjN^BX&`YhK?S!cxmUM z!9^EsDTK?W=mrK6RD@2vLo@J5ny_sfSaQ*yp0$Zwx}kES3HDoASBPMsh&?f7_Ax+U z(gm$+n}rcJGAj(mVoy)m{R(&{Eh)NI@p`i+^ogOgurX;Z_T-e=?mAg+F==v7@URrd z6iIIv%7~5FbGS{eW6WwBKf#3nnraH6ke+=S!Ugg?oQouxN)$o#*NW6)%k@UJUSR6t zdXNCAHf+lguB%y{gxe^?3k|Nqhb$fiVP?tg>VZqa%Uu zBGf6sSdkF71EsC~038xKdx5O55z92DHDYaMVK<102~c^bwxa4pWyG=0I;k-;yi8|N zRV3zTL3Xzq)FYtRp#+%@c#l*{O$nQhvk?ec9=Fu_VpyI>G{2d2+v0R!Ny>&WRwWpb zY++DvSM_yD8B2;QSKEtT*)mjam=E%qTv~(PLXY}sfXC?kI)okHCY*3Gi%-hnnVxIH zgfB*Z68X&0lQ2y@LTGAkS!Hd+`oXy;z2eaa6VkeXNEJltFhQ~h!o~6u%X-$GjGI3+%(+B`Z z;MM^985DWq%t`{!w#?DgB%}FsyZoO*D&Wp^+k$?ffi|$ylhVZ#?BYpzcXBq~33!fz z>u_iBDpsgse*5WH-hTVFGn>zVXLmNr zBy{Ji1bH601)jpeM>PsY)cs4ef{{?PWFW2D<{a$pCI4+?0M%q4|MwKHW3<4&Yiy0$8%L- z{A4zsgrp)E0TX1(rGnn#u~XQfB=Tv<0V z=Kg#8K|)#lexs}_66hXf8DOxUPNu6q`UY7MU`%|+K2qqrYW)p?bSSM`;(90Wn4jH@b-7dmK+GbOcApSkvC z-I}bXrZOF+qCrnVugQ(olGsr39y(iI&rRNont+Sk{x{?Jhsnd%tY_PnEHdnDxBnA~AWjmJ@!9a?&Y; z5IxF@z1|>ND*j4ZVDox=Y~SP3;WIc_#)xF2Yid8N7Puxm$9Qo)n=J=&gUMC}v1yrT znUwnjjih=ECGd69PzNMf^`~oB?Lu|1LQ!3f@S~QqiTznEUXX-8g-Tz4d5tPy{PS~= zHvH#p@HjDioESb%3_sw+5V>s!6L*#z|Hos%J!WE$nb-%;#E@GH*NqO!$_aX|;`})B zLoo2Yd_ga}v(=8TKLV$C^}-a-A$QKEIM?G&pj^hxoOu+x zA#@JN%_cgNiQe67Kc%hq^G~lI|I(@U^W_ude?N=-_g?$ib^hZ6lWJADPy1=DIif5H zC?T@l>XKa#8`LnoEckyI+Rt7Qzk&91$?)T*{oMEU_-gIvlHrZCpJKrmJBxMQkcDD( z*juqJreEP!k%v}gx6-Ye`O0d$YpEM9l}JH5W^Pe}RX4IG?-g}m8iV$*S5mY#HyjI` zg0*Zb9%LV)_G8wQc9%A^ctb_&&fJ{_RL*t1plC*QQ?5!`Mi#4fLKP(Mo@DxvOM~ra zW^3KY{E5^cOHrRESEYF7(qb}h)Z*q?(lLp|rwcEjjhviQ0-MaNMWLz;=S$WKFd(7J z+*+Y{btw-=#Bfy4vdUoI=c5u)yC#`_6y2va*>r}}WNucSa@K^O)>pL|liq({ABygC z2{>1&tCtKP3Sl3;?z4Fm-Dgh6a_kgc;JGnJc{r&pwQSsy^Q6&PHhHC6CCY5Dl%+fy zMts(uOO=^K+UuFmvzZq8mG(?779`040bX5T)nHj@43=T*`_z3N1uU0!pJrI1{YKcH zkTX<~WHL+Zr0Y+L!;R+ltFwhRn^P(p)@{8CbsrX#e7w;Z7a=Vdm;tt~Y!tkg*KDz9 zSF1(7*QUK_;g6+c@WJao(rP-x#_J$iw8>^Nin>~%3kwYHD?j;Abe~JO*zi~DK9`Jd z1fma7_qh~(m}_*OOU74+s&n0kHp+6fkm~DZznbHAec9J3S+0~uMM-RWa$Ut_qb-%O z`m8dhN;I>YH1brfgG9*!X{qaZ6zYMM#aLlBG`O@pa#;!s%?F06_fPjpl&((s>uQ4& zFl9ALqrDZ*GiD{m9CsKVfj5ML3bnZ=>?$LetjbJoF8J6V@C!$zKvl5MM!nRYT zxf&)`yV!zVj+f$Q!$IALu0-0#U;sJPOYE}kqbMbk9Uot7PTY6aYHB3JYG@UQwJCN@ zs51V3tNZ->ZSXiL{CMa-mjHCt2f<5*S0n8pu)+_5kCVcWDk(hEe7^G-Y#$fR=Msh< zgKb~iwXgF9kCId#z9nw!d_OV<_9%MKRvURZz2}}QZld>WFL)Ha=i)>Mz32EX@X~43 z78SX>vZd}knAjQAo1TRgMMnqy>G#N ox~{yfn^nD?z>2VgGWh*edu_)#6bqh>b6;iI*{eSSPwfBwKLt3%yZ`_I literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block.json new file mode 100644 index 00000000..03cece1c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.block.json @@ -0,0 +1,727 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:03Z", + "tls_cert_hash": null, + "tx_id": "0b70fdb0e6439a02c9dfcca7cc13077ad3c66dde9c7a8e785b1556dc494ce18b", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "8AFA4xG2+e02okl11VAPyaYLm8Rnxoq8" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "W7k3jThAe2FzBMTjRIaSwUVeJuZ8Q8gZsEWPB+jCK6U=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block new file mode 100644 index 0000000000000000000000000000000000000000..e3320a019d498d1597ccfeb110bd0f40a6f0802b GIT binary patch literal 13061 zcmeHOTa4paTArEh>8U+EmtN0|cBX)3wgwi|(QF*&=B%`6e7BR>i5)wRvl7U+IB{Yp zv7IL+RHYef4x%Vb& z)zOh-p>C~GZkQ-$H=L1en|0eRmC<_Lbjo(E<~VM{uA8`9$E#MUTCF*DrBSin5^f>K z$SeQ#>3jbap4Ul50(&Q|F@tecP=umg5wV6)u7@C~ODgT29AWw=H*%$e12Fdkb2G9LD-zJ;M1 zo+iw_ji@r1GzRV9`x>VF*p@_fno2aW5ovD&kEy;b^QWnp3)QnSp!;Ml%5h4`2Hlrs zj!Bz+EoW2_zO(J4QKZF;DEt2z{4S+YO8W^+s{)Qy%OytOH$@RoagYX!R zqE5f33{Ri}0Z6h~@WswzT_4Iqu{uyzY>VktxK-q#RoSg{t7g8k+U{EF21_+k(TbUFdvf6u&UO^| zp2lp46_B16ksia6vP~1)iIN&5DQi5DGAW(H7ptHuA@fC&&{9}N7IR{;>p-qBf+u^x ztS9X*J=Eh36|FmScRHhTuItT;W>h!js+479v1%t&LGmunL|TDe0)-GfYu&^AiPRuV zQI98Ar8snHF&Q^%adRvgm_*{!g*T&zIXR~UHVLgop{fq%OV*lUKth+fwLLc5q=N`Z9!0e*0R4wQ`6shdYO`$)+=yCUdjul(Qy|)mOEUNiROv zCkbKk`;D-!NT7R!ZA8w%HjANNMMVWq`8|wjnjDftuC%bG5D~4W5Elz_g zP9qW7DV&@Jf4ZhognU@vXaY`S*&~=a9m}y(bb;r_9OdDpzSOgEOU{!(zW3!XUjZ2Md2p-86Bu%P`@dRi{@b+x>Tdxws@(^Ww3>$4cs)xNZL*n+ zqOM-(!oj@gq8$GtaZ&kxaU=;*WkV$fHuO{P#Z7^o@A66PrXT_&^iwx~g#mHye(j1iBLGn;`?pfl*?YZ68G`k?i>RT6f}}v)0mK zLaYW>aZsCLS0Hcr_s<v7CT^G&@4!CL z9T;+J;kwcBZNdpAVSG{or{9ntLw*SQyH}ATFb$gpLzCe0K> ztKDKJ&TM3Olq9;wrk7XvB4446NnkE3E^%=t?sl+Xw}tJB^AgDhU1z|r5{Vk=szBAJ zi$bYw4HRt3=w1W2%S_a1wBZ)EBXL9zbrL%=*K5#h7gox=q{>B{m6AqvXt8y*!#CZ* zlCP&%Zeef2`AE!q-KBJoEMv~fi0ZkzZe*9Yte+s1ee|49b`#EL!bVMUtymzcHN2)Y z7hPYB;$A$}=2bFY)mPTCKbs}$xT^7Zp@YUaQ_>ps(6u+~)?_s`)#)e|hx8OEO>V4} z#D<0|Xt;cjoX<@FbD8rIB6`>`f`qEd8D4aqu|26 z9CMoE=sr7X&WK*8&>alRkW`G;m@3OzJ}c`AGca*#0*D^PE-k~)V{$nnX2ou#nbOQ( z8wp*J3H@4k_5N`_0TC+Ra*>$4R?7*$MLFpdLWmw^MMddHOVwXV3v6C*kL?HC)dQRl zk!%cI>jl*U*JS4yFRsII*_Rtkwkn8C%S6kh-0SNkr9jSyuaiTqPl8o%x^}g0gbphd z)zt|X8%xAc}*aX$aN<$V70Hh3HuemppzO8|OUBJh&o!;yAIuEIp% ztbFszs z+|T(IXWY;6o8V|ayeF`}`0Ly)RJ$0K2tMn>twsI`2+HAl`s0DL- z%kk9jz_c1o_~c@nFaTNp!Hy`R)}5;2=35 zD+5|(p!P^kMU|+CDm=1tShm$8iCO1ApwCWod^hy9Kfv(jdk(|YsDrKhIP0QhnivA#k$DHkxRDwKWE1z>s*smDn%d9jn|+)QrDoUbkgm$@f=AII zZOW0;E^$zj(;m8o@?6bAOl(ZM=AmdYK zM3ho`q6C!}m+R`xxX_3M3Qz4wOg)FRPeSXrJ`t2xdH5{kGGXuR`5{Efu z;+0-jxg(@JUxnqCDDibYw|F`d%c&Qf4FrX3{#+Zds~tW0ZHvrJnZhjUR{bY59> z)%@R1e{j|OKPZb@z8AKY(lo=0iPvR9R45M2&}|Y!6QE&1Z+Jn?7fP+-kf9*WWRBXp zG@8WzVAjWFG+Nk8w#YVDHK9ZBZNU^uGhrE4_&9x+EYn|IiwR}tSe9p)PzbTH;uX%A zkJnwN;&{~3(YW4&I*zUQ)uP{TWzp5E^Bk(ecJfpj>S$4mmv$>Ocu-PGxNM4Upc6qw znn^n}1COK$%eIas-wI#P%0w>RP&v_rJpNXzYpBGmuZoJ8GJ78&FzJFebf~I>>RKz9 zjYY*s+5H{xOj=S6z2Yfh6RwGYw1E1iwW!D`v(>Z7a*Iimi(*$(B)y&Agd!s4OhmNx zpWvLhH`P@_B|ZDpg$v|;cP^4-Dp3T{TdPuwE!P{>dV#5n>wW^H+Mq2*xS?fr5>BHG zFEqFcAGDl2jw=ki+RWFX^MX?ilQ8OWnC5s(yj2HujW_L5k(A3O{&h~xq zGENdBoPqi+iZG46qEJC+B)NMB=d`T?l;Xxv93^WknL?E=fuGmzu_7UEJ4##Im#Uy0 z5-#=vSz#lVX-sRx+RTFPEG8yEs=OmlRj7 zwiim-8fx4i@8_XhS_5TaM7?x|$LRbj?cO2&tsDZ!d&p}raQwk@$}`% z^443gon7GgbKu#XjXDY3`6@x4M{a?qu=r5_Bj8!eT$t8mHc2LKjJ$*Za0G7kv7bU= zuzZ@KJ^o?v;%W4)z+VnT6MGw|$H>va-~>Fk)$qGvyo%Lq;Ub?wo&ir!&C%36*ht{n z*0z9*=F@GK_$LsUn%=b|7^YW{=iy!foSol&>R@vZ zyg<(8_Ox%#CeChq0aM@4L1UQmK7H{A+mrhPc(6ImfuFZI8?S@Sg?3_yV|l+7~hN<}lwr4iIF!P1@^C552kI z?&&6laGc1EV>q@lQUkBf_d6N%i|%Ik(~B?K^WaN$w2B_8N|&l0x@mf(F?he<>k)Wj G|M&l~4#dU) literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block.json new file mode 100644 index 00000000..3c0f2fa5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/orderer.genesis.updated.block.json @@ -0,0 +1,727 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 20, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:03Z", + "tls_cert_hash": null, + "tx_id": "0b70fdb0e6439a02c9dfcca7cc13077ad3c66dde9c7a8e785b1556dc494ce18b", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "8AFA4xG2+e02okl11VAPyaYLm8Rnxoq8" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "W7k3jThAe2FzBMTjRIaSwUVeJuZ8Q8gZsEWPB+jCK6U=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.json new file mode 100644 index 00000000..6ec933c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.json @@ -0,0 +1,799 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/original_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..49babca1f39f519523f73264eb8230f995b0ad73 GIT binary patch literal 14033 zcmeHO%dg{DTAzMQRn4h>)VR8*yYEalJy*>`9lGNVS~^}vqWMCV$TK%79fP!AR#trI8JU-_c3*Ir~0W@-9@Er zf8ROB$LDvx@B8`Z2QMLi?;}5!!9#qp@SL%cIAMVNpY-4b41``ySc3H=`OmmfTM z;j9LYg7GYjdX^Q%$ZsO=g71RwEZ_n9aR?1Rwl;>p@T`x=q5tSl>u2}yiSGpQ*`J() zm-0q_bdLPb_mThp{*z|^`QAtQA3?Lc_&!O?3eWH)uF$))K;U^&RY($_IyRp21a9*( z-d?kKS>#b%V0zUhvmQ3dp|7T-t@G`0#BW`chPLT=OLu^P&sn^r(!@+42LoY4Z*iHh z#Q|(dA?M=EWIf+3w^oKmZx|O>_t(Y>HGtO~f(2urS?QR!)v?BgRq)~7AXI3!nT@ve zYBZe9%pnnv`c>D&&<#i7#@LR-R^*w9Anv0q*23atr*w7>0*AOaO* zRy;k*bgk+dL(w(2^hhAad*_)T!TS${e$}&BCK3)S>MK)TMtV*wH zY*%K-T8lk@sYD9eHMS-l z6rLlBTYRx=K&sHZE!n`RC!HQO(&7ynt-GN$_sA{Vv%R7b)eWgCW*JeejuWyV+SgYi zCBr6xjPtg+?qjYaHi=Ty=ZIA)4lGJYX3bjMnu$6l5{>!7_NdX82uYqv0&`KQD#LKe zm>vd1bh$NGXrsE6hEsevt!G(f5cavKgxA0hF0@G9gwXk4okUoB3lTP9FCom?bcgdK zG^&$w)@oq&RV|>?>-Y6_LRkD+BdjOj=pJDkfz`3iVx(13L2jhn9>x?!jEE6iT9|WU z4R@LGrsEGPx>ia}R)srGGZC0MT%0<0v8R!^bll%494=$Y#_5oXrFc@bfNjMrX*URM zsb#aav`w1bWs6gKRlLl2OG(^j!-&f|p;!q-V!RGqj>)vht#ksZSP;b#@EX+xR`r&J z=3wc!MNy#Rl(Kig= z53qG*qcr4gZ7dYW)oPKGJCq$Q+?kjR>>vK{7Qhg%ftULnjv@E*f2+0DznuioAP3O2 z_5?uUY93&-wU;b9L@Sv_J+07#5A%A6nz&y|h}!NqM*iCgekC#T`qw= zD~JFATsi{DqEXV^P3{%>K-M~=&tA{E8H~n3#BB)VWsuogx-Rf7jjd6Y1*GWmL zl%_>dXxUO-#iUV3EMxVcG9ybAy>gn{RIP(V$vknX>)XiJJu{23LNFY$X?bcfB<33@ zLlrp0s%H&VfV+rQiPF^AfmVMRNKC#=Ccr2gp76`{ILdoV|)XJW?Z% zUO2i`z(YEigi&ny5VXjzBj1JgZ(Z_xh)-rKpE&6`1RKT!R7!O&L8VzK1l8IuI zUYdNlyls&@EF3qigRd16wMvvgR4ZMW(35k#NaAIxSZ=$iCDmd(ZL=rS=tCC$=^39X z5wypQLD9v)?6etY;!Sm%6a`D)^tTnR$W64lH83B8&IYNivR%^%}G~g_RtZ6sg!?#H3jr znM_^jaxH7P>OKP(oSmVvQ?X2d8GM}cx zh?)br#m>}{&{P{T8Z190>+>vtxykzQ5jAS+enM8I4Z~UEo>~!&R^)|4Qe2BPq6-q)s*cUPJLm3yqtOy4sxX$P2SHv1gw@>(lZ*U09DA zW|s1ejusA^#ZKYI=8%37tj~?;v*Di3`rI(SQ>gj^S)Usbh`xpOxncbDaP@@s!R^V` zs;AtrPr{9TIb+qyL~|LZ<>CEqp*I|rA*~p#F-4NHtyk7$dT2CA2jG2@S(>`Ljfv$H z_lmtpHAK%{>j_nnaP4Hc`s`RA9}i@ExkwC7t!;6)O-|A|gb+2&in2V2mWsO)7g$*D z%*I#3)fLtUPd2)y_Wf#sZ80In3F{zO4x}cXtqMZRG|)03^#>Y3%8>Qp>cmJL5Mb4x zuPwC~p`!{(_B7m$+LKM}2DNxW;O-p0aOp2^V}1T5XMO(b9(bM@el=L18vuIRtH2wE zPe3B}!STXVj0>A_C@&Nk- z6#2&CM$Z1?K6n`?J2CQS_mMxk531ntI3ACStd)>q0EIz>7mnx1d*FLTa%Kd9@_!W<(pP?((z`0%7&*-x|PAV5B=@tf)A$QNv9@w z>)@nBMi3k0T>3|3r~5l#^ZfisX1|TR_TVLm-wQ_g(Thi$-@eLTzl%JEhOb{adC9s8 z-sm_}Yn+We>oVzm!tMMC+5HysD(nCf;up|A4g}g9cEqF2#fgK>VQWJE=IxwNhvYeY zW23JMsxW%OC1_lvSpy;$q(eRfr;JG}oY;&pn;heyx8*+=c;CsJZ-LEUS zH&6swNa=kH;OTTh=^E7GLOs6edow}SQ)WK`j!sL8u2pO~Xu&+W zB(>=@xh{`41j63MO(;8*53<8Neu7J%1EiXQD}+712;n^OB%BKbk%}aa_t%QpX3F(u zwO*j>!g`PZu{P{TQA1a=Isuna)+jXD3g@>c+c>I7(~hB8rLtXYXsdd0CM}BHz>Zo8 zQ7oCvXrsp%D71Q;5JOXAi+A(+;G_nDPa8B;e3H1K?={FW>Jh|l4lb$Tc_`kGp`21u z86t(ce!Ov6?aK(bkT;aJ^GTJ_E&(@to~SSpLpSF&d~IZY&x>&fsNAHsBI|f%$}*F6 zQlo=LnaZN7fQQG=19qc9Z5-}8Brj1OXA?@PC1UegHU&PzHB2>J49j6eaT}-C5#|F^ zR5ti%Rf77&F+V6+tNJ=6M@y0|S33*2Y>rfRxE*W*sk8?2LXY~X*ND;ZHnr~|@jEXc z^F`#hkoO=XeRfG-@fz~V<^1ll(;=h0yHn+mBO@Oo@57G1cd4UC$ZMB7dQxd064N`@ z%)bU6!#W@@hGi>GB4?M`$H;@j$j{EftFV@htsq{-O17|&ZzK1?H|NH5ZX9hy@Jc&B zK}6v^*M$5o0);3$6Z8j7w256DlrA4&mk-LjgJXN=;9G=|jAwmkYawqU4pM3Jk zH{br`llPA{?}1l#Hj3k0;VMC1LtX|iV)5bnoeGW*!RxzPZD4o~EYkDOnVy#K!}bnk z!V{ZMQ8(Q2@q7qCKKo&mI4d7600cbh?>?M*a`te?XTJd+1Mh_UG6ua&E&ZU5R?*|7E8lJHE}gw~BvURLEna-e q^$~byH@P`Ya51ia60OF`DzcDAP|5TQ`1kr@RG-!S-sQO;AoBlMF!E#o literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block new file mode 100644 index 0000000000000000000000000000000000000000..b6e1a691a62c538d827f7c6027cd73b3281d0793 GIT binary patch literal 13061 zcmeHOTa4paTArEh>8U+EmtN0~W~P8;wgwh7(QF*&=B%`6e7BR>i4!}Hy%NZ`IC1P; zY$uKl53@XgKw2Ro@x&VvAYNAc0xQr;h}CkHmWu>02noRmSRn=>ArSktoFtX1>aMBk z>fX6&)zwnFe9rH4j_vdP|Nnjd3!EIk_NCvie+7T*XU+K5x89+D;aC5N`RUL7>(5bt z_UhM|UwP&`-z@wl^0zMd8yEbg3o`JfqbKh^d3^im55Mt0|MK+7oy3h3du&c-6X%V$ zP^*rP91C@8m2$&GF}vZ6Y}>5ccBzck>!wq-YciO4Vx3u`7*=?Ury0 zIYwUjuP5Jn=TpD;-FIuhA*}wc`@*09)}3GfmiH&W{0-!<9q?@j`3nd6-B-Xfoyc(` zH$r~r733FR0^szt6M4x0efs#@FM>~q{VwvyFCu^NBJ%YY&-%BG-@N_i_J?FRL3)j1 zdWygb6rnJ?Rv-!j)ukzla62B63MAnP@&I2?-Dbk}`V}@?ITluJHf)+`k)F34PyJ3; zmTAH#7or@efRc53Aj=$+HV10XC?cGQD5(rZiY*yqV^cHMc355L3Zsdnyz3)3qNHN% zN??o(=vvh`hmvpQj4G1C{^GINHiqM|H6&xBU-c~v-LN?^AU$b75~4zf(zqQCD!Num zfyJpS9cv^aSsBs_Qx$1B6&0c)D)7k8VVeNk#H@4PmYNFF7K!O@GC+<+YA_HtOiuLn zGk6L$mBtnqgjTt^GBswy`h>dgvlV&(`z9o3hb){p$bpXG8t*mFK z?EX2?Oj`Bzel>78HnF))&<>?FuoTh|Ns%M7CD#`#4Z>qMiaPy0Wq1M=2$Hk-Ql-pv zn>;bK_&Q$F+JTCVlB|YTSaQH5!{kx{N*NvZ7&b3@2|bh{e52Z!ttf+ty2Yh!WcWg*Zq0quLSq8jOH z3KDe9dMiOIwoFd%^cT)lrUa%qGu>E`@Ns?Ej{MM4gCZ^ur=-0|hZ&zbBchbjlU|6a zV221sqA#Q5V=S=2d*%p9k5yg*e(t%NK@?T$#Tey~6^@ZWC`aXz8%K_rTd z%1$jUSjpUdU}C3mzv=wx-k=D1zfS<%C^P}LrtA@n&hS%V7O;hER?7zbq%-x~QPyfW zPJ?HLTDc?|Ic4INerv=_N!V9Q$_zBU3LX}VvZ`SkrLmo*z;H}EN;XiH1d&33Y%$@Jl$;84;@bVc-TvUZ{ojWJ_GDp9 zw0v*Y?vq(44tV!Y~0kD`*WbtocHzRWulin2_eEtx2Ov><@zhE~C-H zUb02DxvB{rf^Q3^Pzr?Qtis2s_r)(>g8}k+aI4P~7;=02f3?>9s|RADw+k%G115Te z*jVvBPM?q0U8mxB)Y4J8zIs2@Q;TNW&?D{L^P_raaB$BL_RjN^BX&`YhK?S!cxmUM z!9^EsDTK?W=mrK6RD@2vLo@J5ny_sfSaQ*yp0$Zwx}kES3HDoASBPMsh&?f7_Ax+U z(gm$+n}rcJGAj(mVoy)m{R(&{Eh)NI@p`i+^ogOgurX;Z_T-e=?mAg+F==v7@URrd z6iIIv%7~5FbGS{eW6WwBKf#3nnraH6ke+=S!Ugg?oQouxN)$o#*NW6)%k@UJUSR6t zdXNCAHf+lguB%y{gxe^?3k|Nqhb$fiVP?tg>VZqa%Uu zBGf6sSdkF71EsC~038xKdx5O55z92DHDYaMVK<102~c^bwxa4pWyG=0I;k-;yi8|N zRV3zTL3Xzq)FYtRp#+%@c#l*{O$nQhvk?ec9=Fu_VpyI>G{2d2+v0R!Ny>&WRwWpb zY++DvSM_yD8B2;QSKEtT*)mjam=E%qTv~(PLXY}sfXC?kI)okHCY*3Gi%-hnnVxIH zgfB*Z68X&0lQ2y@LTGAkS!Hd+`oXy;z2eaa6VkeXNEJltFhQ~h!o~6u%X-$GjGI3+%(+B`Z z;MM^985DWq%t`{!w#?DgB%}FsyZoO*D&Wp^+k$?ffi|$ylhVZ#?BYpzcXBq~33!fz z>u_iBDpsgse*5WH-hTVFGn>zVXLmNr zBy{Ji1bH601)jpeM>PsY)cs4ef{{?PWFW2D<{a$pCI4+?0M%q4|MwKHW3<4&Yiy0$8%L- z{A4zsgrp)E0TX1(rGnn#u~XQfB=Tv<0V z=Kg#8K|)#lexs}_66hXf8DOxUPNu6q`UY7MU`%|+K2qqrYW)p?bSSM`;(90Wn4jH@b-7dmK+GbOcApSkvC z-I}bXrZOF+qCrnVugQ(olGsr39y(iI&rRNont+Sk{x{?Jhsnd%tY_PnEHdnDxBnA~AWjmJ@!9a?&Y; z5IxF@z1|>ND*j4ZVDox=Y~SP3;WIc_#)xF2Yid8N7Puxm$9Qo)n=J=&gUMC}v1yrT znUwnjjih=ECGd69PzNMf^`~oB?Lu|1LQ!3f@S~QqiTznEUXX-8g-Tz4d5tPy{PS~= zHvH#p@HjDioESb%3_sw+5V>s!6L*#z|Hos%J!WE$nb-%;#E@GH*NqO!$_aX|;`})B zLoo2Yd_ga}v(=8TKLV$C^}-a-A$QKEIM?G&pj^hxoOu+x zA#@JN%_cgNiQe67Kc%hq^G~lI|I(@U^W_ude?N=-_g?$ib^hZ6lWJADPy1=DIif5H zC?T@l>XKa#8`LnoEckyI+Rt7Qzk&91$?)T*{oMEU_-gIvlHrZCpJKrmJBxMQkcDD( z*juqJreEP!k%v}gx6-Ye`O0d$YpEM9l}JH5W^Pe}RX4IG?-g}m8iV$*S5mY#HyjI` zg0*Zb9%LV)_G8wQc9%A^ctb_&&fJ{_RL*t1plC*QQ?5!`Mi#4fLKP(Mo@DxvOM~ra zW^3KY{E5^cOHrRESEYF7(qb}h)Z*q?(lLp|rwcEjjhviQ0-MaNMWLz;=S$WKFd(7J z+*+Y{btw-=#Bfy4vdUoI=c5u)yC#`_6y2va*>r}}WNucSa@K^O)>pL|liq({ABygC z2{>1&tCtKP3Sl3;?z4Fm-Dgh6a_kgc;JGnJc{r&pwQSsy^Q6&PHhHC6CCY5Dl%+fy zMts(uOO=^K+UuFmvzZq8mG(?779`040bX5T)nHj@43=T*`_z3N1uU0!pJrI1{YKcH zkTX<~WHL+Zr0Y+L!;R+ltFwhRn^P(p)@{8CbsrX#e7w;Z7a=Vdm;tt~Y!tkg*KDz9 zSF1(7*QUK_;g6+c@WJao(rP-x#_J$iw8>^Nin>~%3kwYHD?j;Abe~JO*zi~DK9`Jd z1fma7_qh~(m}_*OOU74+s&n0kHp+6fkm~DZznbHAec9J3S+0~uMM-RWa$Ut_qb-%O z`m8dhN;I>YH1brfgG9*!X{qaZ6zYMM#aLlBG`O@pa#;!s%?F06_fPjpl&((s>uQ4& zFl9ALqrDZ*GiD{m9CsKVfj5ML3bnZ=>?$LetjbJoF8J6V@C!$zKvl5MM!nRYT zxf&)`yV!zVj+f$Q!$IALu0-0#U;sJPOYE}kqbMbk9Uot7PTY6aYHB3JYG@UQwJCN@ zs51V3tNZ->ZSXiL{CMa-mjHCt2f<5*S0n8pu)+_5kCVcWDk(hEe7^G-Y#$fR=Msh< zgKb~iwXgF9kCId#z9nw!d_OV<_9%MKRvURZz2}}QZld>WFL)Ha=i)>Mz32EX@X~43 z78SX>vZd}knAjQAo1TRgMMnqy>G#N ox~{yfn^nD?z>2VgGWh*edu_)#6bqh>b6;iI*{eSSPwfBwKLt3%yZ`_I literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..03cece1c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,727 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:03Z", + "tls_cert_hash": null, + "tx_id": "0b70fdb0e6439a02c9dfcca7cc13077ad3c66dde9c7a8e785b1556dc494ce18b", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "8AFA4xG2+e02okl11VAPyaYLm8Rnxoq8" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "W7k3jThAe2FzBMTjRIaSwUVeJuZ8Q8gZsEWPB+jCK6U=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block new file mode 100644 index 0000000000000000000000000000000000000000..c0605c746b171de6c14b3c9108545eea8e657924 GIT binary patch literal 20037 zcmeHP4Ui;NeZM=8z2)6;cl2>^w|r!8K~yF%-(Moe{_dWc?wOwH`9z65Gd(@i(>)*E zGt)CuB8L$T2oxHLqES>T#%PrSWkiToR!NLnM#S@j6p?78NC;8NpaN-}}G+@ArHEH-MVojx0V__$2nWPbEI@d-k=L@3p>mTluqi=vVG- ziyXcGwHMvzICo+3Gxt^=dH$b&|GuAm{L`Pfw)elkJ9hZSzZ3uBqjTSU{K(J$@k{Uf z0`jBxZwLPde{Y4q56yw|=65d4&Hv&{zk1?~rQIFb?3Aiftx+o@_s)Ua=KzQsW!aDo zE|oyuHFvrFgON1LFXCiUWGNO$MRJr1IF`i;5y#PDN60u<*-3U5e zRxDkQl>3~8D|t5BEU-h>MZ&z6B$6?}p>-N{r%9~J;h7BACx>VfQ}_(5NyO`XwMc7v z(HrSXS+Y;5XnK6FBoY~TuZGc}q*L9zM;qonp*}^Rsd0v;hNugNsk0VTSx#dN+`6j7P7T>ZF+x;U66PLS{ulVI8arVTl@K1<`M zdLJLc2ZcQa7@8MREhBPC&LYPxu%y)@^4Wf?poa%VU8{1*yhWj-))~@ri}|ciNj4(Y zqRzKK$;0=!q|2hMN%#86UP(`CB|S6X@NqYndx;e|jH9tZn@(}QFshI=!12k2MKY+1 zMKKoRYSDhf70Wg=TC5k!^@}+-;S0!_SU?IHt&CVID+#&O4wZ;jhX=m6VoDKSZG~NG zl!~|TL_FlrMx#-z*Q~~y4jgM1LM>VqMJ&dlK6}KVrJc_bhIp9r&lRdsW@Z@@(09nd6L*05#^`wC>>+n%V29My*lG4!Q z9NMI(kA=aiP*(}%NC9V2lOE6!N160d{y;mFPs^@sEE)j3qi5!l451~>5{F~KK|d#< zHPjqL=(5Y`Px?HVIR1s%0BqP`p0Vv3vU=Wko#}h4t{#`c5rMCoIk&PW?1`*U9;AZO%obd zqakZs#)PW#T;f9Qhv4QarLPoni+dJP9$``8q>#~4$NE~=F1Tx>E{T+;zZQPiSUzZ!Za49 zake*`rj4BN)CYsjI^n4g2Ag%lQ||_f;%fIcbpzhCL|dZ@1Ru#Ng3|XI<(Qied4jQm?C>^|{hB%mB;`awtb$@t$#&9gJr*9|a^80$ zZX%Mf$|TAvd=ZcKi?p}x(6R&8l~PPGU9h@!&~f!BrORfWQHjpSQ>}6x`c2Z=kYrQj zL)Bm|W~h2GtvN$Nu8x&jR&Kype;qKryHSTqK*FO3n=Dw?0zI7gTjO zJ|xHZ5a&?Tf(BySgo@#U#WvA3=f6Gu!CLb_1uIMnY!!{FN+XtZ*9RVFM@f(k7wgPP z4LO1qB;aZ|vSCFJsH{8cERZ-_!=y?q%U5cqn$t2N!DX~cZOTbSx&bzhGBH+S-5T3& z_!!et)=J++A>%7wd3lFm1)y+qkpR`7N?O{dZ) znz~gaPA^4jTJ)Ht5Rh%TiVQ!ZNx#6!6;6ePOvr>r zC8R0Lg5(bk+0QsNFp7iJ3vwufwuQaOo|X7+R>%h?#gWU9MVR-36=n7#dsmj( z582vsQ%PBZvd1Yjb=jow!k>Tx_?YA+p_pRSN}XD>VIuR>+7~VXdvK{G6>D0pQGFW*!(_Y2dcDI4&O#v5r)y|W zEV^Vj!C`)196}zvjyiGFOE|qz)slsPsaR2ZL@GAIDWH!$IjPtPrvMeK5iL;?0g-+& z7Nu%st&&%8o|E(a)X>K`86T0a=~CM#qbC9l!p2l!1ga8T(~VJjqMT#89UiY_MHUa% zTMl=um`i%N?y{4hhq>^#d#V{xyqfAA@zD75_5EuO}8jGLloZ$`wK-XD8`wH zoNF^dYfVtK^x1W-EINc%R;E{28QJS4@T`J)J>_oR2oA+wctD=`Y=2BvX1>%`mf%p= z*vk4Go%cY&I_r0F$

    $KzW0}3Rr=5w~BSF2etOnV5&CE#DFjHnd-SlH-H`pzBtNt_-a>QL`h;*mJ!G>Jw_oB6KT@vdRiz^Uy zkc`mPw3`d3LrGVoy*3M3fstk;1gvBsn=u%hT-lQM$YMqY!x}^(oYyM632|6138GPVI#0?P&z(X~9+D};&ziw(iOf?U`cbF5k%tTLpxFYQLnhTPO} zEV@8^EK-f6X>XH2t!wkH3XJ@hig`9`L;zbM*PWuPs&JTV#EVJjsjqT1zKo@OvsEgiR{!*{^WG%&Q&&u7yq-S40yRMW$7y+)&*5yIr4>);|q z$>qg_R3?kzNfKw7AXZ3cFwjladvZDfbwD4EC$gw&M9Y0sZ3N5~hN^X_>809hXkdk( zoCV?I({o@87;XW>EnxTu28PI7Nvp|?&caW(3~q~wZ85PwI1@v5wq)6uYA8!kfg&5_ zreVrDv_j<72n=z6s?4$sx7${GCPK=rlncz%nT?m2N_`tF;hri;$ZL=bVW$qS=+s%r z?pddnMZTFJ^s}+{V*|G0SJ#)v>pAlQu~SaXw=KI zE|jAZ{x;Rih4GxeTG~Gy+Rs?~-hlSAD&s3n`-z zriz*e@UHf-*mZ^cZ6Q}dbCuv=;L9{qjNwKDYk=v^=swX}Kc1_1nv%cl9Yo+JdNZ**VWMMDA?$h6l?$abp!7MvvpvWeTD2Wl21={jfWD57_ z(z>qdrPF;nVj_>LJ%5;HJz}@g;hXNb$MWV48Lbb8i5efQ<%}%r5aY*#rsH%Urq33_ zx&Q<4ay5<%x(05-)7N8VKS2jPoIl}dQSEA*>-TA>`w%`O+b@s+%jMlvJEpo^IETg6 zP%m3HQ{`UTDs<3puIS7K>Yg=RRpC)v_jzg#Y=Od8hVHY6IuSYmy> z=eQCZ(R=IytM#6RJ9dGcC>}GB+jb#0>;ispply~)PFn7a;*GF@*k=jkB5;9o62|3R z5iaDMgcX4xIH*mE!ECigsaci@sUxjh5Vj}xpnB${Y8nh?lgp!4*DdxYaM83qwqbUp zMyDoqXR-#zG^P{`7bm`aT33g$ zstDMhlJu5l+ukH~+U14I!Qs(}+KY}ogK7;W)iJuIPS=o;{V*{01^BaXmR$z>C#R** za@l|f5nk7F)YU+woQ-6KX<#)|)xmVpifaBKDZ3|DIiG1zM zZs)uh zNJQ@11-1~%=!E=+c7^Ob-_*d5~aX3*PX%q_WEC5 zPk;6PTk=;Sw2RzvWZMt^`u*{5KX}6ef7^MF@K0ay;4L>j{=)Ew+wObl=0}b^`qp1x zuw(Hp&*^&>9sl|8b;d*cpS{WY(GM5CcewIoYWqiGxf_l>@t19cauGWgci#V)^!!(1 z&tQ*+-}C5i&?|`p)b4GcyWp&A{^!n%zwj2v`*$p!e`|2h(Hnnt;3mRH-+kmgKmBm+ zxw&(WJ^Op~-m|}$df)f9O*-_{!Cm^Xeb4W?`(C>cOy!K;H-BwQAF1&Ha;+yY!^1waM+_OFW%i4TNd1Bw4 z`~G|3&;u>~gEu^W&voB<;LQsk*adFd1rIfDvkwQ(??8Sx2e!UVYU|siw!Tg3#lKDJ zqH`Z(o=x1TKYcE9)z|QkZM$1}+k@9WckuS{3USp%*B<-r`Tu_Bb)DD!%iNJyzbT?T z{}2d2sV}^D(R=0oYrei?amOW}eBo#)^W5*g`~8b={Oq@0{fYOU@lSVr{q08=?~iDK PPk-#kU>p25vc&%b2`i-k literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..1a75d53d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1082 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNSRENDQWVxZ0F3SUJBZ0lSQU05dUhSR1lvaHZQZDRkZ0NxZFVHU1V3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTdlROS0YzNzk1NytFN012VnQKTjZYTFFyOFlVeTdCV05meTgrOUc0SG1LZHpzcjRRZkxhV2UxM2cvOFd1Ny9oUXAvT25nckp0Qi8xYkZaeFlzMgorSlB4bzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSUI0RnJGRTlrNkF2YXltUGxzQWkKVUhkNnVDN0E0ZkdGZHZ0NkVuODNEeXI1TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFEbEhnQlQxSk4ya2h5ZgptRkg4YlVvcFgzb3JESHhpUExNa1ZiTlR4QVp1MUFJZ2NJVitldTd2d0NacUNHMzVMcFIzYlpVR1h6VnpuUTF2ClJwWXJTd2w4czBvPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDWlpRPz8OFGk6QF9dO7i7DjYrj/3rcALfOjNch2mD5HAIgXfdtDCAr5tB/cs4Q9op339wa1Blm6FMBnUxYhdLliHE=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "msuloxyKskRjNl5/BUj7gfSBR8W5jVk9" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:54Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "JvqEbFByjmpYPILtnSTQJ2vWkFRu6hZb" + } + } + }, + "signature": "MEQCIAS53WH4wkzyQto5i9r6QTtEE0YLAK8cDV7rnyO2XSuUAiAbjjcMgIn1E4pENEewIYvsm2n3BhTS9v5BshG4U5LUAA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:55Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "miKwcNOj4L9qh7bojmpSd36xeB1RW9Ej" + } + } + }, + "signature": "MEUCIQDqFQdt0g/4DJnugIuE9BVyFbAmPjxbJJyZq7TyorgOWgIgDRtZK9Co1dJidmDJmy7dbZ6h0oxnMxPXDCtv8Dj4W/s=" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:55Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "dibJYYJTvPMwQpexaEnDmGuhaRoaPHkr" + } + } + }, + "signature": "MEUCIQCQRSA1O69+fXleQVtihoyE9y7CR4fQc32g6pBkUJVRPgIgXKPoE7HysQE59GkIY2flD58P6RoYunBtmIXjsX/Rulw=" + } + ] + }, + "header": { + "data_hash": "q7Jm1/jG/pLioaqifXbx/dIZiadUg54Gy+Mh8Lu8krY=", + "number": "1", + "previous_hash": "3VqmQnyoULQ09igtDnfHkGSuQzj1MQAgTUcQKB63KxY=" + }, + "metadata": { + "metadata": [ + "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", + "", + "", + "CgIIAg==" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block new file mode 100644 index 0000000000000000000000000000000000000000..b6e1a691a62c538d827f7c6027cd73b3281d0793 GIT binary patch literal 13061 zcmeHOTa4paTArEh>8U+EmtN0~W~P8;wgwh7(QF*&=B%`6e7BR>i4!}Hy%NZ`IC1P; zY$uKl53@XgKw2Ro@x&VvAYNAc0xQr;h}CkHmWu>02noRmSRn=>ArSktoFtX1>aMBk z>fX6&)zwnFe9rH4j_vdP|Nnjd3!EIk_NCvie+7T*XU+K5x89+D;aC5N`RUL7>(5bt z_UhM|UwP&`-z@wl^0zMd8yEbg3o`JfqbKh^d3^im55Mt0|MK+7oy3h3du&c-6X%V$ zP^*rP91C@8m2$&GF}vZ6Y}>5ccBzck>!wq-YciO4Vx3u`7*=?Ury0 zIYwUjuP5Jn=TpD;-FIuhA*}wc`@*09)}3GfmiH&W{0-!<9q?@j`3nd6-B-Xfoyc(` zH$r~r733FR0^szt6M4x0efs#@FM>~q{VwvyFCu^NBJ%YY&-%BG-@N_i_J?FRL3)j1 zdWygb6rnJ?Rv-!j)ukzla62B63MAnP@&I2?-Dbk}`V}@?ITluJHf)+`k)F34PyJ3; zmTAH#7or@efRc53Aj=$+HV10XC?cGQD5(rZiY*yqV^cHMc355L3Zsdnyz3)3qNHN% zN??o(=vvh`hmvpQj4G1C{^GINHiqM|H6&xBU-c~v-LN?^AU$b75~4zf(zqQCD!Num zfyJpS9cv^aSsBs_Qx$1B6&0c)D)7k8VVeNk#H@4PmYNFF7K!O@GC+<+YA_HtOiuLn zGk6L$mBtnqgjTt^GBswy`h>dgvlV&(`z9o3hb){p$bpXG8t*mFK z?EX2?Oj`Bzel>78HnF))&<>?FuoTh|Ns%M7CD#`#4Z>qMiaPy0Wq1M=2$Hk-Ql-pv zn>;bK_&Q$F+JTCVlB|YTSaQH5!{kx{N*NvZ7&b3@2|bh{e52Z!ttf+ty2Yh!WcWg*Zq0quLSq8jOH z3KDe9dMiOIwoFd%^cT)lrUa%qGu>E`@Ns?Ej{MM4gCZ^ur=-0|hZ&zbBchbjlU|6a zV221sqA#Q5V=S=2d*%p9k5yg*e(t%NK@?T$#Tey~6^@ZWC`aXz8%K_rTd z%1$jUSjpUdU}C3mzv=wx-k=D1zfS<%C^P}LrtA@n&hS%V7O;hER?7zbq%-x~QPyfW zPJ?HLTDc?|Ic4INerv=_N!V9Q$_zBU3LX}VvZ`SkrLmo*z;H}EN;XiH1d&33Y%$@Jl$;84;@bVc-TvUZ{ojWJ_GDp9 zw0v*Y?vq(44tV!Y~0kD`*WbtocHzRWulin2_eEtx2Ov><@zhE~C-H zUb02DxvB{rf^Q3^Pzr?Qtis2s_r)(>g8}k+aI4P~7;=02f3?>9s|RADw+k%G115Te z*jVvBPM?q0U8mxB)Y4J8zIs2@Q;TNW&?D{L^P_raaB$BL_RjN^BX&`YhK?S!cxmUM z!9^EsDTK?W=mrK6RD@2vLo@J5ny_sfSaQ*yp0$Zwx}kES3HDoASBPMsh&?f7_Ax+U z(gm$+n}rcJGAj(mVoy)m{R(&{Eh)NI@p`i+^ogOgurX;Z_T-e=?mAg+F==v7@URrd z6iIIv%7~5FbGS{eW6WwBKf#3nnraH6ke+=S!Ugg?oQouxN)$o#*NW6)%k@UJUSR6t zdXNCAHf+lguB%y{gxe^?3k|Nqhb$fiVP?tg>VZqa%Uu zBGf6sSdkF71EsC~038xKdx5O55z92DHDYaMVK<102~c^bwxa4pWyG=0I;k-;yi8|N zRV3zTL3Xzq)FYtRp#+%@c#l*{O$nQhvk?ec9=Fu_VpyI>G{2d2+v0R!Ny>&WRwWpb zY++DvSM_yD8B2;QSKEtT*)mjam=E%qTv~(PLXY}sfXC?kI)okHCY*3Gi%-hnnVxIH zgfB*Z68X&0lQ2y@LTGAkS!Hd+`oXy;z2eaa6VkeXNEJltFhQ~h!o~6u%X-$GjGI3+%(+B`Z z;MM^985DWq%t`{!w#?DgB%}FsyZoO*D&Wp^+k$?ffi|$ylhVZ#?BYpzcXBq~33!fz z>u_iBDpsgse*5WH-hTVFGn>zVXLmNr zBy{Ji1bH601)jpeM>PsY)cs4ef{{?PWFW2D<{a$pCI4+?0M%q4|MwKHW3<4&Yiy0$8%L- z{A4zsgrp)E0TX1(rGnn#u~XQfB=Tv<0V z=Kg#8K|)#lexs}_66hXf8DOxUPNu6q`UY7MU`%|+K2qqrYW)p?bSSM`;(90Wn4jH@b-7dmK+GbOcApSkvC z-I}bXrZOF+qCrnVugQ(olGsr39y(iI&rRNont+Sk{x{?Jhsnd%tY_PnEHdnDxBnA~AWjmJ@!9a?&Y; z5IxF@z1|>ND*j4ZVDox=Y~SP3;WIc_#)xF2Yid8N7Puxm$9Qo)n=J=&gUMC}v1yrT znUwnjjih=ECGd69PzNMf^`~oB?Lu|1LQ!3f@S~QqiTznEUXX-8g-Tz4d5tPy{PS~= zHvH#p@HjDioESb%3_sw+5V>s!6L*#z|Hos%J!WE$nb-%;#E@GH*NqO!$_aX|;`})B zLoo2Yd_ga}v(=8TKLV$C^}-a-A$QKEIM?G&pj^hxoOu+x zA#@JN%_cgNiQe67Kc%hq^G~lI|I(@U^W_ude?N=-_g?$ib^hZ6lWJADPy1=DIif5H zC?T@l>XKa#8`LnoEckyI+Rt7Qzk&91$?)T*{oMEU_-gIvlHrZCpJKrmJBxMQkcDD( z*juqJreEP!k%v}gx6-Ye`O0d$YpEM9l}JH5W^Pe}RX4IG?-g}m8iV$*S5mY#HyjI` zg0*Zb9%LV)_G8wQc9%A^ctb_&&fJ{_RL*t1plC*QQ?5!`Mi#4fLKP(Mo@DxvOM~ra zW^3KY{E5^cOHrRESEYF7(qb}h)Z*q?(lLp|rwcEjjhviQ0-MaNMWLz;=S$WKFd(7J z+*+Y{btw-=#Bfy4vdUoI=c5u)yC#`_6y2va*>r}}WNucSa@K^O)>pL|liq({ABygC z2{>1&tCtKP3Sl3;?z4Fm-Dgh6a_kgc;JGnJc{r&pwQSsy^Q6&PHhHC6CCY5Dl%+fy zMts(uOO=^K+UuFmvzZq8mG(?779`040bX5T)nHj@43=T*`_z3N1uU0!pJrI1{YKcH zkTX<~WHL+Zr0Y+L!;R+ltFwhRn^P(p)@{8CbsrX#e7w;Z7a=Vdm;tt~Y!tkg*KDz9 zSF1(7*QUK_;g6+c@WJao(rP-x#_J$iw8>^Nin>~%3kwYHD?j;Abe~JO*zi~DK9`Jd z1fma7_qh~(m}_*OOU74+s&n0kHp+6fkm~DZznbHAec9J3S+0~uMM-RWa$Ut_qb-%O z`m8dhN;I>YH1brfgG9*!X{qaZ6zYMM#aLlBG`O@pa#;!s%?F06_fPjpl&((s>uQ4& zFl9ALqrDZ*GiD{m9CsKVfj5ML3bnZ=>?$LetjbJoF8J6V@C!$zKvl5MM!nRYT zxf&)`yV!zVj+f$Q!$IALu0-0#U;sJPOYE}kqbMbk9Uot7PTY6aYHB3JYG@UQwJCN@ zs51V3tNZ->ZSXiL{CMa-mjHCt2f<5*S0n8pu)+_5kCVcWDk(hEe7^G-Y#$fR=Msh< zgKb~iwXgF9kCId#z9nw!d_OV<_9%MKRvURZz2}}QZld>WFL)Ha=i)>Mz32EX@X~43 z78SX>vZd}knAjQAo1TRgMMnqy>G#N ox~{yfn^nD?z>2VgGWh*edu_)#6bqh>b6;iI*{eSSPwfBwKLt3%yZ`_I literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..03cece1c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,727 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:25:03Z", + "tls_cert_hash": null, + "tx_id": "0b70fdb0e6439a02c9dfcca7cc13077ad3c66dde9c7a8e785b1556dc494ce18b", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "8AFA4xG2+e02okl11VAPyaYLm8Rnxoq8" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "W7k3jThAe2FzBMTjRIaSwUVeJuZ8Q8gZsEWPB+jCK6U=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.json new file mode 100644 index 00000000..307d1522 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.json @@ -0,0 +1,993 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRUVlZQy83enNIYld4NHBGRmZqalYyekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUV2bXBSMUlNTEUzZmsvUWlOOWM0ZVMweGxmLzEwV1dtZWhibWhjL3pLZTg0LzZWUHF3aTA2K3AvdworNW1UL1gvYnFNcmo0SEZ2RjllbmlsREhhQm5LZ2FOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDREhMMjBpeW96SitWKzRmUGZQdEJaa2VJeFdycVMrdmNJc1kwTGJMbGFFUmpBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQTZ6bm9wdzY3dEFBOFh0STBNYjFXd0lXSnhoZ1duMVdJMVppbWdCVWw1U2dJZ1ZISmpibFdmClNVZWxZZmRuNDhYN0JySlQ4VGJaR0QzR3I0bmdlc212M1RFPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "kafka" + }, + "version": "0" + }, + "KafkaBrokers": { + "mod_policy": "Admins", + "value": { + "brokers": [ + "kafka0:9092", + "kafka1:9092", + "kafka2:9092", + "kafka3:9092" + ] + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.2/kafka/channel-artifacts/updated_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..6be98b139223fd6ef93c0d404c3fff40fa1ce2be GIT binary patch literal 18695 zcmeHPORVEqTAqGPbRP-doi*HLcMt zsmkT!|3Al%^Pm6!zw>{&{|fShKY9uI>-WHGop5S~W{CXxd&uv88Gwt^PG}+j^UlM+ ze;d3aDqZC7-bViRZRBs>K3>loe{%0T`5%(u1nHX;(^Cajpa_-OwE|HPs4h)WgxRr( zL?8)EkO%l?VK!s7r&QQZlJf2vxfP{8#;yfsoPv>7b@ZX+7#Y(SNnx)% z7u)0Ed~OWMXslEn11oOXj2MuXG$094r9Elh_6C)aR!V@u_17b;5sPGHNUKa$q~%0Z ziHfMgBOAar0k(;0=dvx)Ri-Txi``&=oQu?8Aa0qA=z^Dg#)`87-9I9r3qy(5U3QkzqR9?^(G0se@`@%RGpDhbxn?qC*0O; zd(s9NDmfNOkt5R;r-+pXVKE#cV%tqNJG(^m&su+MbUkhB<!&+-WLt8pG>L|s5+C462VwnN7=`Ywvg!v#56Cc~6ZrZb|H(00$m`e0`fj6|PX$)g|KXhf6) zjmV%bjY!XMYJ?Z4%B&TWg|OWbsr4_G5e=N@ZA6?yjP^z(icFtf7@E75xyOu&UBLM^ z;xFa~MacVk0^mfU2{<)ni(p0!zYu(vEu?-e9q@K%;k3iF)tF8jJTuhFC2^clI$lv) zGhT{4rC(Bg(6lPJhoW*{!!$}`J1c?Vn06R@Y-3h*3al8MgZ*d}txmdc1G*iYq=O1J}6?1>4p_W=TvEa{Q9U5>p*YIyEk z?2Qt3e+N91l+=+{v3h}~_BnCKbN z+4};VBxX1R-8e<)qlC}jNw4UV;iL<#D4QEQjSFr1`DgZHtS6A*owpye>hHG!X^`b6wvg)Oba4 z7H)(-Z9U zq`W&h_V);Ufz;#4T(L6~`7-kQeemGpk3atWdmn%N&7;gWz#BUm)%MI_9V2fcuY#Ac z=y3hfqs!0qF7oF6SCB6p8%|{oU*#xs(QqPj_z3SIZ^3TB;iEiw`6%-t_#){Blf^)H z?Wvx>LF7sO9X=28lMQ&CST0?AvRC-=27cimeUK*;Rw+*n{`7S+$v!`cG zp1>h{I!T^j0x{V+0ctMFFm3V0$FdCQC?+Bq>|_AEK{fXhpDcKDHUdZzEjVIlxv7t3 z0j&;uYqrHG6>c3`#j0#px>Y?}8*OtVb-k4us>P0;8I)ku$7z$d&=JtbgZ8jjQnfZW zoC}9H1Vsc_Q?%!Ny3T-S0@J*?|;RZ3G5 ztxjU9AX$%xD7$O~^96!#Xk6}b@x<2S8Z6npqShJm06O^(Si zS6Uhias$K9$@YLz9D#r*IH|3)bl#G)xY1cPd9_<5%B;JR zr7RtWeA*7AiZ79qjqmVms)bIa?aOFElE%Qrt4plvt_qF8%4=PpyL?jW0#0+6XEByM zCEMlh$K0jqm1w8owQbTbs*+5mNu4wu8y#*nQ>pq(%@3%4(W_5JRhYW4pyc3<#vF}W zp1=&SO=YX%y{tA7(Mh$6^1U`~g-d5H#e=8JUHbYUX;7)+5&VN(2jbC+AWsB90_IkDSrtvRo}BqfJw(X85GOQbv?4S4uNf5}TG>?_=_~ zEtRplUzt-SnpxY8Ea}%ltfsEC8jZ5h8@WarVFiCU=92QvWGT$kZ**1QHptm^t_tuM z$XTp*N0hUvHaG!O*Rxm(N*ydIk3y4JWLeji>h>_ygo4_+8Z^OoaEYApTVdSrWC-65 zZBeWj(-Mtsz4o+9b2Ut?cCjV9nyUiVHjR|& zrk{*sVm&m_VQqn3gGXBZSB_a?4w`tiemyEC@C4D2og z`9)7 zXqIS^tX4X3Ta8)}C`FWMwA^wMQ?5l;(&BCmzYo#(r$>rrq~DsbIt_P|jdqK*r|xWI zQIcqmwn|pvQNBWtY)@ZROyco`kj`^ou-mxnib08Fz3z0#uVaatX{tcg7t2DaZ47(Z zg3+u7J}EO{r_qMVZ%5(?r8tczp}yIGX1lQN1tnERaaM{O)v>|W)ehe@hbz9GT)T1i zENGF$Y&Km=v&b?wU5~~HHWpEE}?V^-Qll( znhoZ|$}*V*N^8p%Lj%7O!odBm7lQqWx5a+W1aB2k=ew^js7ffkE%tLJcpDc_;9YCo z>og}yBM9V5Ww=?>EVr0Bi)oj$9vJ=lgfi#cG>uy0pi~`_y{@M&1=iSPWC^CSQ;2C!$|$ZD zrppPSNW9;Q3tYsP(KC;CYcI&o*gw1awdczIIWJ&4n{k)U@KC=7c2xmqg10Z$28U|xeTCoC7i&WT)4p2! zSgbAM3B9lMZZpZ)fixo5@a5C2TVxjpazi5pRR-S*rvFeR7-f++@vBCi+o*SR9E9DemS1ns*;qe3v{Wc9J)xs8W*N=jo`?7 z#|(B>4ylK@*S>Bn@EdDl$!)uq}$(NP^hcIzD5}r-M2ZU9NjyQ53^V|3F;u47Yz&u%8WZvh)R!g`&O)c_ z&2n2ylf;mGnT?e(o(R?~R%FmC!-|Xsk%X+>H)lg_)~_3-q~S4TR2~e%M41lI>QcC_ z{`!pJaEmIT-Sz}_s1lOp(TGCpS;QOKwz6c|nd1zwljppk&h4sdUbyk>fD%~fb*!p^ z#I=hG&}TFtkW(N;ezc=IJc|K=Q@X>^fO?CB&8agv+hI#W`rsrx!$vR4?f?{mtc~%3 zweiWq*Oc8se!-qHwDFd`k|4I3@@#?1u%dHPF_q%houQ?org`Sv@a7XVYngZjtqr=X z#4gqfOEdw6s;8nu)L4nI_>N~cY{T?zm*#c2X<+G6EOMVj8RERW$SE(o15H`pQ6qD@ z!v))cx>DS#65U-8+}kl87*d6H2WfU9wPVOk0d2`PNzr^8E81z0H4B46W!9Z_V{*JO zg{>B@l)`2rM5AKcXuCSobFMDufH+znQOo>bnbhhrLEyt!D2hf&O9ZXCom-k;(uC63 z_AIjRRuxOI27J>oTx|xFzUhu;Q@?@_>txtean%@ebeRh)J}hJOHf5E$&ho~e0{6KK z3ZII1d%M!{v-RN8^Ik0-KNGwQ3P1Bf;itrX?hNkE;O?@pr^&*e75B+;k|XXjysQ=y z5ejaTd>?@fJ$QtqK=?O5zWne|(vxdKaOTSCD_2i1xn&G^?SKz`7b(J?zKy(rfXkk* z>OI!$WjD70jV|u%g70=J|t|X`c|vJ=Skj z#KBh%inO_OgETK~QsJ;o)anexHNqSyuX_jxy|JB!uBmC4%d@-9hz_fzIXqp z@Xr^Y?rlB%5P+QV9E7pG_8{pR0S}ZN$@a4K*yFE&2N&ZKt`$Ir_uNAe8<(c2D7pukNr7IlY-KB@`9#`6nPSFc)`fWb+ IbN&YZ52kdV4gdfE literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/kafka/configtx.yaml b/hyperledger_fabric/v1.4.2/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.2/kafka/logs/dev_all.log b/hyperledger_fabric/v1.4.2/kafka/logs/dev_all.log new file mode 100644 index 00000000..e5d3ec95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/logs/dev_all.log @@ -0,0 +1,2307 @@ +Attaching to peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org2.example.com, orderer1.example.com, orderer0.example.com, kafka2, kafka3, kafka1, kafka0, fabric-cli, zookeeper0, zookeeper1, zookeeper2 +peer1.org2.example.com | "2019-04-22 06:25:23.818 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 2.0.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.11.5 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-04-22 06:25:23.818 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.14:7051" +peer1.org2.example.com | "2019-04-22 06:25:23.819 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-04-22 06:25:23.857 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-04-22 06:25:23.858 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org2.example.com | "2019-04-22 06:25:24.172 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org2.example.com | "2019-04-22 06:25:24.262 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org2.example.com | "2019-04-22 06:25:24.264 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-04-22 06:25:24.368 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-04-22 06:25:24.382 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-04-22 06:25:24.382 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-04-22 06:25:24.413 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.415 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.419 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.420 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.456 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:24.500 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-04-22 06:25:24.501 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-04-22 06:25:24.510 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.513 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:25:24.515 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.520 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org2.example.com | "2019-04-22 06:25:24.522 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.528 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.528 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org2.example.com | "2019-04-22 06:25:24.529 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:58.338 UTC [endorser] callChaincode -> INFO 01e [][8c945825] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:25:58.351 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:25:58.357 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org2.example.com | "2019-04-22 06:25:58.394 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=2ms block_commit=9ms state_commit=7ms)" +peer1.org2.example.com | "2019-04-22 06:25:58.399 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:25:58.411 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:25:58.412 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:25:58.412 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:25:58.458 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-04-22 06:25:58.464 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.467 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:25:58.468 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.469 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org2.example.com | "2019-04-22 06:25:58.470 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.471 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.472 UTC [endorser] callChaincode -> INFO 02d [][8c945825] Exit chaincode: name:"cscc" (132ms)" +peer1.org2.example.com | "2019-04-22 06:25:58.473 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46914 grpc.code=OK grpc.call_duration=138.8265ms +peer1.org2.example.com | "2019-04-22 06:25:59.598 UTC [endorser] callChaincode -> INFO 02f [][6d743538] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:25:59.600 UTC [endorser] callChaincode -> INFO 030 [][6d743538] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:25:59.600 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46922 grpc.code=OK grpc.call_duration=3.2871ms +peer1.org2.example.com | "2019-04-22 06:26:00.746 UTC [endorser] callChaincode -> INFO 032 [][b8bc8f2d] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:26:00.751 UTC [endorser] callChaincode -> INFO 033 [][b8bc8f2d] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:26:00.752 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46930 grpc.code=OK grpc.call_duration=6.1367ms +peer1.org2.example.com | "2019-04-22 06:26:04.464 UTC [gossip.election] beLeader -> INFO 035 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer1.org2.example.com | "2019-04-22 06:26:04.464 UTC [gossip.service] func1 -> INFO 036 Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:26:04.492 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:26:04.570 UTC [committer.txvalidator] Validate -> INFO 03b [businesschannel] Validated block [1] in 78ms" +peer1.org2.example.com | "2019-04-22 06:26:04.595 UTC [kvledger] CommitWithPvtData -> INFO 03c [businesschannel] Committed block [1] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=16ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:26:04.596 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.633 UTC [gossip.comm] func1 -> WARN 041 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:26:04.633 UTC [gossip.discovery] expireDeadMembers -> WARN 042 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-04-22 06:26:04.634 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-04-22 06:26:04.634 UTC [gossip.discovery] expireDeadMembers -> WARN 044 Exiting" +peer1.org2.example.com | "2019-04-22 06:26:04.644 UTC [committer.txvalidator] Validate -> INFO 045 [businesschannel] Validated block [2] in 47ms" +peer1.org2.example.com | "2019-04-22 06:26:04.683 UTC [kvledger] CommitWithPvtData -> INFO 046 [businesschannel] Committed block [2] with 1 transaction(s) in 37ms (state_validation=4ms block_commit=14ms state_commit=14ms)" +peer1.org2.example.com | "2019-04-22 06:26:04.774 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.773Z grpc.peer_address=192.168.224.15:49714 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.4µs +peer1.org2.example.com | "2019-04-22 06:26:05.860 UTC [gossip.gossip] validateMsg -> WARN 048 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914357825409200 seq_num:1555914363930993100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-04-22 06:26:05.860 UTC [gossip.gossip] handleMessage -> WARN 049 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914357825409200 seq_num:1555914363930993100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-04-22 06:26:08.412 UTC [gossip.channel] reportMembershipChanges -> INFO 04a Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:26:09.129 UTC [gossip.election] stopBeingLeader -> INFO 04b 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-04-22 06:26:09.130 UTC [gossip.service] func1 -> INFO 04c Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:26:09.131 UTC [deliveryClient] try -> WARN 04d Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-04-22 06:26:09.131 UTC [blocksProvider] DeliverBlocks -> WARN 04e [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-04-22 06:26:11.216 UTC [endorser] callChaincode -> INFO 04f [][f7b7acc5] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-04-22 06:26:11.217 UTC [endorser] callChaincode -> INFO 050 [][f7b7acc5] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-04-22 06:26:11.218 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46994 grpc.code=OK grpc.call_duration=2.8337ms +peer1.org2.example.com | "2019-04-22 06:26:14.238 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:14.246 UTC [committer.txvalidator] Validate -> INFO 053 [businesschannel] Validated block [3] in 6ms" +peer1.org2.example.com | "2019-04-22 06:26:14.248 UTC [confighistory] HandleStateUpdates -> ERRO 054 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003215860)}" +peer1.org2.example.com | "2019-04-22 06:26:14.289 UTC [kvledger] CommitWithPvtData -> INFO 055 [businesschannel] Committed block [3] with 1 transaction(s) in 41ms (state_validation=7ms block_commit=16ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:26:17.013 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:17.016 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [4] in 3ms" +peer1.org2.example.com | "2019-04-22 06:26:17.027 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (9ms)" +peer1.org2.example.com | "2019-04-22 06:26:17.028 UTC [confighistory] HandleStateUpdates -> ERRO 059 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002ed8ba0)}" +peer1.org2.example.com | "2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 05a [businesschannel] Committed block [4] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=17ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:26:18.415 UTC [gossip.channel] reportMembershipChanges -> INFO 05b Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:26:20.881 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:20.884 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [5] in 2ms" +peer1.org2.example.com | "2019-04-22 06:26:20.885 UTC [lifecycle] update -> INFO 05e Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [lifecycle] update -> INFO 05f Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [cceventmgmt] HandleStateUpdates -> INFO 060 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 061 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 062 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-04-22 06:26:20.916 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [5] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=18ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:07.590 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:07.596 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [6] in 5ms" +peer1.org2.example.com | "2019-04-22 06:27:07.615 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [6] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=11ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:27:13.025 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:13.029 UTC [committer.txvalidator] Validate -> INFO 068 [businesschannel] Validated block [7] in 2ms" +peer1.org2.example.com | "2019-04-22 06:27:13.059 UTC [kvledger] CommitWithPvtData -> INFO 069 [businesschannel] Committed block [7] with 1 transaction(s) in 29ms (state_validation=0ms block_commit=22ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:15.735 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:15.738 UTC [committer.txvalidator] Validate -> INFO 06b [businesschannel] Validated block [8] in 1ms" +peer1.org2.example.com | "2019-04-22 06:27:15.753 UTC [kvledger] CommitWithPvtData -> INFO 06c [businesschannel] Committed block [8] with 1 transaction(s) in 14ms (state_validation=0ms block_commit=8ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:27:37.555 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:37.558 UTC [cauthdsl] deduplicate -> WARN 06e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:27:37.560 UTC [cauthdsl] deduplicate -> WARN 06f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:27:37.638 UTC [gossip.gossip] JoinChan -> INFO 070 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-04-22 06:27:37.640 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:27:37.642 UTC [gossip.gossip] learnAnchorPeers -> INFO 072 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:27:37.659 UTC [gossip.gossip] learnAnchorPeers -> INFO 073 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:27:37.663 UTC [gossip.service] updateEndpoints -> WARN 074 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:27:37.706 UTC [committer.txvalidator] Validate -> INFO 075 [businesschannel] Validated block [9] in 149ms" +peer1.org2.example.com | "2019-04-22 06:27:37.738 UTC [kvledger] CommitWithPvtData -> INFO 076 [businesschannel] Committed block [9] with 1 transaction(s) in 29ms (state_validation=1ms block_commit=20ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:37.760 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:49714 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.0776155s +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.comm] func1 -> WARN 078 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-04-22 06:27:37.770 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Exiting" +peer1.org2.example.com | "2019-04-22 06:27:37.802 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.801Z grpc.peer_address=192.168.224.15:49894 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.7µs +peer1.org2.example.com | "2019-04-22 06:27:37.857 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.856Z grpc.peer_address=192.168.224.12:47518 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=153.8µs +peer1.org2.example.com | "2019-04-22 06:27:38.329 UTC [gossip.channel] reportMembershipChanges -> INFO 07e Membership view has changed. peers went offline: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:27:43.317 UTC [gossip.channel] reportMembershipChanges -> INFO 07f Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:28:08.917 UTC [endorser] callChaincode -> INFO 080 [][279715fd] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:28:08.919 UTC [endorser] callChaincode -> INFO 081 [][279715fd] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:28:08.920 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:47210 grpc.code=OK grpc.call_duration=4.7664ms +peer1.org2.example.com | "2019-04-22 06:28:10.868 UTC [endorser] callChaincode -> INFO 083 [][ac6bf428] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:28:10.872 UTC [endorser] callChaincode -> INFO 084 [][ac6bf428] Exit chaincode: name:"qscc" (3ms)" +peer1.org2.example.com | "2019-04-22 06:28:10.878 UTC [comm.grpc.server] 1 -> INFO 085 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:47218 grpc.code=OK grpc.call_duration=12.062ms +peer1.org1.example.com | "2019-04-22 06:25:23.526 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.11.5 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-04-22 06:25:23.527 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.13:7051" +peer1.org1.example.com | "2019-04-22 06:25:23.527 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-04-22 06:25:23.574 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-04-22 06:25:23.574 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org1.example.com | "2019-04-22 06:25:23.743 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org1.example.com | "2019-04-22 06:25:23.870 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org1.example.com | "2019-04-22 06:25:23.875 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-04-22 06:25:23.937 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-04-22 06:25:23.970 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-04-22 06:25:23.971 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-04-22 06:25:23.999 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.022 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.025 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.026 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.066 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:24.109 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-04-22 06:25:24.127 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-04-22 06:25:24.145 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.155 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:25:24.161 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.166 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org1.example.com | "2019-04-22 06:25:24.166 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.174 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.174 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org1.example.com | "2019-04-22 06:25:24.181 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-04-22 06:25:24.181 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org1.example.com | "2019-04-22 06:25:24.183 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:24.183 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:57.764 UTC [endorser] callChaincode -> INFO 01e [][a976acfd] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:25:57.778 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:25:57.783 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org1.example.com | "2019-04-22 06:25:57.811 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_commit=8ms state_commit=2ms)" +peer1.org1.example.com | "2019-04-22 06:25:57.814 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:25:57.861 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-04-22 06:25:57.871 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.872 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:25:57.872 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.873 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:25:57.873 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.874 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.875 UTC [endorser] callChaincode -> INFO 02d [][a976acfd] Exit chaincode: name:"cscc" (109ms)" +peer1.org1.example.com | "2019-04-22 06:25:57.876 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42156 grpc.code=OK grpc.call_duration=118.018ms +peer1.org1.example.com | "2019-04-22 06:25:59.236 UTC [endorser] callChaincode -> INFO 02f [][b2e9a16b] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:25:59.237 UTC [endorser] callChaincode -> INFO 030 [][b2e9a16b] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:25:59.237 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42164 grpc.code=OK grpc.call_duration=2.6881ms +peer1.org1.example.com | "2019-04-22 06:26:00.302 UTC [endorser] callChaincode -> INFO 032 [][669863dc] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:26:00.307 UTC [endorser] callChaincode -> INFO 033 [][669863dc] Exit chaincode: name:"qscc" (6ms)" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org1.example.com | Version: 2.0.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.11.5 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.15:7051" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:25:24.158 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:25:24.158 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org1.example.com | "2019-04-22 06:25:24.417 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org1.example.com | "2019-04-22 06:25:24.511 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org1.example.com | "2019-04-22 06:25:24.512 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-04-22 06:25:24.531 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:25:24.543 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-04-22 06:25:24.544 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:25:24.561 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.576 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.597 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-04-22 06:25:24.602 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-04-22 06:25:24.603 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-04-22 06:25:24.604 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.612 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org1.example.com | "2019-04-22 06:25:24.613 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.615 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:25:24.615 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.617 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.617 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:25:24.629 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:25:25.153 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.153Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.3µs +peer0.org1.example.com | "2019-04-22 06:25:25.175 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:25:35.155Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9729ms +peer0.org1.example.com | "2019-04-22 06:25:25.195 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.194Z grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.7µs +peer0.org1.example.com | "2019-04-22 06:25:57.209 UTC [endorser] callChaincode -> INFO 021 [][24f3659e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:25:57.222 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:25:57.229 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:25:57.250 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=2ms block_commit=7ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:25:57.256 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:25:57.312 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-04-22 06:25:57.315 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.321 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org1.example.com | "2019-04-22 06:25:57.322 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.322 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org1.example.com | "2019-04-22 06:25:57.323 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.324 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:26:00.308 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42172 grpc.code=OK grpc.call_duration=6.7198ms +peer1.org1.example.com | "2019-04-22 06:26:02.826 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:26:03.326 UTC [gossip.election] leaderElection -> INFO 036 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:26:03.368 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:03.385 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:26:03.386 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.387 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:26:03.395 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:26:03.410 UTC [committer.txvalidator] Validate -> INFO 03c [businesschannel] Validated block [1] in 42ms" +peer1.org1.example.com | "2019-04-22 06:26:03.454 UTC [kvledger] CommitWithPvtData -> INFO 03d [businesschannel] Committed block [1] with 1 transaction(s) in 38ms (state_validation=5ms block_commit=24ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:03.812 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.812Z grpc.peer_address=192.168.224.15:36486 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.1µs +peer1.org1.example.com | "2019-04-22 06:26:03.841 UTC [gossip.privdata] StoreBlock -> INFO 03f [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:03.876 UTC [gossip.gossip] JoinChan -> INFO 040 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:26:03.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 041 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.878 UTC [gossip.gossip] learnAnchorPeers -> INFO 042 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.878 UTC [gossip.service] updateEndpoints -> WARN 043 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:26:03.909 UTC [committer.txvalidator] Validate -> INFO 044 [businesschannel] Validated block [2] in 66ms" +peer1.org1.example.com | "2019-04-22 06:26:03.930 UTC [kvledger] CommitWithPvtData -> INFO 045 [businesschannel] Committed block [2] with 1 transaction(s) in 19ms (state_validation=4ms block_commit=9ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:36486 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=170.1142ms +peer1.org1.example.com | "2019-04-22 06:26:04.083 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.083Z grpc.peer_address=192.168.224.15:36500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.2µs +peer1.org1.example.com | "2019-04-22 06:26:04.090 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:36500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=5.5683ms +peer1.org1.example.com | "2019-04-22 06:26:07.827 UTC [gossip.channel] reportMembershipChanges -> INFO 049 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:26:09.426 UTC [endorser] callChaincode -> INFO 04a [][5166f39c] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-04-22 06:26:09.427 UTC [endorser] callChaincode -> INFO 04b [][5166f39c] Exit chaincode: name:"_lifecycle" (2ms)" +peer1.org1.example.com | "2019-04-22 06:26:09.429 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42232 grpc.code=OK grpc.call_duration=3.803ms +peer1.org1.example.com | "2019-04-22 06:26:14.105 UTC [comm.grpc.server] 1 -> INFO 04d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:16.104Z grpc.peer_address=192.168.224.14:37012 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.4µs +peer1.org1.example.com | "2019-04-22 06:26:14.302 UTC [gossip.privdata] StoreBlock -> INFO 04e [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:14.307 UTC [committer.txvalidator] Validate -> INFO 04f [businesschannel] Validated block [3] in 4ms" +peer1.org1.example.com | "2019-04-22 06:26:14.329 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (19ms)" +peer1.org1.example.com | "2019-04-22 06:26:14.330 UTC [confighistory] HandleStateUpdates -> ERRO 051 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037f55c0)}" +peer1.org1.example.com | "2019-04-22 06:26:14.347 UTC [kvledger] CommitWithPvtData -> INFO 052 [businesschannel] Committed block [3] with 1 transaction(s) in 18ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:17.015 UTC [gossip.privdata] StoreBlock -> INFO 053 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:17.022 UTC [committer.txvalidator] Validate -> INFO 054 [businesschannel] Validated block [4] in 6ms" +peer1.org1.example.com | "2019-04-22 06:26:17.026 UTC [confighistory] HandleStateUpdates -> ERRO 055 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039df940)}" +peer1.org1.example.com | "2019-04-22 06:26:17.054 UTC [kvledger] CommitWithPvtData -> INFO 056 [businesschannel] Committed block [4] with 1 transaction(s) in 30ms (state_validation=4ms block_commit=19ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:26:17.828 UTC [gossip.channel] reportMembershipChanges -> INFO 057 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:26:20.943 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:20.962 UTC [committer.txvalidator] Validate -> INFO 059 [businesschannel] Validated block [5] in 18ms" +peer1.org1.example.com | "2019-04-22 06:26:20.969 UTC [lifecycle] update -> INFO 05a Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:25:23.340 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.11.5 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-04-22 06:25:23.361 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.12:7051" +peer0.org2.example.com | "2019-04-22 06:25:23.378 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-04-22 06:25:23.388 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-04-22 06:26:20.970 UTC [lifecycle] update -> INFO 05b Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-04-22 06:26:20.970 UTC [cceventmgmt] HandleStateUpdates -> INFO 05c Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-04-22 06:26:20.971 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05d Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-04-22 06:26:20.971 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05e Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-04-22 06:26:21.002 UTC [kvledger] CommitWithPvtData -> INFO 05f [businesschannel] Committed block [5] with 1 transaction(s) in 37ms (state_validation=11ms block_commit=9ms state_commit=11ms)" +peer1.org1.example.com | "2019-04-22 06:27:07.543 UTC [gossip.privdata] StoreBlock -> INFO 060 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:07.547 UTC [committer.txvalidator] Validate -> INFO 061 [businesschannel] Validated block [6] in 3ms" +peer1.org1.example.com | "2019-04-22 06:27:07.576 UTC [kvledger] CommitWithPvtData -> INFO 062 [businesschannel] Committed block [6] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=20ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:27:13.056 UTC [gossip.privdata] StoreBlock -> INFO 063 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:13.071 UTC [committer.txvalidator] Validate -> INFO 064 [businesschannel] Validated block [7] in 11ms" +peer1.org1.example.com | "2019-04-22 06:27:13.088 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [7] with 1 transaction(s) in 15ms (state_validation=0ms block_commit=10ms state_commit=2ms)" +peer1.org1.example.com | "2019-04-22 06:27:15.705 UTC [gossip.privdata] StoreBlock -> INFO 066 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:15.708 UTC [committer.txvalidator] Validate -> INFO 067 [businesschannel] Validated block [8] in 1ms" +peer1.org1.example.com | "2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [8] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:27:37.514 UTC [gossip.privdata] StoreBlock -> INFO 069 [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:37.524 UTC [cauthdsl] deduplicate -> WARN 06a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:27:37.531 UTC [cauthdsl] deduplicate -> WARN 06b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] JoinChan -> INFO 06c Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:27:37.641 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:27:37.641 UTC [gossip.service] updateEndpoints -> WARN 070 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:27:37.674 UTC [committer.txvalidator] Validate -> INFO 071 [businesschannel] Validated block [9] in 159ms" +peer1.org1.example.com | "2019-04-22 06:27:37.705 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [9] with 1 transaction(s) in 30ms (state_validation=5ms block_commit=16ms state_commit=5ms)" +peer1.org1.example.com | "2019-04-22 06:27:37.733 UTC [gossip.comm] func1 -> WARN 073 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 074 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 075 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 076 Exiting" +peer1.org1.example.com | "2019-04-22 06:27:37.736 UTC [gossip.channel] reportMembershipChanges -> INFO 077 Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:27:37.763 UTC [gossip.comm] func1 -> WARN 078 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:27:37.766 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-04-22 06:27:37.767 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-04-22 06:27:37.767 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Exiting" +peer1.org1.example.com | "2019-04-22 06:27:37.840 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.84Z grpc.peer_address=192.168.224.15:36704 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.3µs +peer1.org1.example.com | "2019-04-22 06:27:37.846 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.845Z grpc.peer_address=192.168.224.12:47032 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.2µs +peer1.org1.example.com | "2019-04-22 06:27:42.732 UTC [gossip.channel] reportMembershipChanges -> INFO 07e Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:28:08.217 UTC [endorser] callChaincode -> INFO 07f [][dd86293c] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:28:08.226 UTC [endorser] callChaincode -> INFO 080 [][dd86293c] Exit chaincode: name:"cscc" (9ms)" +peer1.org1.example.com | "2019-04-22 06:28:08.227 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42452 grpc.code=OK grpc.call_duration=10.5961ms +peer1.org1.example.com | "2019-04-22 06:28:10.223 UTC [endorser] callChaincode -> INFO 082 [][4747cedb] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:28:10.226 UTC [endorser] callChaincode -> INFO 083 [][4747cedb] Exit chaincode: name:"qscc" (3ms)" +peer1.org1.example.com | "2019-04-22 06:28:10.228 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42460 grpc.code=OK grpc.call_duration=7.4968ms +peer0.org1.example.com | "2019-04-22 06:25:57.326 UTC [endorser] callChaincode -> INFO 030 [][24f3659e] Exit chaincode: name:"cscc" (116ms)" +peer0.org1.example.com | "2019-04-22 06:25:57.326 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45222 grpc.code=OK grpc.call_duration=125.6186ms +peer0.org1.example.com | "2019-04-22 06:25:59.068 UTC [endorser] callChaincode -> INFO 032 [][1237c501] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:25:59.071 UTC [endorser] callChaincode -> INFO 033 [][1237c501] Exit chaincode: name:"cscc" (3ms)" +peer0.org1.example.com | "2019-04-22 06:25:59.071 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45230 grpc.code=OK grpc.call_duration=4.0206ms +peer0.org1.example.com | "2019-04-22 06:26:00.131 UTC [endorser] callChaincode -> INFO 035 [][3a9cff56] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:26:00.133 UTC [endorser] callChaincode -> INFO 036 [][3a9cff56] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:26:00.134 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45238 grpc.code=OK grpc.call_duration=3.7135ms +peer0.org1.example.com | "2019-04-22 06:26:02.277 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:26:03.317 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:26:03.317 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:26:03.350 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:26:03.397 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" +peer0.org1.example.com | "2019-04-22 06:26:03.403 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.402Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=322.4µs +peer0.org1.example.com | "2019-04-22 06:26:03.426 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=38.2627128s +peer0.org1.example.com | "2019-04-22 06:26:03.427 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.405Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.3911ms +peer0.org1.example.com | "2019-04-22 06:26:03.465 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 65ms (state_validation=2ms block_commit=30ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:26:03.784 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:03.831 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 049 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.935 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 150ms" +peer0.org1.example.com | "2019-04-22 06:26:03.949 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.948Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.411ms +peer0.org1.example.com | "2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.96Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4653ms +peer0.org1.example.com | "2019-04-22 06:26:03.993 UTC [kvledger] CommitWithPvtData -> INFO 04d [businesschannel] Committed block [2] with 1 transaction(s) in 48ms (state_validation=13ms block_commit=28ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:26:04.087 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.085Z grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=332.5µs +peer0.org1.example.com | "2019-04-22 06:26:04.256 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.255Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.7µs +peer0.org1.example.com | "2019-04-22 06:26:04.270 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.26Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.8223ms +peer0.org1.example.com | "2019-04-22 06:26:04.346 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.345Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=171.6µs +peer0.org1.example.com | "2019-04-22 06:26:04.362 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.349Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0755ms +peer0.org2.example.com | "2019-04-22 06:25:23.421 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org2.example.com | "2019-04-22 06:25:23.724 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org2.example.com | "2019-04-22 06:25:23.804 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org2.example.com | "2019-04-22 06:25:23.805 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-04-22 06:25:23.865 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-04-22 06:25:23.887 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-04-22 06:25:23.888 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-04-22 06:25:23.923 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.923 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.924 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.924 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.957 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:24.000 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-04-22 06:25:24.013 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-04-22 06:25:24.022 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.032 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:25:24.042 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.044 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org2.example.com | "2019-04-22 06:25:24.045 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.047 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:26:04.368 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.367Z grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.8µs +peer0.org1.example.com | "2019-04-22 06:26:04.533 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.532Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.1µs +peer0.org1.example.com | "2019-04-22 06:26:04.548 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.537Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2102ms +peer0.org1.example.com | "2019-04-22 06:26:04.580 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.579Z grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301µs +peer0.org1.example.com | "2019-04-22 06:26:04.625 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.622Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.2801ms +peer0.org1.example.com | "2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=48.3559ms +peer0.org1.example.com | "2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 059 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.628Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0459ms +peer0.org1.example.com | "2019-04-22 06:26:07.280 UTC [gossip.channel] reportMembershipChanges -> INFO 05a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:26:08.476 UTC [endorser] callChaincode -> INFO 05b [][63dcaca1] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:08.494 UTC [endorser] callChaincode -> INFO 05c [][63dcaca1] Exit chaincode: name:"_lifecycle" (17ms)" +peer0.org1.example.com | "2019-04-22 06:26:08.494 UTC [comm.grpc.server] 1 -> INFO 05d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45296 grpc.code=OK grpc.call_duration=18.9812ms +peer0.org1.example.com | "2019-04-22 06:26:11.772 UTC [endorser] callChaincode -> INFO 05e [][81961895] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:11.773 UTC [endorser] callChaincode -> INFO 05f [][81961895] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:26:11.774 UTC [comm.grpc.server] 1 -> INFO 060 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45312 grpc.code=OK grpc.call_duration=2.3561ms +peer0.org1.example.com | "2019-04-22 06:26:12.084 UTC [endorser] callChaincode -> INFO 061 [][56bfd17c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:26:12.086 UTC [endorser] callChaincode -> INFO 062 [][56bfd17c] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:26:12.086 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=3.3137ms +peer0.org1.example.com | "2019-04-22 06:26:12.139 UTC [endorser] callChaincode -> INFO 064 [businesschannel][b65b3fc8] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:12.150 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 065 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:12.151 UTC [endorser] callChaincode -> INFO 066 [businesschannel][b65b3fc8] Exit chaincode: name:"_lifecycle" (12ms)" +peer0.org1.example.com | "2019-04-22 06:26:12.158 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=20.4184ms +peer0.org1.example.com | "2019-04-22 06:26:14.289 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:14.296 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [3] in 6ms" +peer0.org1.example.com | "2019-04-22 06:26:14.299 UTC [confighistory] HandleStateUpdates -> ERRO 06a Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0031ecf80)}" +peer0.org1.example.com | "2019-04-22 06:26:14.318 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [3] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=12ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:26:14.327 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:42.164Z grpc.peer_address=192.168.224.5:45318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1567108s +peer0.org1.example.com | "2019-04-22 06:26:17.004 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:17.008 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [4] in 3ms" +peer0.org1.example.com | "2019-04-22 06:26:17.010 UTC [confighistory] HandleStateUpdates -> ERRO 06f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033a3680)}" +peer0.org1.example.com | "2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=1ms block_commit=35ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:26:17.662 UTC [endorser] callChaincode -> INFO 071 [businesschannel][595fbc5e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:17.669 UTC [lifecycle] QueryApprovalStatus -> INFO 072 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:17.670 UTC [endorser] callChaincode -> INFO 073 [businesschannel][595fbc5e] Exit chaincode: name:"_lifecycle" (8ms)" +peer0.org1.example.com | "2019-04-22 06:26:17.671 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45334 grpc.code=OK grpc.call_duration=10.1874ms +peer0.org1.example.com | "2019-04-22 06:26:18.472 UTC [endorser] callChaincode -> INFO 075 [][e312980e] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:25:24.047 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org2.example.com | "2019-04-22 06:25:24.055 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-04-22 06:25:24.056 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org2.example.com | "2019-04-22 06:25:24.056 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:24.078 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:58.029 UTC [endorser] callChaincode -> INFO 01e [][29fe0e94] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:25:58.039 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:25:58.042 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer0.org2.example.com | "2019-04-22 06:25:58.067 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 20ms (state_validation=5ms block_commit=8ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:25:58.070 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:25:58.114 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-04-22 06:25:58.116 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.117 UTC [cscc] Init -> INFO 028 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:25:58.118 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.119 UTC [qscc] Init -> INFO 02a Init QSCC" +orderer1.example.com | 2019-04-22 06:25:20.152 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-04-22 06:25:20.396 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 1s +orderer1.example.com | Kafka.Retry.ShortTotal = 30s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = true +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +peer0.org1.example.com | "2019-04-22 06:26:18.473 UTC [endorser] callChaincode -> INFO 076 [][e312980e] Exit chaincode: name:"_lifecycle" (0ms)" +peer0.org1.example.com | "2019-04-22 06:26:18.473 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45342 grpc.code=OK grpc.call_duration=1.4673ms +peer0.org1.example.com | "2019-04-22 06:26:18.780 UTC [endorser] callChaincode -> INFO 078 [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:18.785 UTC [lifecycle] QueryApprovalStatus -> INFO 079 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:18.787 UTC [lifecycle] CommitChaincodeDefinition -> INFO 07a successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:18.787 UTC [endorser] callChaincode -> INFO 07b [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (7ms)" +peer0.org1.example.com | "2019-04-22 06:26:18.789 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45346 grpc.code=OK grpc.call_duration=9.7835ms +peer0.org1.example.com | "2019-04-22 06:26:20.935 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:20.938 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-04-22 06:26:20.940 UTC [lifecycle] update -> INFO 07f Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:20.946 UTC [lifecycle] update -> INFO 080 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleStateUpdates -> INFO 081 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 082 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 083 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-04-22 06:26:20.987 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [5] with 1 transaction(s) in 47ms (state_validation=14ms block_commit=27ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:26:21.016 UTC [comm.grpc.server] 1 -> INFO 085 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.805Z grpc.peer_address=192.168.224.5:45348 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.2097239s +peer0.org1.example.com | "2019-04-22 06:26:21.521 UTC [endorser] callChaincode -> INFO 086 [businesschannel][07ad19bd] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:21.526 UTC [lifecycle] QueryChaincodeDefinition -> INFO 087 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-04-22 06:26:21.526 UTC [endorser] callChaincode -> INFO 088 [businesschannel][07ad19bd] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org1.example.com | "2019-04-22 06:26:21.528 UTC [comm.grpc.server] 1 -> INFO 089 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45356 grpc.code=OK grpc.call_duration=7.688ms +peer0.org1.example.com | "2019-04-22 06:26:22.382 UTC [endorser] callChaincode -> INFO 08a [businesschannel][d9f76fa2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:26:22.419 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 08b building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-04-22 06:27:05.360 UTC [endorser] callChaincode -> INFO 08c [businesschannel][d9f76fa2] Exit chaincode: name:"exp02" (43046ms)" +peer0.org1.example.com | "2019-04-22 06:27:05.361 UTC [comm.grpc.server] 1 -> INFO 08d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45364 grpc.code=OK grpc.call_duration=43.0490753s +peer0.org1.example.com | "2019-04-22 06:27:07.533 UTC [gossip.privdata] StoreBlock -> INFO 08e [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:07.537 UTC [committer.txvalidator] Validate -> INFO 08f [businesschannel] Validated block [6] in 2ms" +peer0.org1.example.com | "2019-04-22 06:27:07.564 UTC [kvledger] CommitWithPvtData -> INFO 090 [businesschannel] Committed block [6] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=20ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.719 UTC [endorser] callChaincode -> INFO 091 [businesschannel][a260bae9] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:10.721 UTC [endorser] callChaincode -> INFO 092 [businesschannel][a260bae9] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.722 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45372 grpc.code=OK grpc.call_duration=4.8236ms +peer0.org1.example.com | "2019-04-22 06:27:10.957 UTC [endorser] callChaincode -> INFO 094 [businesschannel][afb6f91a] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:10.962 UTC [endorser] callChaincode -> INFO 095 [businesschannel][afb6f91a] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.963 UTC [comm.grpc.server] 1 -> INFO 096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45376 grpc.code=OK grpc.call_duration=8.1959ms +peer0.org1.example.com | "2019-04-22 06:27:11.170 UTC [endorser] callChaincode -> INFO 097 [businesschannel][9da077e1] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:11.175 UTC [endorser] callChaincode -> INFO 098 [businesschannel][9da077e1] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:27:11.176 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45382 grpc.code=OK grpc.call_duration=8.7397ms +peer0.org1.example.com | "2019-04-22 06:27:13.047 UTC [gossip.privdata] StoreBlock -> INFO 09a [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:13.053 UTC [committer.txvalidator] Validate -> INFO 09b [businesschannel] Validated block [7] in 4ms" +peer0.org1.example.com | "2019-04-22 06:27:13.078 UTC [kvledger] CommitWithPvtData -> INFO 09c [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=3ms block_commit=11ms state_commit=2ms)" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-04-22 06:25:20.817 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer1.example.com | "2019-04-22 06:25:20.835 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:25:20.931 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer1.example.com | "2019-04-22 06:25:20.981 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.common.server] Start -> INFO 007 Starting orderer: +orderer1.example.com | Version: 2.0.0 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.11.5 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.common.server] Start -> INFO 008 Beginning to serve requests" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 009 [channel: testchainid] Setting up the topic for this channel..." +orderer1.example.com | "2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +orderer1.example.com | "2019-04-22 06:25:50.402 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +orderer1.example.com | "2019-04-22 06:25:50.402 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +orderer1.example.com | "2019-04-22 06:25:52.934 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +orderer1.example.com | "2019-04-22 06:25:52.935 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +orderer1.example.com | "2019-04-22 06:25:53.079 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:53.079 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +orderer1.example.com | "2019-04-22 06:25:53.123 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:53.162 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +orderer1.example.com | "2019-04-22 06:25:55.142 UTC [fsblkstorage] newBlockfileMgr -> INFO 013 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:25:55.165 UTC [orderer.consensus.kafka] newChain -> INFO 014 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer1.example.com | "2019-04-22 06:25:55.165 UTC [orderer.commmon.multichannel] newChain -> INFO 015 Created and starting new chain businesschannel" +orderer1.example.com | "2019-04-22 06:25:55.177 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 016 [channel: businesschannel] Setting up the topic for this channel..." +orderer1.example.com | "2019-04-22 06:25:55.317 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 017 [channel: businesschannel] Setting up the producer for this channel..." +orderer1.example.com | "2019-04-22 06:25:55.326 UTC [orderer.consensus.kafka] startThread -> INFO 018 [channel: businesschannel] Producer set up successfully" +orderer1.example.com | "2019-04-22 06:25:55.326 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 019 [channel: businesschannel] About to post the CONNECT message..." +orderer1.example.com | "2019-04-22 06:25:56.059 UTC [orderer.consensus.kafka] startThread -> INFO 01a [channel: businesschannel] CONNECT message posted successfully" +orderer1.example.com | "2019-04-22 06:25:56.059 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 01b [channel: businesschannel] Setting up the parent consumer for this channel..." +orderer1.example.com | "2019-04-22 06:25:56.073 UTC [orderer.consensus.kafka] startThread -> INFO 01c [channel: businesschannel] Parent consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:56.073 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 01d [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +orderer1.example.com | "2019-04-22 06:25:56.101 UTC [orderer.consensus.kafka] startThread -> INFO 01e [channel: businesschannel] Channel consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:56.119 UTC [orderer.consensus.kafka] startThread -> INFO 01f [channel: businesschannel] Start phase completed successfully" +orderer1.example.com | "2019-04-22 06:26:09.145 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.14:43684 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.6718364s +orderer1.example.com | "2019-04-22 06:27:37.435 UTC [cauthdsl] deduplicate -> WARN 021 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-04-22 06:27:37.438 UTC [cauthdsl] deduplicate -> WARN 022 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:13.407 UTC [endorser] callChaincode -> INFO 09d [businesschannel][b83d2cc6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.410 UTC [endorser] callChaincode -> INFO 09e [businesschannel][b83d2cc6] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.411 UTC [comm.grpc.server] 1 -> INFO 09f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45386 grpc.code=OK grpc.call_duration=6.1882ms +peer0.org1.example.com | "2019-04-22 06:27:13.630 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][6929c7e0] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.638 UTC [endorser] callChaincode -> INFO 0a1 [businesschannel][6929c7e0] Exit chaincode: name:"exp02" (8ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.639 UTC [comm.grpc.server] 1 -> INFO 0a2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45390 grpc.code=OK grpc.call_duration=10.2984ms +peer0.org1.example.com | "2019-04-22 06:27:13.897 UTC [endorser] callChaincode -> INFO 0a3 [businesschannel][2f5fecb5] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.901 UTC [endorser] callChaincode -> INFO 0a4 [businesschannel][2f5fecb5] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.902 UTC [comm.grpc.server] 1 -> INFO 0a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45396 grpc.code=OK grpc.call_duration=6.7979ms +peer0.org1.example.com | "2019-04-22 06:27:15.699 UTC [gossip.privdata] StoreBlock -> INFO 0a6 [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:15.702 UTC [committer.txvalidator] Validate -> INFO 0a7 [businesschannel] Validated block [8] in 2ms" +peer0.org1.example.com | "2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 0a8 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=16ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.087 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][b014ef00] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:16.092 UTC [endorser] callChaincode -> INFO 0aa [businesschannel][b014ef00] Exit chaincode: name:"exp02" (5ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.093 UTC [comm.grpc.server] 1 -> INFO 0ab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45400 grpc.code=OK grpc.call_duration=10.5268ms +peer0.org1.example.com | "2019-04-22 06:27:16.696 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][6fc4f9e4] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:27:16.703 UTC [endorser] callChaincode -> INFO 0ad [businesschannel][6fc4f9e4] Exit chaincode: name:"qscc" (7ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.708 UTC [comm.grpc.server] 1 -> INFO 0ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45404 grpc.code=OK grpc.call_duration=12.6755ms +peer0.org1.example.com | "2019-04-22 06:27:16.926 UTC [endorser] callChaincode -> INFO 0af [businesschannel][35a24a5f] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:27:16.929 UTC [endorser] callChaincode -> INFO 0b0 [businesschannel][35a24a5f] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.930 UTC [comm.grpc.server] 1 -> INFO 0b1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45408 grpc.code=OK grpc.call_duration=4.6791ms +peer0.org1.example.com | "2019-04-22 06:27:17.500 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][3bc38859] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.502 UTC [endorser] callChaincode -> INFO 0b3 [businesschannel][3bc38859] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.504 UTC [comm.grpc.server] 1 -> INFO 0b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45412 grpc.code=OK grpc.call_duration=4.6602ms +peer0.org1.example.com | "2019-04-22 06:27:17.700 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][5f602553] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.705 UTC [endorser] callChaincode -> INFO 0b6 [businesschannel][5f602553] Exit chaincode: name:"cscc" (4ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.706 UTC [comm.grpc.server] 1 -> INFO 0b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45416 grpc.code=OK grpc.call_duration=6.5725ms +peer0.org1.example.com | "2019-04-22 06:27:17.974 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][a8300ed2] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.977 UTC [endorser] callChaincode -> INFO 0b9 [businesschannel][a8300ed2] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.978 UTC [comm.grpc.server] 1 -> INFO 0ba unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45420 grpc.code=OK grpc.call_duration=3.8956ms +peer0.org1.example.com | "2019-04-22 06:27:37.502 UTC [gossip.privdata] StoreBlock -> INFO 0bb [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:37.505 UTC [cauthdsl] deduplicate -> WARN 0bc De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:37.506 UTC [cauthdsl] deduplicate -> WARN 0bd De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:37.578 UTC [gossip.gossip] JoinChan -> INFO 0be Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-04-22 06:27:37.580 UTC [gossip.gossip] learnAnchorPeers -> INFO 0bf Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:27:37.605 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c0 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c1 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c2 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:27:37.623 UTC [committer.txvalidator] Validate -> INFO 0c3 [businesschannel] Validated block [9] in 120ms" +peer0.org1.example.com | "2019-04-22 06:27:37.632 UTC [comm.grpc.server] 1 -> INFO 0c4 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.63Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=296.4µs +peer0.org1.example.com | "2019-04-22 06:27:37.646 UTC [comm.grpc.server] 1 -> INFO 0c5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.3708033s +peer0.org1.example.com | "2019-04-22 06:27:37.703 UTC [kvledger] CommitWithPvtData -> INFO 0c6 [businesschannel] Committed block [9] with 1 transaction(s) in 79ms (state_validation=1ms block_commit=51ms state_commit=15ms)" +peer0.org1.example.com | "2019-04-22 06:27:37.707 UTC [comm.grpc.server] 1 -> INFO 0c7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.705Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +peer0.org2.example.com | "2019-04-22 06:25:58.120 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:27:37.708 UTC [comm.grpc.server] 1 -> INFO 0c8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.704Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.9µs +peer0.org1.example.com | "2019-04-22 06:27:37.720 UTC [comm.grpc.server] 1 -> INFO 0c9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.7270124s +peer0.org1.example.com | "2019-04-22 06:27:37.724 UTC [comm.grpc.server] 1 -> INFO 0ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.711Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2621ms +peer0.org1.example.com | "2019-04-22 06:27:37.729 UTC [comm.grpc.server] 1 -> INFO 0cb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.661Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=67.2458ms +peer0.org1.example.com | "2019-04-22 06:27:37.759 UTC [comm.grpc.server] 1 -> INFO 0cc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.72Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7322ms +peer0.org1.example.com | "2019-04-22 06:27:37.774 UTC [comm.grpc.server] 1 -> INFO 0cd unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.774Z grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.2µs +peer0.org1.example.com | "2019-04-22 06:27:37.806 UTC [comm.grpc.server] 1 -> INFO 0ce streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=22.1067ms +peer0.org1.example.com | "2019-04-22 06:28:07.906 UTC [endorser] callChaincode -> INFO 0cf [][93c2e1e6] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:28:07.907 UTC [endorser] callChaincode -> INFO 0d0 [][93c2e1e6] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:28:07.908 UTC [comm.grpc.server] 1 -> INFO 0d1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45518 grpc.code=OK grpc.call_duration=2.1597ms +peer0.org1.example.com | "2019-04-22 06:28:09.826 UTC [endorser] callChaincode -> INFO 0d2 [][97392766] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:28:09.832 UTC [endorser] callChaincode -> INFO 0d3 [][97392766] Exit chaincode: name:"qscc" (6ms)" +peer0.org1.example.com | "2019-04-22 06:28:09.834 UTC [comm.grpc.server] 1 -> INFO 0d4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45526 grpc.code=OK grpc.call_duration=9.3072ms +peer0.org2.example.com | "2019-04-22 06:25:58.121 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.122 UTC [endorser] callChaincode -> INFO 02d [][29fe0e94] Exit chaincode: name:"cscc" (92ms)" +peer0.org2.example.com | "2019-04-22 06:25:58.122 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52594 grpc.code=OK grpc.call_duration=95.3209ms +peer0.org2.example.com | "2019-04-22 06:25:59.420 UTC [endorser] callChaincode -> INFO 02f [][f9a8eaac] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:25:59.423 UTC [endorser] callChaincode -> INFO 030 [][f9a8eaac] Exit chaincode: name:"cscc" (3ms)" +peer0.org2.example.com | "2019-04-22 06:25:59.424 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52602 grpc.code=OK grpc.call_duration=4.0936ms +peer0.org2.example.com | "2019-04-22 06:26:00.503 UTC [endorser] callChaincode -> INFO 032 [][4d43b46a] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:26:00.506 UTC [endorser] callChaincode -> INFO 033 [][4d43b46a] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:26:00.506 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52610 grpc.code=OK grpc.call_duration=3.4932ms +peer0.org2.example.com | "2019-04-22 06:26:03.879 UTC [comm.grpc.server] 1 -> INFO 035 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.877Z grpc.peer_address=192.168.224.15:49362 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.338ms +peer0.org2.example.com | "2019-04-22 06:26:03.903 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.903Z grpc.peer_address=192.168.224.13:43628 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=172.2µs +peer0.org2.example.com | "2019-04-22 06:26:03.932 UTC [comm.grpc.server] 1 -> INFO 037 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.906Z grpc.peer_address=192.168.224.13:43628 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8826ms +peer0.org2.example.com | "2019-04-22 06:26:03.933 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.904Z grpc.peer_address=192.168.224.15:49362 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7822ms +peer0.org2.example.com | "2019-04-22 06:26:03.935 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.934Z grpc.peer_address=192.168.224.15:49368 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=291.2µs +peer0.org2.example.com | "2019-04-22 06:26:03.970 UTC [comm.grpc.server] 1 -> INFO 03a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.97Z grpc.peer_address=192.168.224.13:43634 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.4µs +peer0.org2.example.com | "2019-04-22 06:26:04.120 UTC [gossip.election] beLeader -> INFO 03b 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-04-22 06:26:04.120 UTC [gossip.service] func1 -> INFO 03c Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-04-22 06:26:04.165 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:04.196 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:26:04.196 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:26:04.266 UTC [gossip.comm] func1 -> WARN 041 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: rpc error: code = Unavailable desc = transport is closing" +peer0.org2.example.com | "2019-04-22 06:26:04.268 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:49368 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=331.0498ms +peer0.org2.example.com | "2019-04-22 06:26:04.269 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer0.org2.example.com | "2019-04-22 06:26:04.270 UTC [gossip.discovery] expireDeadMembers -> WARN 044 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org2.example.com | "2019-04-22 06:26:04.270 UTC [gossip.discovery] expireDeadMembers -> WARN 045 Exiting" +orderer0.example.com | 2019-04-22 06:25:19.571 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-04-22 06:25:19.950 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +peer0.org2.example.com | "2019-04-22 06:26:04.289 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [1] in 123ms" +peer0.org2.example.com | "2019-04-22 06:26:04.308 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [1] with 1 transaction(s) in 18ms (state_validation=1ms block_commit=11ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:26:04.309 UTC [gossip.privdata] StoreBlock -> INFO 048 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] JoinChan -> INFO 049 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04c Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:26:04.344 UTC [committer.txvalidator] Validate -> INFO 04d [businesschannel] Validated block [2] in 35ms" +peer0.org2.example.com | "2019-04-22 06:26:04.361 UTC [kvledger] CommitWithPvtData -> INFO 04e [businesschannel] Committed block [2] with 1 transaction(s) in 15ms (state_validation=1ms block_commit=8ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:26:04.663 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.662Z grpc.peer_address=192.168.224.14:37322 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=255.6µs +peer0.org2.example.com | "2019-04-22 06:26:04.679 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.665Z grpc.peer_address=192.168.224.14:37322 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.0623ms +peer0.org2.example.com | "2019-04-22 06:26:04.706 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.706Z grpc.peer_address=192.168.224.14:37324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.6µs +peer0.org2.example.com | "2019-04-22 06:26:08.080 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:26:10.308 UTC [endorser] callChaincode -> INFO 053 [][d01a0500] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:10.310 UTC [endorser] callChaincode -> INFO 054 [][d01a0500] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:26:10.310 UTC [comm.grpc.server] 1 -> INFO 055 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52672 grpc.code=OK grpc.call_duration=3.0795ms +peer0.org2.example.com | "2019-04-22 06:26:14.222 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:14.231 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [3] in 8ms" +peer0.org2.example.com | "2019-04-22 06:26:14.249 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003203200)}" +peer0.org2.example.com | "2019-04-22 06:26:14.270 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [3] with 1 transaction(s) in 36ms (state_validation=17ms block_commit=10ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.598 UTC [endorser] callChaincode -> INFO 05a [][443c8bd0] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:14.600 UTC [endorser] callChaincode -> INFO 05b [][443c8bd0] Exit chaincode: name:"_lifecycle" (2ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.601 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52692 grpc.code=OK grpc.call_duration=4.1649ms +peer0.org2.example.com | "2019-04-22 06:26:14.846 UTC [endorser] callChaincode -> INFO 05d [][5dbb3781] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:26:14.849 UTC [endorser] callChaincode -> INFO 05e [][5dbb3781] Exit chaincode: name:"cscc" (3ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.850 UTC [comm.grpc.server] 1 -> INFO 05f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52696 grpc.code=OK grpc.call_duration=4.7196ms +peer0.org2.example.com | "2019-04-22 06:26:14.876 UTC [endorser] callChaincode -> INFO 060 [businesschannel][3a86efca] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:14.879 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 061 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:14.880 UTC [endorser] callChaincode -> INFO 062 [businesschannel][3a86efca] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.899 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52696 grpc.code=OK grpc.call_duration=24.7311ms +peer0.org2.example.com | "2019-04-22 06:26:17.005 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:17.012 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [4] in 7ms" +peer0.org2.example.com | "2019-04-22 06:26:17.032 UTC [confighistory] HandleStateUpdates -> ERRO 066 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003650520)}" +peer0.org2.example.com | "2019-04-22 06:26:17.066 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [4] with 1 transaction(s) in 37ms (state_validation=3ms block_commit=28ms state_commit=2ms)" +orderer0.example.com | Kafka.Retry.ShortInterval = 1s +orderer0.example.com | Kafka.Retry.ShortTotal = 30s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = true +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +peer0.org2.example.com | "2019-04-22 06:26:17.079 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:44.919Z grpc.peer_address=192.168.224.5:52698 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1601372s +peer0.org2.example.com | "2019-04-22 06:26:17.914 UTC [endorser] callChaincode -> INFO 069 [businesschannel][083ad894] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:17.919 UTC [lifecycle] QueryApprovalStatus -> INFO 06a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-04-22 06:25:20.432 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer0.example.com | "2019-04-22 06:25:20.438 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:25:20.706 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer0.example.com | "2019-04-22 06:25:20.750 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +orderer0.example.com | "2019-04-22 06:25:20.757 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 007 [channel: testchainid] Setting up the topic for this channel..." +orderer0.example.com | "2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 008 Starting orderer: +orderer0.example.com | Version: 2.0.0 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.11.5 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 009 Beginning to serve requests" +orderer0.example.com | "2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +orderer0.example.com | "2019-04-22 06:25:50.547 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +orderer0.example.com | "2019-04-22 06:25:50.548 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +orderer0.example.com | "2019-04-22 06:25:52.951 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +orderer0.example.com | "2019-04-22 06:25:52.952 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +orderer0.example.com | "2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +orderer0.example.com | "2019-04-22 06:25:53.072 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:53.175 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +orderer0.example.com | "2019-04-22 06:25:55.129 UTC [comm.grpc.server] 1 -> INFO 013 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55752 grpc.code=OK grpc.call_duration=131.3442ms +orderer0.example.com | "2019-04-22 06:25:55.143 UTC [fsblkstorage] newBlockfileMgr -> INFO 014 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] newChain -> INFO 015 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.commmon.multichannel] newChain -> INFO 016 Created and starting new chain businesschannel" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 017 [channel: businesschannel] Setting up the topic for this channel..." +orderer0.example.com | "2019-04-22 06:25:55.172 UTC [common.deliver] deliverBlocks -> WARN 018 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55750 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.174 UTC [comm.grpc.server] 1 -> INFO 019 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55750 grpc.code=OK grpc.call_duration=193.4332ms +orderer0.example.com | "2019-04-22 06:25:55.319 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 01a [channel: businesschannel] Setting up the producer for this channel..." +orderer0.example.com | "2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] startThread -> INFO 01b [channel: businesschannel] Producer set up successfully" +orderer0.example.com | "2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 01c [channel: businesschannel] About to post the CONNECT message..." +orderer0.example.com | "2019-04-22 06:25:55.400 UTC [common.deliver] deliverBlocks -> WARN 01d [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55758 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.403 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55758 grpc.code=OK grpc.call_duration=203.4762ms +orderer0.example.com | "2019-04-22 06:25:55.628 UTC [common.deliver] deliverBlocks -> WARN 01f [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55764 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.628 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55764 grpc.code=OK grpc.call_duration=202.677ms +orderer0.example.com | "2019-04-22 06:25:55.853 UTC [common.deliver] deliverBlocks -> WARN 021 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55766 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.853 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55766 grpc.code=OK grpc.call_duration=201.2625ms +orderer0.example.com | "2019-04-22 06:25:56.080 UTC [common.deliver] deliverBlocks -> WARN 023 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55770 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:56.080 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55770 grpc.code=OK grpc.call_duration=200.733ms +orderer0.example.com | "2019-04-22 06:25:56.130 UTC [orderer.consensus.kafka] startThread -> INFO 025 [channel: businesschannel] CONNECT message posted successfully" +orderer0.example.com | "2019-04-22 06:25:56.131 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 026 [channel: businesschannel] Setting up the parent consumer for this channel..." +orderer0.example.com | "2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] startThread -> INFO 027 [channel: businesschannel] Parent consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 028 [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +orderer0.example.com | "2019-04-22 06:25:56.152 UTC [orderer.consensus.kafka] startThread -> INFO 029 [channel: businesschannel] Channel consumer set up successfully" +peer0.org2.example.com | "2019-04-22 06:26:17.919 UTC [endorser] callChaincode -> INFO 06b [businesschannel][083ad894] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org2.example.com | "2019-04-22 06:26:17.920 UTC [comm.grpc.server] 1 -> INFO 06c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52706 grpc.code=OK grpc.call_duration=7.2022ms +peer0.org2.example.com | "2019-04-22 06:26:18.795 UTC [endorser] callChaincode -> INFO 06d [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:18.799 UTC [lifecycle] QueryApprovalStatus -> INFO 06e successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:18.800 UTC [lifecycle] CommitChaincodeDefinition -> INFO 06f successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:18.801 UTC [endorser] callChaincode -> INFO 070 [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (6ms)" +peer0.org2.example.com | "2019-04-22 06:26:18.802 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52718 grpc.code=OK grpc.call_duration=8.6225ms +peer0.org2.example.com | "2019-04-22 06:26:20.873 UTC [gossip.privdata] StoreBlock -> INFO 072 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:20.876 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-04-22 06:26:20.878 UTC [lifecycle] update -> INFO 074 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:20.894 UTC [lifecycle] update -> INFO 075 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org2.example.com | "2019-04-22 06:26:20.895 UTC [cceventmgmt] HandleStateUpdates -> INFO 076 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-04-22 06:26:20.896 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 077 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org2.example.com | "2019-04-22 06:26:20.896 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 078 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org2.example.com | "2019-04-22 06:26:20.921 UTC [kvledger] CommitWithPvtData -> INFO 079 [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=24ms block_commit=14ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:26:20.998 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.806Z grpc.peer_address=192.168.224.5:52720 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1921533s +peer0.org2.example.com | "2019-04-22 06:26:21.781 UTC [endorser] callChaincode -> INFO 07b [businesschannel][812af1bf] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:21.785 UTC [lifecycle] QueryChaincodeDefinition -> INFO 07c successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-04-22 06:26:21.785 UTC [endorser] callChaincode -> INFO 07d [businesschannel][812af1bf] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:26:21.786 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52728 grpc.code=OK grpc.call_duration=6.2174ms +peer0.org2.example.com | "2019-04-22 06:27:07.579 UTC [gossip.privdata] StoreBlock -> INFO 07f [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:07.583 UTC [committer.txvalidator] Validate -> INFO 080 [businesschannel] Validated block [6] in 3ms" +peer0.org2.example.com | "2019-04-22 06:27:07.601 UTC [kvledger] CommitWithPvtData -> INFO 081 [businesschannel] Committed block [6] with 1 transaction(s) in 17ms (state_validation=0ms block_commit=11ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:27:13.017 UTC [gossip.privdata] StoreBlock -> INFO 082 [businesschannel] Received block [7] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:13.020 UTC [committer.txvalidator] Validate -> INFO 083 [businesschannel] Validated block [7] in 2ms" +peer0.org2.example.com | "2019-04-22 06:27:13.051 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [7] with 1 transaction(s) in 29ms (state_validation=0ms block_commit=22ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:27:15.693 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:15.697 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [8] in 3ms" +peer0.org2.example.com | "2019-04-22 06:27:15.731 UTC [kvledger] CommitWithPvtData -> INFO 087 [businesschannel] Committed block [8] with 1 transaction(s) in 32ms (state_validation=9ms block_commit=16ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:27:37.550 UTC [gossip.privdata] StoreBlock -> INFO 088 [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:37.554 UTC [cauthdsl] deduplicate -> WARN 089 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:27:37.555 UTC [cauthdsl] deduplicate -> WARN 08a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] JoinChan -> INFO 08b Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08c Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08d Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:27:37.600 UTC [committer.txvalidator] Validate -> INFO 090 [businesschannel] Validated block [9] in 49ms" +peer0.org2.example.com | "2019-04-22 06:27:37.619 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.617Z grpc.peer_address=192.168.224.15:49562 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=312.5µs +peer0.org2.example.com | "2019-04-22 06:27:37.666 UTC [comm.grpc.server] 1 -> INFO 092 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.659Z grpc.peer_address=192.168.224.13:43828 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5073ms +peer0.org2.example.com | "2019-04-22 06:27:37.717 UTC [kvledger] CommitWithPvtData -> INFO 093 [businesschannel] Committed block [9] with 1 transaction(s) in 103ms (state_validation=12ms block_commit=26ms state_commit=58ms)" +peer0.org2.example.com | "2019-04-22 06:27:37.719 UTC [comm.grpc.server] 1 -> INFO 094 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.636Z grpc.peer_address=192.168.224.15:49562 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.24ms +peer0.org2.example.com | "2019-04-22 06:27:37.743 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.742Z grpc.peer_address=192.168.224.14:37500 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.7µs +peer0.org2.example.com | "2019-04-22 06:27:37.746 UTC [comm.grpc.server] 1 -> INFO 096 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:43634 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.8661361s +peer0.org2.example.com | "2019-04-22 06:27:37.746 UTC [comm.grpc.server] 1 -> INFO 097 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.693Z grpc.peer_address=192.168.224.13:43828 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=45.4336ms +peer0.org2.example.com | "2019-04-22 06:27:37.749 UTC [comm.grpc.server] 1 -> INFO 098 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.746Z grpc.peer_address=192.168.224.15:49572 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=548.4µs +peer0.org2.example.com | "2019-04-22 06:27:37.754 UTC [comm.grpc.server] 1 -> INFO 099 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:37324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.1286711s +peer0.org2.example.com | "2019-04-22 06:27:37.754 UTC [comm.grpc.server] 1 -> INFO 09a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.751Z grpc.peer_address=192.168.224.14:37500 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5723ms +peer0.org2.example.com | "2019-04-22 06:28:08.504 UTC [endorser] callChaincode -> INFO 09b [][9a638f5d] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:28:08.505 UTC [endorser] callChaincode -> INFO 09c [][9a638f5d] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:28:08.506 UTC [comm.grpc.server] 1 -> INFO 09d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52890 grpc.code=OK grpc.call_duration=2.7635ms +peer0.org2.example.com | "2019-04-22 06:28:10.543 UTC [endorser] callChaincode -> INFO 09e [][f95485ae] Entry chaincode: name:"qscc" " +kafka3 | [2019-04-22 06:25:29,546] INFO KafkaConfig values: +kafka3 | advertised.host.name = null +kafka3 | advertised.listeners = null +kafka3 | advertised.port = null +kafka3 | alter.config.policy.class.name = null +kafka3 | authorizer.class.name = +kafka3 | auto.create.topics.enable = true +kafka3 | auto.leader.rebalance.enable = true +kafka3 | background.threads = 10 +kafka3 | broker.id = 3 +kafka3 | broker.id.generation.enable = true +kafka3 | broker.rack = null +kafka3 | compression.type = producer +kafka3 | connections.max.idle.ms = 600000 +peer0.org2.example.com | "2019-04-22 06:28:10.548 UTC [endorser] callChaincode -> INFO 09f [][f95485ae] Exit chaincode: name:"qscc" (5ms)" +orderer0.example.com | "2019-04-22 06:25:56.165 UTC [orderer.consensus.kafka] startThread -> INFO 02a [channel: businesschannel] Start phase completed successfully" +orderer0.example.com | "2019-04-22 06:25:56.324 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.5:55780: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:25:56.325 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=231.0232ms +orderer0.example.com | "2019-04-22 06:26:01.418 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.5:55814: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:01.420 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55814 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=128.1389ms +orderer0.example.com | "2019-04-22 06:26:01.420 UTC [orderer.common.broadcast] Handle -> WARN 02f Error reading from 192.168.224.5:55816: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:01.421 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55816 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2691ms +orderer0.example.com | "2019-04-22 06:26:03.724 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.5:55822: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:03.725 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55822 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5035ms +orderer0.example.com | "2019-04-22 06:26:03.726 UTC [orderer.common.broadcast] Handle -> WARN 033 Error reading from 192.168.224.5:55824: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:03.727 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55824 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.929ms +orderer0.example.com | "2019-04-22 06:26:14.324 UTC [orderer.common.broadcast] Handle -> WARN 035 Error reading from 192.168.224.5:55888: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:14.324 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1871471s +orderer0.example.com | "2019-04-22 06:26:17.075 UTC [orderer.common.broadcast] Handle -> WARN 037 Error reading from 192.168.224.5:55900: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:17.075 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1768334s +orderer0.example.com | "2019-04-22 06:26:20.996 UTC [orderer.common.broadcast] Handle -> WARN 039 Error reading from 192.168.224.5:55922: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:20.997 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55922 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2159801s +orderer0.example.com | "2019-04-22 06:27:05.498 UTC [orderer.common.broadcast] Handle -> WARN 03b Error reading from 192.168.224.5:55936: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:05.504 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55936 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.1933324s +peer0.org2.example.com | "2019-04-22 06:28:10.548 UTC [comm.grpc.server] 1 -> INFO 0a0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52898 grpc.code=OK grpc.call_duration=6.4013ms +kafka1 | [2019-04-22 06:25:29,400] INFO KafkaConfig values: +kafka1 | advertised.host.name = null +kafka1 | advertised.listeners = null +kafka1 | advertised.port = null +kafka1 | alter.config.policy.class.name = null +kafka1 | authorizer.class.name = +kafka1 | auto.create.topics.enable = true +kafka1 | auto.leader.rebalance.enable = true +kafka1 | background.threads = 10 +kafka1 | broker.id = 1 +kafka1 | broker.id.generation.enable = true +kafka1 | broker.rack = null +kafka0 | [2019-04-22 06:25:29,368] INFO KafkaConfig values: +kafka0 | advertised.host.name = null +kafka0 | advertised.listeners = null +kafka0 | advertised.port = null +kafka0 | alter.config.policy.class.name = null +orderer0.example.com | "2019-04-22 06:27:10.989 UTC [orderer.common.broadcast] Handle -> WARN 03d Error reading from 192.168.224.5:55948: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:10.989 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9912ms +orderer0.example.com | "2019-04-22 06:27:13.668 UTC [orderer.common.broadcast] Handle -> WARN 03f Error reading from 192.168.224.5:55962: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:13.669 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.9001ms +orderer0.example.com | "2019-04-22 06:27:18.593 UTC [common.deliver] Handle -> WARN 041 Error reading from 192.168.224.5:55992: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:18.593 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8334ms +orderer0.example.com | "2019-04-22 06:27:18.990 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.5:55994: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:18.990 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.54ms +orderer0.example.com | "2019-04-22 06:27:19.199 UTC [common.deliver] Handle -> WARN 045 Error reading from 192.168.224.5:55996: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.199 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8085ms +orderer0.example.com | "2019-04-22 06:27:19.548 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.5:55998: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.548 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2487ms +orderer0.example.com | "2019-04-22 06:27:19.958 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.5:56000: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.960 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.0664ms +orderer0.example.com | "2019-04-22 06:27:20.201 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.5:56002: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.201 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3511ms +orderer0.example.com | "2019-04-22 06:27:20.417 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.5:56004: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.417 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9123ms +orderer0.example.com | "2019-04-22 06:27:20.707 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.5:56006: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.707 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.579ms +orderer0.example.com | "2019-04-22 06:27:21.216 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.5:56008: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.217 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1645ms +orderer0.example.com | "2019-04-22 06:27:21.496 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.5:56010: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.496 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6158ms +orderer0.example.com | "2019-04-22 06:27:21.722 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.5:56012: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.723 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3642ms +orderer0.example.com | "2019-04-22 06:27:22.187 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.5:56014: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6495ms +orderer0.example.com | "2019-04-22 06:27:22.663 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.5:56016: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.663 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8107ms +orderer0.example.com | "2019-04-22 06:27:22.994 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.5:56018: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.994 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2059ms +orderer0.example.com | "2019-04-22 06:27:23.368 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.5:56020: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:23.368 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7461ms +kafka3 | controlled.shutdown.enable = true +kafka3 | controlled.shutdown.max.retries = 3 +kafka3 | controlled.shutdown.retry.backoff.ms = 5000 +kafka3 | controller.socket.timeout.ms = 30000 +kafka3 | create.topic.policy.class.name = null +kafka3 | default.replication.factor = 3 +kafka3 | delete.records.purgatory.purge.interval.requests = 1 +kafka3 | delete.topic.enable = true +kafka3 | fetch.purgatory.purge.interval.requests = 1000 +kafka3 | group.initial.rebalance.delay.ms = 0 +kafka3 | group.max.session.timeout.ms = 300000 +orderer0.example.com | "2019-04-22 06:27:37.382 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.383 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.431 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.440 UTC [cauthdsl] deduplicate -> WARN 062 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.460 UTC [orderer.common.broadcast] Handle -> WARN 063 Error reading from 192.168.224.5:56024: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:37.461 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:56024 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.6848ms +orderer0.example.com | "2019-04-22 06:27:37.466 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.5:56022: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:37.467 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=110.595ms +orderer0.example.com | "2019-04-22 06:27:39.802 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.5:56050: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:39.802 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56050 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9753ms +orderer0.example.com | "2019-04-22 06:27:40.300 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.5:56052: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:40.300 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56052 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.017ms +orderer0.example.com | "2019-04-22 06:27:41.503 UTC [common.deliver] Handle -> WARN 06b Error reading from 192.168.224.5:56054: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:41.504 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56054 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8646ms +orderer0.example.com | "2019-04-22 06:27:41.881 UTC [common.deliver] Handle -> WARN 06d Error reading from 192.168.224.5:56056: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:41.882 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56056 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.3519ms +orderer0.example.com | "2019-04-22 06:27:42.195 UTC [common.deliver] Handle -> WARN 06f Error reading from 192.168.224.5:56058: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.195 UTC [comm.grpc.server] 1 -> INFO 070 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56058 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9844ms +orderer0.example.com | "2019-04-22 06:27:42.588 UTC [common.deliver] Handle -> WARN 071 Error reading from 192.168.224.5:56060: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.590 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56060 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8188ms +orderer0.example.com | "2019-04-22 06:27:42.986 UTC [common.deliver] Handle -> WARN 073 Error reading from 192.168.224.5:56062: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.993 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1588ms +orderer0.example.com | "2019-04-22 06:27:43.407 UTC [common.deliver] Handle -> WARN 075 Error reading from 192.168.224.5:56064: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:43.407 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6195ms +orderer0.example.com | "2019-04-22 06:27:43.909 UTC [common.deliver] Handle -> WARN 077 Error reading from 192.168.224.5:56066: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:43.911 UTC [comm.grpc.server] 1 -> INFO 078 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.3998ms +orderer0.example.com | "2019-04-22 06:27:45.369 UTC [common.deliver] Handle -> WARN 079 Error reading from 192.168.224.5:56068: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:45.369 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.3442ms +orderer0.example.com | "2019-04-22 06:27:45.764 UTC [common.deliver] Handle -> WARN 07b Error reading from 192.168.224.5:56070: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:45.766 UTC [comm.grpc.server] 1 -> INFO 07c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.2845ms +orderer0.example.com | "2019-04-22 06:27:46.147 UTC [common.deliver] Handle -> WARN 07d Error reading from 192.168.224.5:56072: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:46.147 UTC [comm.grpc.server] 1 -> INFO 07e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.7551ms +orderer0.example.com | "2019-04-22 06:27:46.449 UTC [common.deliver] Handle -> WARN 07f Error reading from 192.168.224.5:56074: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:46.450 UTC [comm.grpc.server] 1 -> INFO 080 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5173ms +orderer0.example.com | "2019-04-22 06:27:46.799 UTC [common.deliver] Handle -> WARN 081 Error reading from 192.168.224.5:56076: rpc error: code = Canceled desc = context canceled" +kafka2 | [2019-04-22 06:25:29,337] INFO KafkaConfig values: +kafka2 | advertised.host.name = null +kafka2 | advertised.listeners = null +kafka2 | advertised.port = null +kafka2 | alter.config.policy.class.name = null +kafka2 | authorizer.class.name = +kafka2 | auto.create.topics.enable = true +kafka2 | auto.leader.rebalance.enable = true +kafka2 | background.threads = 10 +kafka2 | broker.id = 2 +kafka2 | broker.id.generation.enable = true +kafka2 | broker.rack = null +kafka2 | compression.type = producer +kafka2 | connections.max.idle.ms = 600000 +kafka2 | controlled.shutdown.enable = true +kafka2 | controlled.shutdown.max.retries = 3 +kafka2 | controlled.shutdown.retry.backoff.ms = 5000 +kafka3 | group.min.session.timeout.ms = 6000 +kafka3 | host.name = +kafka3 | inter.broker.listener.name = null +kafka3 | inter.broker.protocol.version = 1.0-IV0 +kafka3 | leader.imbalance.check.interval.seconds = 300 +kafka3 | leader.imbalance.per.broker.percentage = 10 +kafka3 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka3 | listeners = null +kafka3 | log.cleaner.backoff.ms = 15000 +kafka3 | log.cleaner.dedupe.buffer.size = 134217728 +kafka3 | log.cleaner.delete.retention.ms = 86400000 +kafka3 | log.cleaner.enable = true +kafka1 | compression.type = producer +kafka1 | connections.max.idle.ms = 600000 +kafka1 | controlled.shutdown.enable = true +kafka1 | controlled.shutdown.max.retries = 3 +kafka1 | controlled.shutdown.retry.backoff.ms = 5000 +kafka1 | controller.socket.timeout.ms = 30000 +kafka1 | create.topic.policy.class.name = null +kafka1 | default.replication.factor = 3 +kafka1 | delete.records.purgatory.purge.interval.requests = 1 +kafka1 | delete.topic.enable = true +kafka1 | fetch.purgatory.purge.interval.requests = 1000 +kafka1 | group.initial.rebalance.delay.ms = 0 +kafka1 | group.max.session.timeout.ms = 300000 +kafka1 | group.min.session.timeout.ms = 6000 +kafka1 | host.name = +kafka1 | inter.broker.listener.name = null +kafka1 | inter.broker.protocol.version = 1.0-IV0 +kafka1 | leader.imbalance.check.interval.seconds = 300 +kafka1 | leader.imbalance.per.broker.percentage = 10 +kafka1 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka0 | authorizer.class.name = +kafka0 | auto.create.topics.enable = true +kafka0 | auto.leader.rebalance.enable = true +kafka0 | background.threads = 10 +kafka0 | broker.id = 0 +kafka0 | broker.id.generation.enable = true +kafka0 | broker.rack = null +kafka0 | compression.type = producer +kafka0 | connections.max.idle.ms = 600000 +kafka0 | controlled.shutdown.enable = true +kafka0 | controlled.shutdown.max.retries = 3 +kafka0 | controlled.shutdown.retry.backoff.ms = 5000 +kafka0 | controller.socket.timeout.ms = 30000 +kafka0 | create.topic.policy.class.name = null +kafka0 | default.replication.factor = 3 +kafka0 | delete.records.purgatory.purge.interval.requests = 1 +kafka0 | delete.topic.enable = true +kafka0 | fetch.purgatory.purge.interval.requests = 1000 +kafka0 | group.initial.rebalance.delay.ms = 0 +kafka0 | group.max.session.timeout.ms = 300000 +kafka0 | group.min.session.timeout.ms = 6000 +kafka0 | host.name = +kafka0 | inter.broker.listener.name = null +kafka0 | inter.broker.protocol.version = 1.0-IV0 +kafka2 | controller.socket.timeout.ms = 30000 +kafka2 | create.topic.policy.class.name = null +kafka2 | default.replication.factor = 3 +kafka2 | delete.records.purgatory.purge.interval.requests = 1 +kafka2 | delete.topic.enable = true +kafka2 | fetch.purgatory.purge.interval.requests = 1000 +kafka2 | group.initial.rebalance.delay.ms = 0 +kafka2 | group.max.session.timeout.ms = 300000 +kafka2 | group.min.session.timeout.ms = 6000 +kafka2 | host.name = +kafka2 | inter.broker.listener.name = null +kafka2 | inter.broker.protocol.version = 1.0-IV0 +kafka2 | leader.imbalance.check.interval.seconds = 300 +kafka2 | leader.imbalance.per.broker.percentage = 10 +kafka2 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka3 | log.cleaner.io.buffer.load.factor = 0.9 +kafka3 | log.cleaner.io.buffer.size = 524288 +kafka3 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka3 | log.cleaner.min.cleanable.ratio = 0.5 +kafka3 | log.cleaner.min.compaction.lag.ms = 0 +kafka3 | log.cleaner.threads = 1 +kafka3 | log.cleanup.policy = [delete] +kafka3 | log.dir = /tmp/kafka-logs +kafka3 | log.dirs = /tmp/kafka-logs +kafka3 | log.flush.interval.messages = 9223372036854775807 +orderer0.example.com | "2019-04-22 06:27:46.799 UTC [comm.grpc.server] 1 -> INFO 082 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8702ms +orderer0.example.com | "2019-04-22 06:27:47.370 UTC [common.deliver] Handle -> WARN 083 Error reading from 192.168.224.5:56078: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:47.371 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9332ms +orderer0.example.com | "2019-04-22 06:27:48.953 UTC [common.deliver] Handle -> WARN 085 Error reading from 192.168.224.5:56080: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:48.954 UTC [comm.grpc.server] 1 -> INFO 086 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1715ms +orderer0.example.com | "2019-04-22 06:27:49.454 UTC [common.deliver] Handle -> WARN 087 Error reading from 192.168.224.5:56082: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:49.455 UTC [comm.grpc.server] 1 -> INFO 088 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9958ms +orderer0.example.com | "2019-04-22 06:27:49.987 UTC [common.deliver] Handle -> WARN 089 Error reading from 192.168.224.5:56084: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:49.987 UTC [comm.grpc.server] 1 -> INFO 08a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.5545ms +kafka1 | listeners = null +kafka1 | log.cleaner.backoff.ms = 15000 +kafka1 | log.cleaner.dedupe.buffer.size = 134217728 +kafka1 | log.cleaner.delete.retention.ms = 86400000 +kafka1 | log.cleaner.enable = true +kafka1 | log.cleaner.io.buffer.load.factor = 0.9 +kafka1 | log.cleaner.io.buffer.size = 524288 +kafka1 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka1 | log.cleaner.min.cleanable.ratio = 0.5 +kafka1 | log.cleaner.min.compaction.lag.ms = 0 +kafka1 | log.cleaner.threads = 1 +kafka1 | log.cleanup.policy = [delete] +kafka1 | log.dir = /tmp/kafka-logs +kafka1 | log.dirs = /tmp/kafka-logs +kafka1 | log.flush.interval.messages = 9223372036854775807 +kafka1 | log.flush.interval.ms = null +kafka0 | leader.imbalance.check.interval.seconds = 300 +kafka0 | leader.imbalance.per.broker.percentage = 10 +kafka0 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka0 | listeners = null +kafka0 | log.cleaner.backoff.ms = 15000 +kafka0 | log.cleaner.dedupe.buffer.size = 134217728 +kafka0 | log.cleaner.delete.retention.ms = 86400000 +kafka0 | log.cleaner.enable = true +kafka0 | log.cleaner.io.buffer.load.factor = 0.9 +kafka0 | log.cleaner.io.buffer.size = 524288 +kafka0 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka0 | log.cleaner.min.cleanable.ratio = 0.5 +kafka0 | log.cleaner.min.compaction.lag.ms = 0 +kafka0 | log.cleaner.threads = 1 +kafka0 | log.cleanup.policy = [delete] +kafka0 | log.dir = /tmp/kafka-logs +kafka0 | log.dirs = /tmp/kafka-logs +kafka0 | log.flush.interval.messages = 9223372036854775807 +kafka0 | log.flush.interval.ms = null +kafka0 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka3 | log.flush.interval.ms = null +kafka3 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka3 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka3 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka3 | log.index.interval.bytes = 4096 +kafka3 | log.index.size.max.bytes = 10485760 +kafka3 | log.message.format.version = 1.0-IV0 +kafka3 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka3 | log.message.timestamp.type = CreateTime +kafka3 | log.preallocate = false +kafka3 | log.retention.bytes = -1 +kafka3 | log.retention.check.interval.ms = 300000 +kafka3 | log.retention.hours = 168 +kafka3 | log.retention.minutes = null +kafka3 | log.retention.ms = -1 +kafka3 | log.roll.hours = 168 +kafka3 | log.roll.jitter.hours = 0 +kafka3 | log.roll.jitter.ms = null +kafka3 | log.roll.ms = null +kafka3 | log.segment.bytes = 1073741824 +kafka3 | log.segment.delete.delay.ms = 60000 +kafka3 | max.connections.per.ip = 2147483647 +kafka3 | max.connections.per.ip.overrides = +kafka3 | message.max.bytes = 1048576 +kafka3 | metric.reporters = [] +kafka3 | metrics.num.samples = 2 +kafka3 | metrics.recording.level = INFO +kafka3 | metrics.sample.window.ms = 30000 +kafka0 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka0 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka0 | log.index.interval.bytes = 4096 +kafka0 | log.index.size.max.bytes = 10485760 +kafka0 | log.message.format.version = 1.0-IV0 +kafka0 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka0 | log.message.timestamp.type = CreateTime +kafka0 | log.preallocate = false +kafka0 | log.retention.bytes = -1 +kafka0 | log.retention.check.interval.ms = 300000 +kafka0 | log.retention.hours = 168 +kafka0 | log.retention.minutes = null +kafka0 | log.retention.ms = -1 +kafka0 | log.roll.hours = 168 +kafka0 | log.roll.jitter.hours = 0 +kafka0 | log.roll.jitter.ms = null +kafka0 | log.roll.ms = null +kafka0 | log.segment.bytes = 1073741824 +kafka0 | log.segment.delete.delay.ms = 60000 +kafka0 | max.connections.per.ip = 2147483647 +kafka0 | max.connections.per.ip.overrides = +kafka0 | message.max.bytes = 1048576 +kafka0 | metric.reporters = [] +kafka0 | metrics.num.samples = 2 +kafka0 | metrics.recording.level = INFO +kafka0 | metrics.sample.window.ms = 30000 +kafka0 | min.insync.replicas = 2 +kafka0 | num.io.threads = 8 +kafka0 | num.network.threads = 3 +kafka0 | num.partitions = 1 +kafka1 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka1 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka1 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka1 | log.index.interval.bytes = 4096 +kafka1 | log.index.size.max.bytes = 10485760 +kafka1 | log.message.format.version = 1.0-IV0 +kafka1 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka1 | log.message.timestamp.type = CreateTime +kafka1 | log.preallocate = false +kafka1 | log.retention.bytes = -1 +kafka1 | log.retention.check.interval.ms = 300000 +kafka1 | log.retention.hours = 168 +kafka1 | log.retention.minutes = null +kafka1 | log.retention.ms = -1 +kafka1 | log.roll.hours = 168 +kafka1 | log.roll.jitter.hours = 0 +kafka1 | log.roll.jitter.ms = null +kafka1 | log.roll.ms = null +kafka1 | log.segment.bytes = 1073741824 +kafka1 | log.segment.delete.delay.ms = 60000 +kafka1 | max.connections.per.ip = 2147483647 +kafka1 | max.connections.per.ip.overrides = +kafka1 | message.max.bytes = 1048576 +kafka1 | metric.reporters = [] +kafka1 | metrics.num.samples = 2 +kafka1 | metrics.recording.level = INFO +kafka1 | metrics.sample.window.ms = 30000 +kafka1 | min.insync.replicas = 2 +kafka1 | num.io.threads = 8 +kafka1 | num.network.threads = 3 +kafka0 | num.recovery.threads.per.data.dir = 1 +kafka0 | num.replica.fetchers = 1 +kafka0 | offset.metadata.max.bytes = 4096 +kafka0 | offsets.commit.required.acks = -1 +kafka0 | offsets.commit.timeout.ms = 5000 +kafka0 | offsets.load.buffer.size = 5242880 +kafka0 | offsets.retention.check.interval.ms = 600000 +kafka0 | offsets.retention.minutes = 1440 +kafka0 | offsets.topic.compression.codec = 0 +kafka0 | offsets.topic.num.partitions = 50 +kafka0 | offsets.topic.replication.factor = 1 +kafka0 | offsets.topic.segment.bytes = 104857600 +kafka0 | port = 9092 +kafka0 | principal.builder.class = null +kafka0 | producer.purgatory.purge.interval.requests = 1000 +kafka0 | queued.max.request.bytes = -1 +kafka0 | queued.max.requests = 500 +kafka0 | quota.consumer.default = 9223372036854775807 +kafka0 | quota.producer.default = 9223372036854775807 +kafka0 | quota.window.num = 11 +kafka0 | quota.window.size.seconds = 1 +kafka0 | replica.fetch.backoff.ms = 1000 +kafka0 | replica.fetch.max.bytes = 1048576 +kafka0 | replica.fetch.min.bytes = 1 +kafka0 | replica.fetch.response.max.bytes = 10485760 +kafka0 | replica.fetch.wait.max.ms = 500 +kafka0 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka0 | replica.lag.time.max.ms = 10000 +kafka0 | replica.socket.receive.buffer.bytes = 65536 +kafka0 | replica.socket.timeout.ms = 30000 +kafka0 | replication.quota.window.num = 11 +kafka3 | min.insync.replicas = 2 +kafka3 | num.io.threads = 8 +kafka3 | num.network.threads = 3 +kafka3 | num.partitions = 1 +kafka3 | num.recovery.threads.per.data.dir = 1 +kafka3 | num.replica.fetchers = 1 +kafka3 | offset.metadata.max.bytes = 4096 +kafka3 | offsets.commit.required.acks = -1 +kafka3 | offsets.commit.timeout.ms = 5000 +kafka3 | offsets.load.buffer.size = 5242880 +kafka3 | offsets.retention.check.interval.ms = 600000 +kafka3 | offsets.retention.minutes = 1440 +kafka3 | offsets.topic.compression.codec = 0 +kafka3 | offsets.topic.num.partitions = 50 +kafka3 | offsets.topic.replication.factor = 1 +kafka3 | offsets.topic.segment.bytes = 104857600 +kafka3 | port = 9092 +kafka3 | principal.builder.class = null +kafka3 | producer.purgatory.purge.interval.requests = 1000 +kafka3 | queued.max.request.bytes = -1 +kafka3 | queued.max.requests = 500 +kafka3 | quota.consumer.default = 9223372036854775807 +kafka3 | quota.producer.default = 9223372036854775807 +kafka3 | quota.window.num = 11 +kafka3 | quota.window.size.seconds = 1 +kafka3 | replica.fetch.backoff.ms = 1000 +kafka3 | replica.fetch.max.bytes = 1048576 +kafka2 | listeners = null +kafka2 | log.cleaner.backoff.ms = 15000 +kafka2 | log.cleaner.dedupe.buffer.size = 134217728 +kafka2 | log.cleaner.delete.retention.ms = 86400000 +kafka2 | log.cleaner.enable = true +kafka2 | log.cleaner.io.buffer.load.factor = 0.9 +kafka2 | log.cleaner.io.buffer.size = 524288 +kafka2 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka2 | log.cleaner.min.cleanable.ratio = 0.5 +kafka2 | log.cleaner.min.compaction.lag.ms = 0 +kafka2 | log.cleaner.threads = 1 +kafka2 | log.cleanup.policy = [delete] +kafka2 | log.dir = /tmp/kafka-logs +kafka2 | log.dirs = /tmp/kafka-logs +kafka2 | log.flush.interval.messages = 9223372036854775807 +kafka2 | log.flush.interval.ms = null +kafka2 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka2 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka2 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka2 | log.index.interval.bytes = 4096 +kafka2 | log.index.size.max.bytes = 10485760 +kafka2 | log.message.format.version = 1.0-IV0 +kafka2 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka2 | log.message.timestamp.type = CreateTime +kafka2 | log.preallocate = false +kafka2 | log.retention.bytes = -1 +kafka2 | log.retention.check.interval.ms = 300000 +kafka2 | log.retention.hours = 168 +kafka2 | log.retention.minutes = null +kafka2 | log.retention.ms = -1 +kafka2 | log.roll.hours = 168 +kafka2 | log.roll.jitter.hours = 0 +kafka2 | log.roll.jitter.ms = null +kafka0 | replication.quota.window.size.seconds = 1 +kafka0 | request.timeout.ms = 30000 +kafka0 | reserved.broker.max.id = 1000 +kafka0 | sasl.enabled.mechanisms = [GSSAPI] +kafka0 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka0 | sasl.kerberos.min.time.before.relogin = 60000 +kafka0 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka0 | sasl.kerberos.service.name = null +kafka0 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka0 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka0 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka0 | security.inter.broker.protocol = PLAINTEXT +kafka0 | socket.receive.buffer.bytes = 102400 +kafka0 | socket.request.max.bytes = 104857600 +kafka0 | socket.send.buffer.bytes = 102400 +kafka0 | ssl.cipher.suites = null +kafka2 | log.roll.ms = null +kafka2 | log.segment.bytes = 1073741824 +kafka2 | log.segment.delete.delay.ms = 60000 +kafka2 | max.connections.per.ip = 2147483647 +kafka2 | max.connections.per.ip.overrides = +kafka2 | message.max.bytes = 1048576 +kafka2 | metric.reporters = [] +kafka2 | metrics.num.samples = 2 +kafka2 | metrics.recording.level = INFO +kafka2 | metrics.sample.window.ms = 30000 +kafka2 | min.insync.replicas = 2 +kafka2 | num.io.threads = 8 +kafka2 | num.network.threads = 3 +kafka2 | num.partitions = 1 +kafka2 | num.recovery.threads.per.data.dir = 1 +kafka2 | num.replica.fetchers = 1 +kafka2 | offset.metadata.max.bytes = 4096 +kafka1 | num.partitions = 1 +kafka1 | num.recovery.threads.per.data.dir = 1 +kafka1 | num.replica.fetchers = 1 +kafka1 | offset.metadata.max.bytes = 4096 +kafka1 | offsets.commit.required.acks = -1 +kafka1 | offsets.commit.timeout.ms = 5000 +kafka1 | offsets.load.buffer.size = 5242880 +kafka1 | offsets.retention.check.interval.ms = 600000 +kafka1 | offsets.retention.minutes = 1440 +kafka1 | offsets.topic.compression.codec = 0 +kafka1 | offsets.topic.num.partitions = 50 +kafka1 | offsets.topic.replication.factor = 1 +kafka1 | offsets.topic.segment.bytes = 104857600 +kafka1 | port = 9092 +kafka1 | principal.builder.class = null +kafka1 | producer.purgatory.purge.interval.requests = 1000 +kafka1 | queued.max.request.bytes = -1 +kafka1 | queued.max.requests = 500 +kafka1 | quota.consumer.default = 9223372036854775807 +kafka1 | quota.producer.default = 9223372036854775807 +kafka0 | ssl.client.auth = none +kafka0 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka0 | ssl.endpoint.identification.algorithm = null +kafka0 | ssl.key.password = null +kafka0 | ssl.keymanager.algorithm = SunX509 +kafka0 | ssl.keystore.location = null +kafka0 | ssl.keystore.password = null +kafka0 | ssl.keystore.type = JKS +kafka0 | ssl.protocol = TLS +kafka0 | ssl.provider = null +kafka0 | ssl.secure.random.implementation = null +kafka0 | ssl.trustmanager.algorithm = PKIX +kafka0 | ssl.truststore.location = null +kafka0 | ssl.truststore.password = null +kafka0 | ssl.truststore.type = JKS +kafka0 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka0 | transaction.max.timeout.ms = 900000 +kafka0 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka0 | transaction.state.log.load.buffer.size = 5242880 +kafka0 | transaction.state.log.min.isr = 1 +kafka0 | transaction.state.log.num.partitions = 50 +kafka0 | transaction.state.log.replication.factor = 1 +kafka0 | transaction.state.log.segment.bytes = 104857600 +kafka0 | transactional.id.expiration.ms = 604800000 +kafka0 | unclean.leader.election.enable = false +kafka0 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka0 | zookeeper.connection.timeout.ms = 6000 +kafka0 | zookeeper.session.timeout.ms = 6000 +kafka0 | zookeeper.set.acl = false +kafka0 | zookeeper.sync.time.ms = 2000 +kafka0 | (kafka.server.KafkaConfig) +kafka0 | [2019-04-22 06:25:29,805] INFO starting (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:29,819] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:29,991] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka0 | [2019-04-22 06:25:30,061] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,062] INFO Client environment:host.name=kafka0 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,064] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,065] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,068] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +zookeeper1 | ZooKeeper JMX enabled by default +zookeeper1 | Using config: /conf/zoo.cfg +zookeeper1 | 2019-04-22 06:25:20,221 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper1 | 2019-04-22 06:25:20,702 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper1 | 2019-04-22 06:25:20,738 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper1 | 2019-04-22 06:25:20,821 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper1 | 2019-04-22 06:25:20,828 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper1 | 2019-04-22 06:25:20,901 [myid:2] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper1 | 2019-04-22 06:25:20,901 [myid:2] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper1 | 2019-04-22 06:25:20,955 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper1 | 2019-04-22 06:25:21,145 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper1 | 2019-04-22 06:25:21,327 [myid:2] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +kafka2 | offsets.commit.required.acks = -1 +kafka2 | offsets.commit.timeout.ms = 5000 +kafka2 | offsets.load.buffer.size = 5242880 +kafka2 | offsets.retention.check.interval.ms = 600000 +kafka2 | offsets.retention.minutes = 1440 +kafka2 | offsets.topic.compression.codec = 0 +kafka2 | offsets.topic.num.partitions = 50 +kafka2 | offsets.topic.replication.factor = 1 +kafka2 | offsets.topic.segment.bytes = 104857600 +kafka2 | port = 9092 +kafka2 | principal.builder.class = null +kafka2 | producer.purgatory.purge.interval.requests = 1000 +kafka2 | queued.max.request.bytes = -1 +kafka2 | queued.max.requests = 500 +kafka2 | quota.consumer.default = 9223372036854775807 +kafka2 | quota.producer.default = 9223372036854775807 +kafka2 | quota.window.num = 11 +kafka2 | quota.window.size.seconds = 1 +kafka2 | replica.fetch.backoff.ms = 1000 +kafka2 | replica.fetch.max.bytes = 1048576 +kafka2 | replica.fetch.min.bytes = 1 +kafka2 | replica.fetch.response.max.bytes = 10485760 +kafka1 | quota.window.num = 11 +kafka1 | quota.window.size.seconds = 1 +kafka1 | replica.fetch.backoff.ms = 1000 +kafka1 | replica.fetch.max.bytes = 1048576 +kafka1 | replica.fetch.min.bytes = 1 +kafka1 | replica.fetch.response.max.bytes = 10485760 +kafka1 | replica.fetch.wait.max.ms = 500 +kafka1 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka1 | replica.lag.time.max.ms = 10000 +kafka1 | replica.socket.receive.buffer.bytes = 65536 +kafka1 | replica.socket.timeout.ms = 30000 +kafka1 | replication.quota.window.num = 11 +zookeeper1 | 2019-04-22 06:25:21,573 [myid:2] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper1 | 2019-04-22 06:25:21,643 [myid:2] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper0 | ZooKeeper JMX enabled by default +zookeeper0 | Using config: /conf/zoo.cfg +zookeeper0 | 2019-04-22 06:25:20,233 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper0 | 2019-04-22 06:25:20,819 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper0 | 2019-04-22 06:25:20,871 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper0 | 2019-04-22 06:25:20,941 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +kafka2 | replica.fetch.wait.max.ms = 500 +kafka2 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka2 | replica.lag.time.max.ms = 10000 +kafka2 | replica.socket.receive.buffer.bytes = 65536 +kafka2 | replica.socket.timeout.ms = 30000 +kafka2 | replication.quota.window.num = 11 +kafka2 | replication.quota.window.size.seconds = 1 +kafka2 | request.timeout.ms = 30000 +kafka2 | reserved.broker.max.id = 1000 +kafka2 | sasl.enabled.mechanisms = [GSSAPI] +kafka2 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka2 | sasl.kerberos.min.time.before.relogin = 60000 +kafka2 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka2 | sasl.kerberos.service.name = null +kafka2 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka2 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka2 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka2 | security.inter.broker.protocol = PLAINTEXT +kafka2 | socket.receive.buffer.bytes = 102400 +kafka2 | socket.request.max.bytes = 104857600 +kafka2 | socket.send.buffer.bytes = 102400 +kafka2 | ssl.cipher.suites = null +kafka2 | ssl.client.auth = none +kafka2 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka2 | ssl.endpoint.identification.algorithm = null +kafka2 | ssl.key.password = null +kafka2 | ssl.keymanager.algorithm = SunX509 +kafka2 | ssl.keystore.location = null +kafka2 | ssl.keystore.password = null +kafka1 | replication.quota.window.size.seconds = 1 +kafka1 | request.timeout.ms = 30000 +kafka1 | reserved.broker.max.id = 1000 +kafka1 | sasl.enabled.mechanisms = [GSSAPI] +kafka1 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka1 | sasl.kerberos.min.time.before.relogin = 60000 +kafka1 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka1 | sasl.kerberos.service.name = null +kafka1 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka1 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka1 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka1 | security.inter.broker.protocol = PLAINTEXT +kafka1 | socket.receive.buffer.bytes = 102400 +kafka1 | socket.request.max.bytes = 104857600 +kafka1 | socket.send.buffer.bytes = 102400 +kafka1 | ssl.cipher.suites = null +kafka1 | ssl.client.auth = none +kafka1 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka1 | ssl.endpoint.identification.algorithm = null +kafka1 | ssl.key.password = null +kafka1 | ssl.keymanager.algorithm = SunX509 +kafka1 | ssl.keystore.location = null +kafka1 | ssl.keystore.password = null +kafka1 | ssl.keystore.type = JKS +kafka1 | ssl.protocol = TLS +kafka1 | ssl.provider = null +kafka1 | ssl.secure.random.implementation = null +kafka1 | ssl.trustmanager.algorithm = PKIX +kafka1 | ssl.truststore.location = null +kafka3 | replica.fetch.min.bytes = 1 +kafka3 | replica.fetch.response.max.bytes = 10485760 +kafka3 | replica.fetch.wait.max.ms = 500 +kafka3 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka3 | replica.lag.time.max.ms = 10000 +kafka3 | replica.socket.receive.buffer.bytes = 65536 +kafka3 | replica.socket.timeout.ms = 30000 +kafka3 | replication.quota.window.num = 11 +kafka3 | replication.quota.window.size.seconds = 1 +kafka3 | request.timeout.ms = 30000 +kafka3 | reserved.broker.max.id = 1000 +kafka3 | sasl.enabled.mechanisms = [GSSAPI] +kafka3 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka3 | sasl.kerberos.min.time.before.relogin = 60000 +kafka3 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka3 | sasl.kerberos.service.name = null +kafka3 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka3 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka3 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka3 | security.inter.broker.protocol = PLAINTEXT +kafka3 | socket.receive.buffer.bytes = 102400 +kafka3 | socket.request.max.bytes = 104857600 +kafka3 | socket.send.buffer.bytes = 102400 +kafka3 | ssl.cipher.suites = null +zookeeper0 | 2019-04-22 06:25:20,942 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper0 | 2019-04-22 06:25:20,989 [myid:1] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper0 | 2019-04-22 06:25:21,019 [myid:1] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper0 | 2019-04-22 06:25:21,041 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper0 | 2019-04-22 06:25:21,210 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper1 | 2019-04-22 06:25:21,815 [myid:2] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper1 | 2019-04-22 06:25:21,901 [myid:2] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper1 | 2019-04-22 06:25:22,011 [myid:2] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper1/192.168.224.3:3888 +zookeeper1 | 2019-04-22 06:25:22,085 [myid:2] - INFO [zookeeper1/192.168.224.3:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.2:50714 +zookeeper0 | 2019-04-22 06:25:21,486 [myid:1] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +zookeeper0 | 2019-04-22 06:25:21,756 [myid:1] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper0 | 2019-04-22 06:25:21,794 [myid:1] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper0 | 2019-04-22 06:25:21,823 [myid:1] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:21,824 [myid:1] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:21,824 [myid:1] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper1 | 2019-04-22 06:25:22,217 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,220 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,362 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper1 | 2019-04-22 06:25:22,433 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 2, proposed zxid=0x0 +kafka1 | ssl.truststore.password = null +kafka1 | ssl.truststore.type = JKS +kafka1 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka1 | transaction.max.timeout.ms = 900000 +kafka1 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka1 | transaction.state.log.load.buffer.size = 5242880 +kafka1 | transaction.state.log.min.isr = 1 +kafka1 | transaction.state.log.num.partitions = 50 +kafka1 | transaction.state.log.replication.factor = 1 +kafka1 | transaction.state.log.segment.bytes = 104857600 +kafka1 | transactional.id.expiration.ms = 604800000 +kafka1 | unclean.leader.election.enable = false +kafka1 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka1 | zookeeper.connection.timeout.ms = 6000 +kafka1 | zookeeper.session.timeout.ms = 6000 +kafka1 | zookeeper.set.acl = false +kafka1 | zookeeper.sync.time.ms = 2000 +kafka1 | (kafka.server.KafkaConfig) +kafka2 | ssl.keystore.type = JKS +kafka2 | ssl.protocol = TLS +kafka2 | ssl.provider = null +kafka2 | ssl.secure.random.implementation = null +kafka2 | ssl.trustmanager.algorithm = PKIX +kafka2 | ssl.truststore.location = null +kafka2 | ssl.truststore.password = null +kafka2 | ssl.truststore.type = JKS +kafka2 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka2 | transaction.max.timeout.ms = 900000 +kafka2 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka2 | transaction.state.log.load.buffer.size = 5242880 +kafka2 | transaction.state.log.min.isr = 1 +kafka2 | transaction.state.log.num.partitions = 50 +kafka2 | transaction.state.log.replication.factor = 1 +kafka2 | transaction.state.log.segment.bytes = 104857600 +kafka2 | transactional.id.expiration.ms = 604800000 +kafka2 | unclean.leader.election.enable = false +kafka2 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka2 | zookeeper.connection.timeout.ms = 6000 +kafka2 | zookeeper.session.timeout.ms = 6000 +kafka2 | zookeeper.set.acl = false +kafka2 | zookeeper.sync.time.ms = 2000 +kafka2 | (kafka.server.KafkaConfig) +kafka2 | [2019-04-22 06:25:29,913] INFO starting (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:29,920] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:30,049] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka2 | [2019-04-22 06:25:30,093] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:22,017 [myid:1] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper0 | 2019-04-22 06:25:22,043 [myid:1] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper0 | 2019-04-22 06:25:22,199 [myid:1] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper0/192.168.224.4:3888 +zookeeper0 | 2019-04-22 06:25:22,303 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper0 | 2019-04-22 06:25:22,366 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 1, proposed zxid=0x0 +zookeeper0 | 2019-04-22 06:25:22,444 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,510 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (2, 1) +zookeeper0 | 2019-04-22 06:25:22,569 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (3, 1) +zookeeper0 | 2019-04-22 06:25:22,569 [myid:1] - INFO [zookeeper0/192.168.224.4:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.2:54450 +kafka1 | [2019-04-22 06:25:29,921] INFO starting (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:29,940] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:30,039] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka1 | [2019-04-22 06:25:30,122] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,143] INFO Client environment:host.name=kafka1 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,146] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,147] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,148] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,071] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,074] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,075] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,075] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,076] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka3 | ssl.client.auth = none +kafka3 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka3 | ssl.endpoint.identification.algorithm = null +kafka3 | ssl.key.password = null +kafka3 | ssl.keymanager.algorithm = SunX509 +kafka3 | ssl.keystore.location = null +kafka3 | ssl.keystore.password = null +kafka3 | ssl.keystore.type = JKS +kafka3 | ssl.protocol = TLS +kafka3 | ssl.provider = null +kafka3 | ssl.secure.random.implementation = null +kafka3 | ssl.trustmanager.algorithm = PKIX +kafka3 | ssl.truststore.location = null +kafka3 | ssl.truststore.password = null +kafka3 | ssl.truststore.type = JKS +kafka3 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka3 | transaction.max.timeout.ms = 900000 +kafka3 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka3 | transaction.state.log.load.buffer.size = 5242880 +kafka3 | transaction.state.log.min.isr = 1 +kafka3 | transaction.state.log.num.partitions = 50 +kafka3 | transaction.state.log.replication.factor = 1 +kafka3 | transaction.state.log.segment.bytes = 104857600 +kafka2 | [2019-04-22 06:25:30,094] INFO Client environment:host.name=kafka2 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,095] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,097] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,099] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +kafka3 | transactional.id.expiration.ms = 604800000 +kafka3 | unclean.leader.election.enable = false +kafka3 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka3 | zookeeper.connection.timeout.ms = 6000 +kafka3 | zookeeper.session.timeout.ms = 6000 +kafka3 | zookeeper.set.acl = false +kafka3 | zookeeper.sync.time.ms = 2000 +kafka3 | (kafka.server.KafkaConfig) +kafka3 | [2019-04-22 06:25:29,900] INFO starting (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:29,904] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:30,007] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka3 | [2019-04-22 06:25:30,088] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,098] INFO Client environment:host.name=kafka3 (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:22,568 [myid:2] - INFO [zookeeper1/192.168.224.3:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.4:54956 +zookeeper1 | 2019-04-22 06:25:22,639 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,653 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,698 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,744 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,612 [myid:1] - INFO [zookeeper0/192.168.224.4:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.3:57336 +zookeeper0 | 2019-04-22 06:25:22,738 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,745 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,747 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,748 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,083] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,083] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,085] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,225] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:30,269] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,333] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,511] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,525] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:31,957] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:32,049] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka0 | [2019-04-22 06:25:32,267] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,274] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,277] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,535] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +zookeeper2 | ZooKeeper JMX enabled by default +zookeeper2 | Using config: /conf/zoo.cfg +zookeeper2 | 2019-04-22 06:25:20,031 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper2 | 2019-04-22 06:25:20,383 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper2 | 2019-04-22 06:25:20,444 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper1 | 2019-04-22 06:25:22,747 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,925 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING +zookeeper1 | 2019-04-22 06:25:22,997 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true +zookeeper2 | 2019-04-22 06:25:20,480 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:20,481 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper2 | 2019-04-22 06:25:20,552 [myid:3] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper2 | 2019-04-22 06:25:20,559 [myid:3] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper2 | 2019-04-22 06:25:20,594 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper2 | 2019-04-22 06:25:21,066 [myid:3] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +zookeeper2 | 2019-04-22 06:25:21,114 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper2 | 2019-04-22 06:25:21,449 [myid:3] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:22,784 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,972 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING +zookeeper0 | 2019-04-22 06:25:23,025 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true +kafka0 | [2019-04-22 06:25:32,627] INFO Loading logs. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:32,664] INFO Logs loading complete in 30 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:43,064] WARN Client session timed out, have not heard from server in 10636ms for sessionid 0x36a43b878a10001 (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,065] INFO Client session timed out, have not heard from server in 10636ms for sessionid 0x36a43b878a10001, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,215] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:43,226] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:21,496 [myid:3] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper2 | 2019-04-22 06:25:21,654 [myid:3] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper2 | 2019-04-22 06:25:21,717 [myid:3] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper2 | 2019-04-22 06:25:21,767 [myid:3] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper2/192.168.224.2:3888 +zookeeper2 | 2019-04-22 06:25:21,898 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper1 | 2019-04-22 06:25:23,122 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper1 | 2019-04-22 06:25:23,124 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper1 +zookeeper1 | 2019-04-22 06:25:23,127 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper2 | 2019-04-22 06:25:21,916 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 3, proposed zxid=0x0 +zookeeper2 | 2019-04-22 06:25:22,021 [myid:3] - WARN [WorkerSender[myid=3]:QuorumCnxManager@400] - Cannot open channel to 1 at election address zookeeper0/192.168.224.4:3888 +zookeeper2 | java.net.ConnectException: Connection refused (Connection refused) +zookeeper2 | at java.net.PlainSocketImpl.socketConnect(Native Method) +zookeeper2 | at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350) +kafka3 | [2019-04-22 06:25:30,100] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,101] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,102] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188) +zookeeper2 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) +zookeeper2 | at java.net.Socket.connect(Socket.java:589) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.connectOne(QuorumCnxManager.java:381) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.toSend(QuorumCnxManager.java:354) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.process(FastLeaderElection.java:452) +zookeeper1 | 2019-04-22 06:25:23,131 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper1 | 2019-04-22 06:25:23,134 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka1 | [2019-04-22 06:25:30,149] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,154] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,155] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:23,155 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper0 | 2019-04-22 06:25:23,170 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper0 +zookeeper1 | 2019-04-22 06:25:23,191 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper1 | 2019-04-22 06:25:23,249 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper1 | 2019-04-22 06:25:23,263 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper1 | 2019-04-22 06:25:23,275 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper1 | 2019-04-22 06:25:23,276 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper1 | 2019-04-22 06:25:23,344 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.run(FastLeaderElection.java:433) +zookeeper2 | at java.lang.Thread.run(Thread.java:748) +zookeeper2 | 2019-04-22 06:25:22,077 [myid:3] - INFO [WorkerSender[myid=3]:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:22,170 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,179 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@852] - Notification time out: 400 +zookeeper2 | 2019-04-22 06:25:22,186 [myid:3] - WARN [WorkerSender[myid=3]:QuorumCnxManager@400] - Cannot open channel to 1 at election address zookeeper0/192.168.224.4:3888 +zookeeper2 | java.net.ConnectException: Connection refused (Connection refused) +zookeeper2 | at java.net.PlainSocketImpl.socketConnect(Native Method) +kafka2 | [2019-04-22 06:25:30,099] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,103] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,104] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:23,357 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper1 | 2019-04-22 06:25:23,369 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper1 | 2019-04-22 06:25:23,390 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper1 | 2019-04-22 06:25:23,392 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +zookeeper1 | 2019-04-22 06:25:23,433 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper1 | 2019-04-22 06:25:23,469 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 1035 +kafka0 | [2019-04-22 06:25:43,259] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:43,968] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,986] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,037] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10001 has expired (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,043] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10001 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,069] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:44,070] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:23,553 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper1 | 2019-04-22 06:25:23,973 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 +zookeeper1 | 2019-04-22 06:25:24,057 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 +zookeeper1 | 2019-04-22 06:25:30,406 [myid:2] - WARN [QuorumPeer[myid=2]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 +zookeeper1 | 2019-04-22 06:25:30,411 [myid:2] - INFO [SyncThread:2:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper1 | 2019-04-22 06:25:45,016 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:37938 +zookeeper1 | 2019-04-22 06:25:45,227 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10002 at /192.168.224.7:37938 +zookeeper2 | at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188) +zookeeper2 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) +zookeeper2 | at java.net.Socket.connect(Socket.java:589) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.connectOne(QuorumCnxManager.java:381) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,106] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,107] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,107] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,108] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,103] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.toSend(QuorumCnxManager.java:354) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.process(FastLeaderElection.java:452) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.run(FastLeaderElection.java:433) +zookeeper2 | at java.lang.Thread.run(Thread.java:748) +zookeeper2 | 2019-04-22 06:25:22,186 [myid:3] - INFO [WorkerSender[myid=3]:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:22,198 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,559 [myid:3] - INFO [zookeeper2/192.168.224.2:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.4:32832 +kafka0 | [2019-04-22 06:25:44,158] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,201] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,227] INFO EventThread shut down for session: 0x36a43b878a10001 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,155] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +zookeeper2 | 2019-04-22 06:25:22,599 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@852] - Notification time out: 800 +zookeeper2 | 2019-04-22 06:25:22,601 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,671 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka0 | [2019-04-22 06:25:44,245] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10003, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:22,702 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,737 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka2 | [2019-04-22 06:25:30,112] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,251] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:30,271] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:30,325] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:30,475] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +zookeeper1 | 2019-04-22 06:25:45,230 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10002 +zookeeper1 | 2019-04-22 06:25:45,277 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10002 for client /192.168.224.7:37938, probably expired +zookeeper1 | 2019-04-22 06:25:45,281 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:41332 +zookeeper1 | 2019-04-22 06:25:45,298 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.7:37938 which had sessionid 0x36a43b878a10002 +zookeeper1 | 2019-04-22 06:25:45,299 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10000 at /192.168.224.9:41332 +zookeeper0 | 2019-04-22 06:25:23,176 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper0 | 2019-04-22 06:25:23,179 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper0 | 2019-04-22 06:25:23,184 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka0 | [2019-04-22 06:25:44,363] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:47,713] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka0 | [2019-04-22 06:25:47,794] INFO [SocketServer brokerId=0] Started 1 acceptor threads (kafka.network.SocketServer) +kafka0 | [2019-04-22 06:25:48,364] INFO [ExpirationReaper-0-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,384] INFO [ExpirationReaper-0-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,382] INFO [ExpirationReaper-0-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,550] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka0 | [2019-04-22 06:25:48,923] INFO [ExpirationReaper-0-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:30,492] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:32,304] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:32,375] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka2 | [2019-04-22 06:25:32,800] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:32,801] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:33,351] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:34,468] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:22,746 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,916 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@856] - LEADING +zookeeper2 | 2019-04-22 06:25:22,957 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@59] - TCP NoDelay set to: true +zookeeper2 | 2019-04-22 06:25:23,404 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper2 | 2019-04-22 06:25:23,437 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper2 +zookeeper1 | 2019-04-22 06:25:45,301 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10000 +zookeeper1 | 2019-04-22 06:25:45,328 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10000 for client /192.168.224.9:41332, probably expired +zookeeper1 | 2019-04-22 06:25:45,335 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.9:41332 which had sessionid 0x36a43b878a10000 +zookeeper1 | 2019-04-22 06:25:45,387 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:41334 +zookeeper1 | 2019-04-22 06:25:45,403 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.9:41334 +kafka3 | [2019-04-22 06:25:30,109] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,110] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,111] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,113] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:34,832] INFO Loading logs. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:35,440] INFO Logs loading complete in 559 ms. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:44,810] WARN Client session timed out, have not heard from server in 8587ms for sessionid 0x36a43b878a10000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:44,844] INFO Client session timed out, have not heard from server in 8587ms for sessionid 0x36a43b878a10000, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:44,961] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:44,989] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:48,959] INFO [ExpirationReaper-0-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +zookeeper1 | 2019-04-22 06:25:45,452 [myid:2] - INFO [CommitProcessor:2:ZooKeeperServer@673] - Established session 0x26a43b878560000 with negotiated timeout 6000 for client /192.168.224.9:41334 +zookeeper0 | 2019-04-22 06:25:23,233 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper0 | 2019-04-22 06:25:23,241 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper0 | 2019-04-22 06:25:23,251 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka3 | [2019-04-22 06:25:30,114] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,115] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,119] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,119] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,120] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,122] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper0 | 2019-04-22 06:25:23,253 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper0 | 2019-04-22 06:25:23,299 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper0 | 2019-04-22 06:25:23,307 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper0 | 2019-04-22 06:25:23,307 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +kafka1 | [2019-04-22 06:25:30,157] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,157] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,159] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,376] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:30,388] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper2 | 2019-04-22 06:25:23,442 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper2 | 2019-04-22 06:25:23,443 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper2 | 2019-04-22 06:25:23,443 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper2 | 2019-04-22 06:25:23,444 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper0 | 2019-04-22 06:25:23,556 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper0 | 2019-04-22 06:25:23,568 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 1202 +zookeeper0 | 2019-04-22 06:25:23,618 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper0 | 2019-04-22 06:25:24,004 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 +zookeeper0 | 2019-04-22 06:25:24,061 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 +zookeeper0 | 2019-04-22 06:25:30,310 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.8:53854 +kafka2 | [2019-04-22 06:25:45,085] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:45,123] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,124] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,330] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:45,332] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:45,336] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10000 has expired (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,437] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,532] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10002, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,536] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:32,182] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:32,235] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:32,586] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka1 | [2019-04-22 06:25:32,611] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +zookeeper0 | 2019-04-22 06:25:30,363 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.8:53854 +zookeeper0 | 2019-04-22 06:25:30,409 [myid:1] - WARN [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 +zookeeper0 | 2019-04-22 06:25:30,413 [myid:1] - INFO [SyncThread:1:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper0 | 2019-04-22 06:25:30,463 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x16a43b878390000 with negotiated timeout 6000 for client /192.168.224.8:53854 +zookeeper0 | 2019-04-22 06:25:43,973 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:48858 +zookeeper0 | 2019-04-22 06:25:43,995 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10001 at /192.168.224.6:48858 +zookeeper0 | 2019-04-22 06:25:43,996 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10001 +kafka3 | [2019-04-22 06:25:30,220] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,224] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka3 | [2019-04-22 06:25:30,336] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,480] INFO Session establishment complete on server zookeeper0.hlf_net/192.168.224.4:2181, sessionid = 0x16a43b878390000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,487] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka3 | [2019-04-22 06:25:32,149] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:32,199] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:32,612] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka1 | [2019-04-22 06:25:34,160] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:34,721] INFO Loading logs. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:35,346] INFO Logs loading complete in 535 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,666] WARN Client session timed out, have not heard from server in 9369ms for sessionid 0x36a43b878a10002 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:44,717] INFO Client session timed out, have not heard from server in 9369ms for sessionid 0x36a43b878a10002, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,339] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10000 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,377] INFO EventThread shut down for session: 0x36a43b878a10000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,385] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,395] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:23,444 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper2 | 2019-04-22 06:25:23,448 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper2 | 2019-04-22 06:25:23,449 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper2 | 2019-04-22 06:25:23,456 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +zookeeper2 | 2019-04-22 06:25:23,533 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper2 | 2019-04-22 06:25:23,548 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@361] - LEADING - LEADER ELECTION TOOK - 1632 +zookeeper0 | 2019-04-22 06:25:44,017 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10001 for client /192.168.224.6:48858, probably expired +zookeeper0 | 2019-04-22 06:25:44,046 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.6:48858 which had sessionid 0x36a43b878a10001 +zookeeper0 | 2019-04-22 06:25:45,388 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:42678 +zookeeper0 | 2019-04-22 06:25:45,399 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.7:42678 +kafka3 | [2019-04-22 06:25:32,430] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:32,461] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:32,465] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:33,220] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:33,757] INFO Loading logs. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:34,064] INFO Logs loading complete in 233 ms. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:44,412] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:23,904 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@329] - Follower sid: 1 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@130b774d +zookeeper2 | 2019-04-22 06:25:23,904 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@329] - Follower sid: 2 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@2173154f +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@384] - Synchronizing with Follower sid: 2 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@458] - Sending DIFF +kafka1 | [2019-04-22 06:25:44,844] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:44,891] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,920] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,986] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,003] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,268] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10002 has expired (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,479] INFO Session establishment complete on server zookeeper1.hlf_net/192.168.224.3:2181, sessionid = 0x26a43b878560000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,491] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:47,739] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka2 | [2019-04-22 06:25:47,987] INFO [SocketServer brokerId=2] Started 1 acceptor threads (kafka.network.SocketServer) +zookeeper0 | 2019-04-22 06:25:45,432 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x16a43b878390001 with negotiated timeout 6000 for client /192.168.224.7:42678 +zookeeper2 | 2019-04-22 06:25:23,981 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@384] - Synchronizing with Follower sid: 1 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,981 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,988 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@458] - Sending DIFF +zookeeper2 | 2019-04-22 06:25:24,112 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@518] - Received NEWLEADER-ACK message from 1 +kafka2 | [2019-04-22 06:25:48,116] INFO [ExpirationReaper-2-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,142] INFO [ExpirationReaper-2-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:44,458] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:47,419] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka3 | [2019-04-22 06:25:47,499] INFO [SocketServer brokerId=3] Started 1 acceptor threads (kafka.network.SocketServer) +kafka3 | [2019-04-22 06:25:48,032] INFO [ExpirationReaper-3-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,041] INFO [ExpirationReaper-3-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,043] INFO [ExpirationReaper-3-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,123] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka3 | [2019-04-22 06:25:48,529] INFO [ExpirationReaper-3-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:45,274] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10002 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,271] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +zookeeper2 | 2019-04-22 06:25:24,114 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@952] - Have quorum of supporters, sids: [ 1,3 ]; starting up and setting last processed zxid: 0x100000000 +zookeeper2 | 2019-04-22 06:25:24,167 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@518] - Received NEWLEADER-ACK message from 2 +zookeeper2 | 2019-04-22 06:25:30,317 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:51908 +zookeeper2 | 2019-04-22 06:25:30,348 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,372 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.9:51908 +kafka0 | [2019-04-22 06:25:48,968] INFO [ExpirationReaper-0-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:49,070] INFO [GroupCoordinator 0]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,145] INFO [GroupCoordinator 0]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,170] INFO [GroupMetadataManager brokerId=0] Removed 0 expired offsets in 84 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka0 | [2019-04-22 06:25:49,375] INFO [ProducerId Manager 0]: Acquired new producerId block (brokerId:0,blockStartProducerId:3000,blockEndProducerId:3999) by writing to Zk with path version 4 (kafka.coordinator.transaction.ProducerIdManager) +kafka0 | [2019-04-22 06:25:49,465] INFO [TransactionCoordinator id=0] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka0 | [2019-04-22 06:25:49,510] INFO [TransactionCoordinator id=0] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:48,567] INFO [ExpirationReaper-3-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,583] INFO [ExpirationReaper-3-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,623] INFO Creating /controller (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:48,732] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:48,815] INFO [GroupCoordinator 3]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka3 | [2019-04-22 06:25:48,822] INFO [GroupCoordinator 3]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka3 | [2019-04-22 06:25:48,923] INFO [GroupMetadataManager brokerId=3] Removed 0 expired offsets in 94 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka3 | [2019-04-22 06:25:49,108] INFO [ProducerId Manager 3]: Acquired new producerId block (brokerId:3,blockStartProducerId:2000,blockEndProducerId:2999) by writing to Zk with path version 3 (kafka.coordinator.transaction.ProducerIdManager) +kafka3 | [2019-04-22 06:25:49,297] INFO [TransactionCoordinator id=3] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:49,358] INFO [TransactionCoordinator id=3] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:49,363] INFO [Transaction Marker Channel Manager 3]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka3 | [2019-04-22 06:25:49,896] INFO Creating /brokers/ids/3 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +zookeeper2 | 2019-04-22 06:25:30,386 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,399 [myid:3] - INFO [SyncThread:3:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper2 | 2019-04-22 06:25:30,465 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,484 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,469 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10000 with negotiated timeout 6000 for client /192.168.224.9:51908 +kafka2 | [2019-04-22 06:25:48,148] INFO [ExpirationReaper-2-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,267] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka2 | [2019-04-22 06:25:48,516] INFO [ExpirationReaper-2-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,573] INFO [ExpirationReaper-2-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,592] INFO [ExpirationReaper-2-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,807] INFO Creating /controller (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:48,854] INFO [GroupCoordinator 2]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka2 | [2019-04-22 06:25:48,864] INFO Result of znode creation is: NODEEXISTS (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:48,866] INFO [GroupCoordinator 2]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,601] INFO [Transaction Marker Channel Manager 0]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka0 | [2019-04-22 06:25:50,110] INFO Creating /brokers/ids/0 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka0 | [2019-04-22 06:25:50,201] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka0 | [2019-04-22 06:25:50,211] INFO Registered broker 0 at path /brokers/ids/0 with addresses: EndPoint(kafka0,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka0 | [2019-04-22 06:25:50,220] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka0 | [2019-04-22 06:25:50,363] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:50,364] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:50,375] INFO [KafkaServer id=0] started (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:55,266] INFO Topic creation {"version":1,"partitions":{"0":[2,0,1]}} (kafka.admin.AdminUtils$) +kafka0 | [2019-04-22 06:25:55,285] INFO Topic creation {"version":1,"partitions":{"0":[3,1,2]}} (kafka.admin.AdminUtils$) +zookeeper2 | 2019-04-22 06:25:30,514 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10001 with negotiated timeout 6000 for client /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,536 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10002 with negotiated timeout 6000 for client /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,706 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x3 zxid:0x100000006 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +zookeeper2 | 2019-04-22 06:25:30,721 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x3 zxid:0x100000007 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +kafka1 | [2019-04-22 06:25:45,276] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:45,309] INFO EventThread shut down for session: 0x36a43b878a10002 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,385] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,396] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,441] INFO Session establishment complete on server zookeeper0.hlf_net/192.168.224.4:2181, sessionid = 0x16a43b878390001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,468] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:47,963] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka1 | [2019-04-22 06:25:48,064] INFO [SocketServer brokerId=1] Started 1 acceptor threads (kafka.network.SocketServer) +zookeeper2 | 2019-04-22 06:25:30,727 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x3 zxid:0x100000008 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +zookeeper2 | 2019-04-22 06:25:30,755 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x5 zxid:0x100000009 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers +zookeeper2 | 2019-04-22 06:25:30,787 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x5 zxid:0x10000000a txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers +kafka2 | [2019-04-22 06:25:48,933] INFO [GroupMetadataManager brokerId=2] Removed 0 expired offsets in 60 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka2 | [2019-04-22 06:25:49,042] INFO [ProducerId Manager 2]: Acquired new producerId block (brokerId:2,blockStartProducerId:1000,blockEndProducerId:1999) by writing to Zk with path version 2 (kafka.coordinator.transaction.ProducerIdManager) +kafka2 | [2019-04-22 06:25:49,165] INFO [TransactionCoordinator id=2] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka2 | [2019-04-22 06:25:49,188] INFO [TransactionCoordinator id=2] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka2 | [2019-04-22 06:25:49,195] INFO [Transaction Marker Channel Manager 2]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka2 | [2019-04-22 06:25:49,469] INFO Creating /brokers/ids/2 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:49,538] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:48,201] INFO [ExpirationReaper-1-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,212] INFO [ExpirationReaper-1-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,221] INFO [ExpirationReaper-1-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,278] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka1 | [2019-04-22 06:25:48,499] INFO [ExpirationReaper-1-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,553] INFO [ExpirationReaper-1-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,657] INFO [ExpirationReaper-1-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,766] INFO [GroupCoordinator 1]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka1 | [2019-04-22 06:25:48,783] INFO [GroupCoordinator 1]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +zookeeper2 | 2019-04-22 06:25:30,843 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x5 zxid:0x10000000e txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +kafka0 | [2019-04-22 06:25:55,304] INFO [KafkaApi-0] Auto creation of topic businesschannel with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) +kafka0 | [2019-04-22 06:25:55,548] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka0 | [2019-04-22 06:25:55,693] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka0 | [2019-04-22 06:25:55,736] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 131 ms (kafka.log.Log) +kafka0 | [2019-04-22 06:25:55,744] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:55,749] INFO [Partition businesschannel-0 broker=0] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka0 | [2019-04-22 06:25:55,750] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka0 | [2019-04-22 06:25:55,751] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,863 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x8 zxid:0x10000000f txntype:-1 reqpath:n/a Error Path:/config Error:KeeperErrorCode = NoNode for /config +zookeeper2 | 2019-04-22 06:25:30,872 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x6 zxid:0x100000010 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:30,883 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x8 zxid:0x100000013 txntype:-1 reqpath:n/a Error Path:/config/changes Error:KeeperErrorCode = NodeExists for /config/changes +zookeeper2 | 2019-04-22 06:25:30,887 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x7 zxid:0x100000014 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +kafka2 | [2019-04-22 06:25:49,555] INFO Registered broker 2 at path /brokers/ids/2 with addresses: EndPoint(kafka2,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka2 | [2019-04-22 06:25:49,568] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka2 | [2019-04-22 06:25:49,631] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka2 | [2019-04-22 06:25:49,632] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka2 | [2019-04-22 06:25:49,653] INFO [KafkaServer id=2] started (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:50,782] INFO Topic creation {"version":1,"partitions":{"0":[2,1,3]}} (kafka.admin.AdminUtils$) +kafka2 | [2019-04-22 06:25:50,797] INFO [KafkaApi-2] Auto creation of topic testchainid with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) +kafka2 | [2019-04-22 06:25:50,994] INFO [ReplicaFetcherManager on broker 2] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +kafka1 | [2019-04-22 06:25:48,837] INFO [GroupMetadataManager brokerId=1] Removed 0 expired offsets in 42 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka1 | [2019-04-22 06:25:48,944] INFO [ProducerId Manager 1]: Acquired new producerId block (brokerId:1,blockStartProducerId:0,blockEndProducerId:999) by writing to Zk with path version 1 (kafka.coordinator.transaction.ProducerIdManager) +kafka1 | [2019-04-22 06:25:49,085] INFO [TransactionCoordinator id=1] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka1 | [2019-04-22 06:25:49,106] INFO [TransactionCoordinator id=1] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka1 | [2019-04-22 06:25:49,133] INFO [Transaction Marker Channel Manager 1]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka1 | [2019-04-22 06:25:49,707] INFO Creating /brokers/ids/1 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:49,760] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:49,770] INFO Registered broker 1 at path /brokers/ids/1 with addresses: EndPoint(kafka1,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka1 | [2019-04-22 06:25:49,781] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:49,846] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:49,849] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:49,864] INFO [KafkaServer id=1] started (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:51,041] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka1 | [2019-04-22 06:25:51,204] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,895 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xa zxid:0x100000015 txntype:-1 reqpath:n/a Error Path:/config/changes Error:KeeperErrorCode = NodeExists for /config/changes +zookeeper2 | 2019-04-22 06:25:30,911 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xa zxid:0x100000017 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:30,914 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xc zxid:0x100000018 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +kafka0 | [2019-04-22 06:25:55,760] INFO [ReplicaFetcherManager on broker 0] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +kafka0 | [2019-04-22 06:25:55,823] INFO [ReplicaFetcher replicaId=0, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +kafka0 | [2019-04-22 06:25:55,836] INFO [ReplicaFetcherManager on broker 0] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +kafka0 | [2019-04-22 06:25:55,925] WARN [ReplicaFetcher replicaId=0, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in businesschannel-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) +kafka0 | [2019-04-22 06:25:55,932] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka2 | [2019-04-22 06:25:51,199] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +kafka2 | [2019-04-22 06:25:51,228] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 75 ms (kafka.log.Log) +kafka3 | [2019-04-22 06:25:49,950] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:49,967] INFO Registered broker 3 at path /brokers/ids/3 with addresses: EndPoint(kafka3,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka3 | [2019-04-22 06:25:50,006] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka3 | [2019-04-22 06:25:50,064] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:56,002] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka2 | [2019-04-22 06:25:51,248] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:50,074] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:51,265] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 139 ms (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,930 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xc zxid:0x10000001a txntype:-1 reqpath:n/a Error Path:/config/clients Error:KeeperErrorCode = NodeExists for /config/clients +kafka2 | [2019-04-22 06:25:51,260] INFO [Partition testchainid-0 broker=2] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:50,097] INFO [KafkaServer id=3] started (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:51,285] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:30,936 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xe zxid:0x10000001b txntype:-1 reqpath:n/a Error Path:/config/clients Error:KeeperErrorCode = NodeExists for /config/clients +kafka1 | [2019-04-22 06:25:51,292] INFO [Partition testchainid-0 broker=1] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +zookeeper2 | 2019-04-22 06:25:30,946 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0xd zxid:0x10000001c txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,294] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:51,273] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:50,825] INFO Topic creation {"version":1,"partitions":{"0":[1,2,3]}} (kafka.admin.AdminUtils$) +zookeeper2 | 2019-04-22 06:25:30,953 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x10 zxid:0x10000001d txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,299] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:51,281] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,037] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,957 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xe zxid:0x10000001e txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,322] INFO [ReplicaFetcherManager on broker 1] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +kafka2 | [2019-04-22 06:25:51,282] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,053] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,966 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x11 zxid:0x100000020 txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NodeExists for /admin +kafka1 | [2019-04-22 06:25:51,489] INFO [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +kafka2 | [2019-04-22 06:25:51,287] INFO [Partition testchainid-0 broker=2] testchainid-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:51,275] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,977 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xf zxid:0x100000022 txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NodeExists for /admin +kafka1 | [2019-04-22 06:25:51,528] INFO [ReplicaFetcherManager on broker 1] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +kafka2 | [2019-04-22 06:25:51,936] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka3 | [2019-04-22 06:25:51,309] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 165 ms (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,983 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x12 zxid:0x100000023 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:52,674] WARN [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in testchainid-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) +kafka2 | [2019-04-22 06:25:55,437] INFO [ReplicaFetcherManager on broker 2] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +kafka3 | [2019-04-22 06:25:51,321] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:30,984 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0xf zxid:0x100000024 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:52,696] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,464] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka3 | [2019-04-22 06:25:51,363] INFO [Partition testchainid-0 broker=3] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +zookeeper2 | 2019-04-22 06:25:31,000 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x14 zxid:0x100000026 txntype:-1 reqpath:n/a Error Path:/brokers/seqid Error:KeeperErrorCode = NodeExists for /brokers/seqid +kafka1 | [2019-04-22 06:25:52,830] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka2 | [2019-04-22 06:25:55,483] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 28 ms (kafka.log.Log) +kafka3 | [2019-04-22 06:25:51,364] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:31,020 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x10 zxid:0x100000027 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:55,437] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:55,506] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:51,379] INFO [ReplicaFetcherManager on broker 3] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:31,038 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x12 zxid:0x100000029 txntype:-1 reqpath:n/a Error Path:/isr_change_notification Error:KeeperErrorCode = NodeExists for /isr_change_notification +kafka1 | [2019-04-22 06:25:55,446] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:55,507] INFO [Partition businesschannel-0 broker=2] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:51,572] INFO [ReplicaFetcher replicaId=3, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:31,064 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x15 zxid:0x10000002c txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification +kafka1 | [2019-04-22 06:25:55,456] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,508] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,595] INFO [ReplicaFetcherManager on broker 3] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:31,089 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x18 zxid:0x10000002d txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification +kafka1 | [2019-04-22 06:25:55,473] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 18 ms (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,510] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,673] INFO [ReplicaFetcher replicaId=3, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an offset 0 >= the follower's log end offset 0 in testchainid-0. No truncation needed. (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:31,899 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x1a zxid:0x10000002e txntype:-1 reqpath:n/a Error Path:/cluster Error:KeeperErrorCode = NoNode for /cluster +kafka1 | [2019-04-22 06:25:55,475] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:55,518] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,681] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:31,948 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x1c zxid:0x100000031 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka2 | [2019-04-22 06:25:55,519] INFO [Partition businesschannel-0 broker=2] businesschannel-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) +kafka1 | [2019-04-22 06:25:55,480] INFO [Partition businesschannel-0 broker=1] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:52,459] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +zookeeper2 | 2019-04-22 06:25:32,016 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x16 zxid:0x100000032 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka2 | [2019-04-22 06:25:55,692] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka1 | [2019-04-22 06:25:55,480] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:32,103 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x17 zxid:0x100000033 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka1 | [2019-04-22 06:25:55,482] INFO [ReplicaFetcherManager on broker 1] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:40,002 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10001, timeout of 6000ms exceeded +kafka1 | [2019-04-22 06:25:55,483] INFO [ReplicaFetcherManager on broker 1] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:40,003 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10001 +kafka1 | [2019-04-22 06:25:55,654] INFO [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an offset 0 >= the follower's log end offset 0 in businesschannel-0. No truncation needed. (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:40,255 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.6:41242 which had sessionid 0x36a43b878a10001 +kafka1 | [2019-04-22 06:25:55,656] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka1 | [2019-04-22 06:25:55,723] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +zookeeper2 | 2019-04-22 06:25:42,003 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10002, timeout of 6000ms exceeded +zookeeper2 | 2019-04-22 06:25:42,004 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10002 +zookeeper2 | 2019-04-22 06:25:42,032 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.7:49656 which had sessionid 0x36a43b878a10002 +zookeeper2 | 2019-04-22 06:25:44,000 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10000, timeout of 6000ms exceeded +zookeeper2 | 2019-04-22 06:25:44,001 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10000 +zookeeper2 | 2019-04-22 06:25:44,016 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.9:51908 which had sessionid 0x36a43b878a10000 +zookeeper2 | 2019-04-22 06:25:44,190 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:44,207 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:44,236 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10003 with negotiated timeout 6000 for client /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:48,786 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:setData cxid:0x26 zxid:0x10000003b txntype:-1 reqpath:n/a Error Path:/controller_epoch Error:KeeperErrorCode = NoNode for /controller_epoch +zookeeper2 | 2019-04-22 06:25:48,832 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x6 zxid:0x10000003d txntype:-1 reqpath:n/a Error Path:/controller Error:KeeperErrorCode = NodeExists for /controller +zookeeper2 | 2019-04-22 06:25:48,954 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:setData cxid:0xa zxid:0x10000003f txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = BadVersion for /latest_producer_id_block +zookeeper2 | 2019-04-22 06:25:49,044 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:setData cxid:0x2f zxid:0x100000041 txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = BadVersion for /latest_producer_id_block +zookeeper2 | 2019-04-22 06:25:49,476 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x18 zxid:0x100000044 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,498 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x19 zxid:0x100000045 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:49,717 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390001 type:create cxid:0x12 zxid:0x100000047 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,725 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390001 type:create cxid:0x13 zxid:0x100000048 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:49,897 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:delete cxid:0x4d zxid:0x10000004a txntype:-1 reqpath:n/a Error Path:/admin/preferred_replica_election Error:KeeperErrorCode = NoNode for /admin/preferred_replica_election +zookeeper2 | 2019-04-22 06:25:49,921 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x4f zxid:0x10000004b txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,928 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x50 zxid:0x10000004c txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:50,150 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x16 zxid:0x10000004e txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:50,161 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x17 zxid:0x10000004f txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:50,750 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:setData cxid:0x21 zxid:0x100000051 txntype:-1 reqpath:n/a Error Path:/config/topics/testchainid Error:KeeperErrorCode = NoNode for /config/topics/testchainid +zookeeper2 | 2019-04-22 06:25:50,764 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x22 zxid:0x100000052 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:50,829 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x71 zxid:0x100000056 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid Error:KeeperErrorCode = NodeExists for /brokers/topics/testchainid +zookeeper2 | 2019-04-22 06:25:50,883 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x76 zxid:0x100000057 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions/0 +zookeeper2 | 2019-04-22 06:25:50,891 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x77 zxid:0x100000058 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions +zookeeper2 | 2019-04-22 06:25:55,230 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:setData cxid:0x25 zxid:0x10000005c txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,231 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:setData cxid:0x26 zxid:0x10000005d txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,245 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x27 zxid:0x10000005e txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:55,251 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x28 zxid:0x10000005f txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:55,261 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x2a zxid:0x100000061 txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NodeExists for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,290 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x2d zxid:0x100000064 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel Error:KeeperErrorCode = NodeExists for /brokers/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,350 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x8f zxid:0x100000065 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions/0 +zookeeper2 | 2019-04-22 06:25:55,374 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x90 zxid:0x100000066 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions diff --git a/hyperledger_fabric/v1.4.2/kafka/logs/dev_orderer.log b/hyperledger_fabric/v1.4.2/kafka/logs/dev_orderer.log new file mode 100644 index 00000000..25be3682 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/logs/dev_orderer.log @@ -0,0 +1,229 @@ +2019-04-22 06:25:19.571 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +"2019-04-22 06:25:19.950 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 1s + Kafka.Retry.ShortTotal = 30s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = true + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-04-22 06:25:20.432 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +"2019-04-22 06:25:20.438 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +"2019-04-22 06:25:20.706 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +"2019-04-22 06:25:20.750 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +"2019-04-22 06:25:20.757 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 007 [channel: testchainid] Setting up the topic for this channel..." +"2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 008 Starting orderer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64" +"2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 009 Beginning to serve requests" +"2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +"2019-04-22 06:25:50.547 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +"2019-04-22 06:25:50.548 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +"2019-04-22 06:25:52.951 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +"2019-04-22 06:25:52.952 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +"2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +"2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +"2019-04-22 06:25:53.072 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +"2019-04-22 06:25:53.175 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +"2019-04-22 06:25:55.129 UTC [comm.grpc.server] 1 -> INFO 013 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55752 grpc.code=OK grpc.call_duration=131.3442ms +"2019-04-22 06:25:55.143 UTC [fsblkstorage] newBlockfileMgr -> INFO 014 Getting block information from block storage" +"2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] newChain -> INFO 015 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +"2019-04-22 06:25:55.166 UTC [orderer.commmon.multichannel] newChain -> INFO 016 Created and starting new chain businesschannel" +"2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 017 [channel: businesschannel] Setting up the topic for this channel..." +"2019-04-22 06:25:55.172 UTC [common.deliver] deliverBlocks -> WARN 018 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55750 because of consenter error" +"2019-04-22 06:25:55.174 UTC [comm.grpc.server] 1 -> INFO 019 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55750 grpc.code=OK grpc.call_duration=193.4332ms +"2019-04-22 06:25:55.319 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 01a [channel: businesschannel] Setting up the producer for this channel..." +"2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] startThread -> INFO 01b [channel: businesschannel] Producer set up successfully" +"2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 01c [channel: businesschannel] About to post the CONNECT message..." +"2019-04-22 06:25:55.400 UTC [common.deliver] deliverBlocks -> WARN 01d [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55758 because of consenter error" +"2019-04-22 06:25:55.403 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55758 grpc.code=OK grpc.call_duration=203.4762ms +"2019-04-22 06:25:55.628 UTC [common.deliver] deliverBlocks -> WARN 01f [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55764 because of consenter error" +"2019-04-22 06:25:55.628 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55764 grpc.code=OK grpc.call_duration=202.677ms +"2019-04-22 06:25:55.853 UTC [common.deliver] deliverBlocks -> WARN 021 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55766 because of consenter error" +"2019-04-22 06:25:55.853 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55766 grpc.code=OK grpc.call_duration=201.2625ms +"2019-04-22 06:25:56.080 UTC [common.deliver] deliverBlocks -> WARN 023 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55770 because of consenter error" +"2019-04-22 06:25:56.080 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55770 grpc.code=OK grpc.call_duration=200.733ms +"2019-04-22 06:25:56.130 UTC [orderer.consensus.kafka] startThread -> INFO 025 [channel: businesschannel] CONNECT message posted successfully" +"2019-04-22 06:25:56.131 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 026 [channel: businesschannel] Setting up the parent consumer for this channel..." +"2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] startThread -> INFO 027 [channel: businesschannel] Parent consumer set up successfully" +"2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 028 [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +"2019-04-22 06:25:56.152 UTC [orderer.consensus.kafka] startThread -> INFO 029 [channel: businesschannel] Channel consumer set up successfully" +"2019-04-22 06:25:56.165 UTC [orderer.consensus.kafka] startThread -> INFO 02a [channel: businesschannel] Start phase completed successfully" +"2019-04-22 06:25:56.324 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.5:55780: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:25:56.325 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=231.0232ms +"2019-04-22 06:26:01.418 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.5:55814: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:01.420 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55814 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=128.1389ms +"2019-04-22 06:26:01.420 UTC [orderer.common.broadcast] Handle -> WARN 02f Error reading from 192.168.224.5:55816: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:01.421 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55816 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2691ms +"2019-04-22 06:26:03.724 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.5:55822: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:03.725 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55822 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5035ms +"2019-04-22 06:26:03.726 UTC [orderer.common.broadcast] Handle -> WARN 033 Error reading from 192.168.224.5:55824: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:03.727 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55824 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.929ms +"2019-04-22 06:26:14.324 UTC [orderer.common.broadcast] Handle -> WARN 035 Error reading from 192.168.224.5:55888: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:14.324 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1871471s +"2019-04-22 06:26:17.075 UTC [orderer.common.broadcast] Handle -> WARN 037 Error reading from 192.168.224.5:55900: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:17.075 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1768334s +"2019-04-22 06:26:20.996 UTC [orderer.common.broadcast] Handle -> WARN 039 Error reading from 192.168.224.5:55922: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:20.997 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55922 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2159801s +"2019-04-22 06:27:05.498 UTC [orderer.common.broadcast] Handle -> WARN 03b Error reading from 192.168.224.5:55936: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:05.504 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55936 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.1933324s +"2019-04-22 06:27:10.989 UTC [orderer.common.broadcast] Handle -> WARN 03d Error reading from 192.168.224.5:55948: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:10.989 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9912ms +"2019-04-22 06:27:13.668 UTC [orderer.common.broadcast] Handle -> WARN 03f Error reading from 192.168.224.5:55962: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:13.669 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.9001ms +"2019-04-22 06:27:18.593 UTC [common.deliver] Handle -> WARN 041 Error reading from 192.168.224.5:55992: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:18.593 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8334ms +"2019-04-22 06:27:18.990 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.5:55994: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:18.990 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.54ms +"2019-04-22 06:27:19.199 UTC [common.deliver] Handle -> WARN 045 Error reading from 192.168.224.5:55996: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.199 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8085ms +"2019-04-22 06:27:19.548 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.5:55998: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.548 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2487ms +"2019-04-22 06:27:19.958 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.5:56000: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.960 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.0664ms +"2019-04-22 06:27:20.201 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.5:56002: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.201 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3511ms +"2019-04-22 06:27:20.417 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.5:56004: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.417 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9123ms +"2019-04-22 06:27:20.707 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.5:56006: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.707 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.579ms +"2019-04-22 06:27:21.216 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.5:56008: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.217 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1645ms +"2019-04-22 06:27:21.496 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.5:56010: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.496 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6158ms +"2019-04-22 06:27:21.722 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.5:56012: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.723 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3642ms +"2019-04-22 06:27:22.187 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.5:56014: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6495ms +"2019-04-22 06:27:22.663 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.5:56016: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.663 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8107ms +"2019-04-22 06:27:22.994 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.5:56018: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.994 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2059ms +"2019-04-22 06:27:23.368 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.5:56020: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:23.368 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7461ms +"2019-04-22 06:27:37.382 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.383 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.431 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.440 UTC [cauthdsl] deduplicate -> WARN 062 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.460 UTC [orderer.common.broadcast] Handle -> WARN 063 Error reading from 192.168.224.5:56024: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:37.461 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:56024 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.6848ms +"2019-04-22 06:27:37.466 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.5:56022: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:37.467 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=110.595ms +"2019-04-22 06:27:39.802 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.5:56050: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:39.802 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56050 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9753ms +"2019-04-22 06:27:40.300 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.5:56052: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:40.300 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56052 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.017ms +"2019-04-22 06:27:41.503 UTC [common.deliver] Handle -> WARN 06b Error reading from 192.168.224.5:56054: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:41.504 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56054 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8646ms +"2019-04-22 06:27:41.881 UTC [common.deliver] Handle -> WARN 06d Error reading from 192.168.224.5:56056: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:41.882 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56056 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.3519ms +"2019-04-22 06:27:42.195 UTC [common.deliver] Handle -> WARN 06f Error reading from 192.168.224.5:56058: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.195 UTC [comm.grpc.server] 1 -> INFO 070 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56058 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9844ms +"2019-04-22 06:27:42.588 UTC [common.deliver] Handle -> WARN 071 Error reading from 192.168.224.5:56060: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.590 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56060 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8188ms +"2019-04-22 06:27:42.986 UTC [common.deliver] Handle -> WARN 073 Error reading from 192.168.224.5:56062: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.993 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1588ms +"2019-04-22 06:27:43.407 UTC [common.deliver] Handle -> WARN 075 Error reading from 192.168.224.5:56064: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:43.407 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6195ms +"2019-04-22 06:27:43.909 UTC [common.deliver] Handle -> WARN 077 Error reading from 192.168.224.5:56066: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:43.911 UTC [comm.grpc.server] 1 -> INFO 078 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.3998ms +"2019-04-22 06:27:45.369 UTC [common.deliver] Handle -> WARN 079 Error reading from 192.168.224.5:56068: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:45.369 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.3442ms +"2019-04-22 06:27:45.764 UTC [common.deliver] Handle -> WARN 07b Error reading from 192.168.224.5:56070: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:45.766 UTC [comm.grpc.server] 1 -> INFO 07c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.2845ms +"2019-04-22 06:27:46.147 UTC [common.deliver] Handle -> WARN 07d Error reading from 192.168.224.5:56072: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.147 UTC [comm.grpc.server] 1 -> INFO 07e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.7551ms +"2019-04-22 06:27:46.449 UTC [common.deliver] Handle -> WARN 07f Error reading from 192.168.224.5:56074: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.450 UTC [comm.grpc.server] 1 -> INFO 080 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5173ms +"2019-04-22 06:27:46.799 UTC [common.deliver] Handle -> WARN 081 Error reading from 192.168.224.5:56076: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.799 UTC [comm.grpc.server] 1 -> INFO 082 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8702ms +"2019-04-22 06:27:47.370 UTC [common.deliver] Handle -> WARN 083 Error reading from 192.168.224.5:56078: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:47.371 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9332ms +"2019-04-22 06:27:48.953 UTC [common.deliver] Handle -> WARN 085 Error reading from 192.168.224.5:56080: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:48.954 UTC [comm.grpc.server] 1 -> INFO 086 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1715ms +"2019-04-22 06:27:49.454 UTC [common.deliver] Handle -> WARN 087 Error reading from 192.168.224.5:56082: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:49.455 UTC [comm.grpc.server] 1 -> INFO 088 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9958ms +"2019-04-22 06:27:49.987 UTC [common.deliver] Handle -> WARN 089 Error reading from 192.168.224.5:56084: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:49.987 UTC [comm.grpc.server] 1 -> INFO 08a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.5545ms diff --git a/hyperledger_fabric/v1.4.2/kafka/logs/dev_peer0.log b/hyperledger_fabric/v1.4.2/kafka/logs/dev_peer0.log new file mode 100644 index 00000000..d50544f3 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/kafka/logs/dev_peer0.log @@ -0,0 +1,220 @@ +"2019-04-22 06:25:24.138 UTC [nodeCmd] serve -> INFO 001 Starting peer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64 + Chaincode: + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.15:7051" +"2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +"2019-04-22 06:25:24.158 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +"2019-04-22 06:25:24.158 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +"2019-04-22 06:25:24.417 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +"2019-04-22 06:25:24.511 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +"2019-04-22 06:25:24.512 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +"2019-04-22 06:25:24.531 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +"2019-04-22 06:25:24.543 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-04-22 06:25:24.544 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-04-22 06:25:24.561 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-04-22 06:25:24.576 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-04-22 06:25:24.597 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-04-22 06:25:24.602 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-04-22 06:25:24.603 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +"2019-04-22 06:25:24.604 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:25:24.612 UTC [cscc] Init -> INFO 014 Init CSCC" +"2019-04-22 06:25:24.613 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:25:24.615 UTC [qscc] Init -> INFO 016 Init QSCC" +"2019-04-22 06:25:24.615 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:25:24.617 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:25:24.617 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +"2019-04-22 06:25:24.628 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-04-22 06:25:24.628 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +"2019-04-22 06:25:24.628 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:25:24.629 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:25:25.153 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.153Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.3µs +"2019-04-22 06:25:25.175 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:25:35.155Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9729ms +"2019-04-22 06:25:25.195 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.194Z grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.7µs +"2019-04-22 06:25:57.209 UTC [endorser] callChaincode -> INFO 021 [][24f3659e] Entry chaincode: name:"cscc" " +"2019-04-22 06:25:57.222 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +"2019-04-22 06:25:57.229 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +"2019-04-22 06:25:57.250 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=2ms block_commit=7ms state_commit=4ms)" +"2019-04-22 06:25:57.256 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-04-22 06:25:57.312 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-04-22 06:25:57.315 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:25:57.321 UTC [cscc] Init -> INFO 02b Init CSCC" +"2019-04-22 06:25:57.322 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:25:57.322 UTC [qscc] Init -> INFO 02d Init QSCC" +"2019-04-22 06:25:57.323 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:25:57.324 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:25:57.326 UTC [endorser] callChaincode -> INFO 030 [][24f3659e] Exit chaincode: name:"cscc" (116ms)" +"2019-04-22 06:25:57.326 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45222 grpc.code=OK grpc.call_duration=125.6186ms +"2019-04-22 06:25:59.068 UTC [endorser] callChaincode -> INFO 032 [][1237c501] Entry chaincode: name:"cscc" " +"2019-04-22 06:25:59.071 UTC [endorser] callChaincode -> INFO 033 [][1237c501] Exit chaincode: name:"cscc" (3ms)" +"2019-04-22 06:25:59.071 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45230 grpc.code=OK grpc.call_duration=4.0206ms +"2019-04-22 06:26:00.131 UTC [endorser] callChaincode -> INFO 035 [][3a9cff56] Entry chaincode: name:"qscc" " +"2019-04-22 06:26:00.133 UTC [endorser] callChaincode -> INFO 036 [][3a9cff56] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:26:00.134 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45238 grpc.code=OK grpc.call_duration=3.7135ms +"2019-04-22 06:26:02.277 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-04-22 06:26:03.317 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-04-22 06:26:03.317 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +"2019-04-22 06:26:03.350 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:26:03.397 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" +"2019-04-22 06:26:03.403 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.402Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=322.4µs +"2019-04-22 06:26:03.426 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=38.2627128s +"2019-04-22 06:26:03.427 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.405Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.3911ms +"2019-04-22 06:26:03.465 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 65ms (state_validation=2ms block_commit=30ms state_commit=3ms)" +"2019-04-22 06:26:03.784 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +"2019-04-22 06:26:03.831 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 049 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:26:03.935 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 150ms" +"2019-04-22 06:26:03.949 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.948Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.411ms +"2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.96Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4653ms +"2019-04-22 06:26:03.993 UTC [kvledger] CommitWithPvtData -> INFO 04d [businesschannel] Committed block [2] with 1 transaction(s) in 48ms (state_validation=13ms block_commit=28ms state_commit=4ms)" +"2019-04-22 06:26:04.087 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.085Z grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=332.5µs +"2019-04-22 06:26:04.256 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.255Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.7µs +"2019-04-22 06:26:04.270 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.26Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.8223ms +"2019-04-22 06:26:04.346 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.345Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=171.6µs +"2019-04-22 06:26:04.362 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.349Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0755ms +"2019-04-22 06:26:04.368 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.367Z grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.8µs +"2019-04-22 06:26:04.533 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.532Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.1µs +"2019-04-22 06:26:04.548 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.537Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2102ms +"2019-04-22 06:26:04.580 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.579Z grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301µs +"2019-04-22 06:26:04.625 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.622Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.2801ms +"2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=48.3559ms +"2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 059 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.628Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0459ms +"2019-04-22 06:26:07.280 UTC [gossip.channel] reportMembershipChanges -> INFO 05a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +"2019-04-22 06:26:08.476 UTC [endorser] callChaincode -> INFO 05b [][63dcaca1] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:08.494 UTC [endorser] callChaincode -> INFO 05c [][63dcaca1] Exit chaincode: name:"_lifecycle" (17ms)" +"2019-04-22 06:26:08.494 UTC [comm.grpc.server] 1 -> INFO 05d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45296 grpc.code=OK grpc.call_duration=18.9812ms +"2019-04-22 06:26:11.772 UTC [endorser] callChaincode -> INFO 05e [][81961895] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:11.773 UTC [endorser] callChaincode -> INFO 05f [][81961895] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:26:11.774 UTC [comm.grpc.server] 1 -> INFO 060 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45312 grpc.code=OK grpc.call_duration=2.3561ms +"2019-04-22 06:26:12.084 UTC [endorser] callChaincode -> INFO 061 [][56bfd17c] Entry chaincode: name:"cscc" " +"2019-04-22 06:26:12.086 UTC [endorser] callChaincode -> INFO 062 [][56bfd17c] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:26:12.086 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=3.3137ms +"2019-04-22 06:26:12.139 UTC [endorser] callChaincode -> INFO 064 [businesschannel][b65b3fc8] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:12.150 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 065 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:12.151 UTC [endorser] callChaincode -> INFO 066 [businesschannel][b65b3fc8] Exit chaincode: name:"_lifecycle" (12ms)" +"2019-04-22 06:26:12.158 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=20.4184ms +"2019-04-22 06:26:14.289 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [3] from buffer" +"2019-04-22 06:26:14.296 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [3] in 6ms" +"2019-04-22 06:26:14.299 UTC [confighistory] HandleStateUpdates -> ERRO 06a Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0031ecf80)}" +"2019-04-22 06:26:14.318 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [3] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=12ms state_commit=4ms)" +"2019-04-22 06:26:14.327 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:42.164Z grpc.peer_address=192.168.224.5:45318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1567108s +"2019-04-22 06:26:17.004 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [4] from buffer" +"2019-04-22 06:26:17.008 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [4] in 3ms" +"2019-04-22 06:26:17.010 UTC [confighistory] HandleStateUpdates -> ERRO 06f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033a3680)}" +"2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=1ms block_commit=35ms state_commit=3ms)" +"2019-04-22 06:26:17.662 UTC [endorser] callChaincode -> INFO 071 [businesschannel][595fbc5e] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:17.669 UTC [lifecycle] QueryApprovalStatus -> INFO 072 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:17.670 UTC [endorser] callChaincode -> INFO 073 [businesschannel][595fbc5e] Exit chaincode: name:"_lifecycle" (8ms)" +"2019-04-22 06:26:17.671 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45334 grpc.code=OK grpc.call_duration=10.1874ms +"2019-04-22 06:26:18.472 UTC [endorser] callChaincode -> INFO 075 [][e312980e] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:18.473 UTC [endorser] callChaincode -> INFO 076 [][e312980e] Exit chaincode: name:"_lifecycle" (0ms)" +"2019-04-22 06:26:18.473 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45342 grpc.code=OK grpc.call_duration=1.4673ms +"2019-04-22 06:26:18.780 UTC [endorser] callChaincode -> INFO 078 [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:18.785 UTC [lifecycle] QueryApprovalStatus -> INFO 079 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:18.787 UTC [lifecycle] CommitChaincodeDefinition -> INFO 07a successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:18.787 UTC [endorser] callChaincode -> INFO 07b [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (7ms)" +"2019-04-22 06:26:18.789 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45346 grpc.code=OK grpc.call_duration=9.7835ms +"2019-04-22 06:26:20.935 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [5] from buffer" +"2019-04-22 06:26:20.938 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [5] in 2ms" +"2019-04-22 06:26:20.940 UTC [lifecycle] update -> INFO 07f Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:20.946 UTC [lifecycle] update -> INFO 080 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleStateUpdates -> INFO 081 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-04-22 06:26:20.948 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 082 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 083 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-04-22 06:26:20.987 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [5] with 1 transaction(s) in 47ms (state_validation=14ms block_commit=27ms state_commit=2ms)" +"2019-04-22 06:26:21.016 UTC [comm.grpc.server] 1 -> INFO 085 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.805Z grpc.peer_address=192.168.224.5:45348 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.2097239s +"2019-04-22 06:26:21.521 UTC [endorser] callChaincode -> INFO 086 [businesschannel][07ad19bd] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:21.526 UTC [lifecycle] QueryChaincodeDefinition -> INFO 087 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-04-22 06:26:21.526 UTC [endorser] callChaincode -> INFO 088 [businesschannel][07ad19bd] Exit chaincode: name:"_lifecycle" (5ms)" +"2019-04-22 06:26:21.528 UTC [comm.grpc.server] 1 -> INFO 089 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45356 grpc.code=OK grpc.call_duration=7.688ms +"2019-04-22 06:26:22.382 UTC [endorser] callChaincode -> INFO 08a [businesschannel][d9f76fa2] Entry chaincode: name:"exp02" " +"2019-04-22 06:26:22.419 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 08b building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-04-22 06:27:05.360 UTC [endorser] callChaincode -> INFO 08c [businesschannel][d9f76fa2] Exit chaincode: name:"exp02" (43046ms)" +"2019-04-22 06:27:05.361 UTC [comm.grpc.server] 1 -> INFO 08d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45364 grpc.code=OK grpc.call_duration=43.0490753s +"2019-04-22 06:27:07.533 UTC [gossip.privdata] StoreBlock -> INFO 08e [businesschannel] Received block [6] from buffer" +"2019-04-22 06:27:07.537 UTC [committer.txvalidator] Validate -> INFO 08f [businesschannel] Validated block [6] in 2ms" +"2019-04-22 06:27:07.564 UTC [kvledger] CommitWithPvtData -> INFO 090 [businesschannel] Committed block [6] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=20ms state_commit=2ms)" +"2019-04-22 06:27:10.719 UTC [endorser] callChaincode -> INFO 091 [businesschannel][a260bae9] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:10.721 UTC [endorser] callChaincode -> INFO 092 [businesschannel][a260bae9] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:27:10.722 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45372 grpc.code=OK grpc.call_duration=4.8236ms +"2019-04-22 06:27:10.957 UTC [endorser] callChaincode -> INFO 094 [businesschannel][afb6f91a] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:10.962 UTC [endorser] callChaincode -> INFO 095 [businesschannel][afb6f91a] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:27:10.963 UTC [comm.grpc.server] 1 -> INFO 096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45376 grpc.code=OK grpc.call_duration=8.1959ms +"2019-04-22 06:27:11.170 UTC [endorser] callChaincode -> INFO 097 [businesschannel][9da077e1] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:11.175 UTC [endorser] callChaincode -> INFO 098 [businesschannel][9da077e1] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:27:11.176 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45382 grpc.code=OK grpc.call_duration=8.7397ms +"2019-04-22 06:27:13.047 UTC [gossip.privdata] StoreBlock -> INFO 09a [businesschannel] Received block [7] from buffer" +"2019-04-22 06:27:13.053 UTC [committer.txvalidator] Validate -> INFO 09b [businesschannel] Validated block [7] in 4ms" +"2019-04-22 06:27:13.078 UTC [kvledger] CommitWithPvtData -> INFO 09c [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=3ms block_commit=11ms state_commit=2ms)" +"2019-04-22 06:27:13.407 UTC [endorser] callChaincode -> INFO 09d [businesschannel][b83d2cc6] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.410 UTC [endorser] callChaincode -> INFO 09e [businesschannel][b83d2cc6] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:27:13.411 UTC [comm.grpc.server] 1 -> INFO 09f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45386 grpc.code=OK grpc.call_duration=6.1882ms +"2019-04-22 06:27:13.630 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][6929c7e0] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.638 UTC [endorser] callChaincode -> INFO 0a1 [businesschannel][6929c7e0] Exit chaincode: name:"exp02" (8ms)" +"2019-04-22 06:27:13.639 UTC [comm.grpc.server] 1 -> INFO 0a2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45390 grpc.code=OK grpc.call_duration=10.2984ms +"2019-04-22 06:27:13.897 UTC [endorser] callChaincode -> INFO 0a3 [businesschannel][2f5fecb5] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.901 UTC [endorser] callChaincode -> INFO 0a4 [businesschannel][2f5fecb5] Exit chaincode: name:"exp02" (4ms)" +"2019-04-22 06:27:13.902 UTC [comm.grpc.server] 1 -> INFO 0a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45396 grpc.code=OK grpc.call_duration=6.7979ms +"2019-04-22 06:27:15.699 UTC [gossip.privdata] StoreBlock -> INFO 0a6 [businesschannel] Received block [8] from buffer" +"2019-04-22 06:27:15.702 UTC [committer.txvalidator] Validate -> INFO 0a7 [businesschannel] Validated block [8] in 2ms" +"2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 0a8 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=16ms state_commit=2ms)" +"2019-04-22 06:27:16.087 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][b014ef00] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:16.092 UTC [endorser] callChaincode -> INFO 0aa [businesschannel][b014ef00] Exit chaincode: name:"exp02" (5ms)" +"2019-04-22 06:27:16.093 UTC [comm.grpc.server] 1 -> INFO 0ab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45400 grpc.code=OK grpc.call_duration=10.5268ms +"2019-04-22 06:27:16.696 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][6fc4f9e4] Entry chaincode: name:"qscc" " +"2019-04-22 06:27:16.703 UTC [endorser] callChaincode -> INFO 0ad [businesschannel][6fc4f9e4] Exit chaincode: name:"qscc" (7ms)" +"2019-04-22 06:27:16.708 UTC [comm.grpc.server] 1 -> INFO 0ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45404 grpc.code=OK grpc.call_duration=12.6755ms +"2019-04-22 06:27:16.926 UTC [endorser] callChaincode -> INFO 0af [businesschannel][35a24a5f] Entry chaincode: name:"qscc" " +"2019-04-22 06:27:16.929 UTC [endorser] callChaincode -> INFO 0b0 [businesschannel][35a24a5f] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:27:16.930 UTC [comm.grpc.server] 1 -> INFO 0b1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45408 grpc.code=OK grpc.call_duration=4.6791ms +"2019-04-22 06:27:17.500 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][3bc38859] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.502 UTC [endorser] callChaincode -> INFO 0b3 [businesschannel][3bc38859] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:27:17.504 UTC [comm.grpc.server] 1 -> INFO 0b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45412 grpc.code=OK grpc.call_duration=4.6602ms +"2019-04-22 06:27:17.700 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][5f602553] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.705 UTC [endorser] callChaincode -> INFO 0b6 [businesschannel][5f602553] Exit chaincode: name:"cscc" (4ms)" +"2019-04-22 06:27:17.706 UTC [comm.grpc.server] 1 -> INFO 0b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45416 grpc.code=OK grpc.call_duration=6.5725ms +"2019-04-22 06:27:17.974 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][a8300ed2] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.977 UTC [endorser] callChaincode -> INFO 0b9 [businesschannel][a8300ed2] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:27:17.978 UTC [comm.grpc.server] 1 -> INFO 0ba unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45420 grpc.code=OK grpc.call_duration=3.8956ms +"2019-04-22 06:27:37.502 UTC [gossip.privdata] StoreBlock -> INFO 0bb [businesschannel] Received block [9] from buffer" +"2019-04-22 06:27:37.505 UTC [cauthdsl] deduplicate -> WARN 0bc De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.506 UTC [cauthdsl] deduplicate -> WARN 0bd De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.578 UTC [gossip.gossip] JoinChan -> INFO 0be Joining gossip network of channel businesschannel with 3 organizations" +"2019-04-22 06:27:37.580 UTC [gossip.gossip] learnAnchorPeers -> INFO 0bf Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:27:37.605 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c0 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c1 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c2 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:27:37.623 UTC [committer.txvalidator] Validate -> INFO 0c3 [businesschannel] Validated block [9] in 120ms" +"2019-04-22 06:27:37.632 UTC [comm.grpc.server] 1 -> INFO 0c4 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.63Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=296.4µs +"2019-04-22 06:27:37.646 UTC [comm.grpc.server] 1 -> INFO 0c5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.3708033s +"2019-04-22 06:27:37.703 UTC [kvledger] CommitWithPvtData -> INFO 0c6 [businesschannel] Committed block [9] with 1 transaction(s) in 79ms (state_validation=1ms block_commit=51ms state_commit=15ms)" +"2019-04-22 06:27:37.707 UTC [comm.grpc.server] 1 -> INFO 0c7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.705Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +"2019-04-22 06:27:37.708 UTC [comm.grpc.server] 1 -> INFO 0c8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.704Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.9µs +"2019-04-22 06:27:37.720 UTC [comm.grpc.server] 1 -> INFO 0c9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.7270124s +"2019-04-22 06:27:37.724 UTC [comm.grpc.server] 1 -> INFO 0ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.711Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2621ms +"2019-04-22 06:27:37.729 UTC [comm.grpc.server] 1 -> INFO 0cb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.661Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=67.2458ms +"2019-04-22 06:27:37.759 UTC [comm.grpc.server] 1 -> INFO 0cc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.72Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7322ms +"2019-04-22 06:27:37.774 UTC [comm.grpc.server] 1 -> INFO 0cd unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.774Z grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.2µs +"2019-04-22 06:27:37.806 UTC [comm.grpc.server] 1 -> INFO 0ce streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=22.1067ms +"2019-04-22 06:28:07.906 UTC [endorser] callChaincode -> INFO 0cf [][93c2e1e6] Entry chaincode: name:"cscc" " +"2019-04-22 06:28:07.907 UTC [endorser] callChaincode -> INFO 0d0 [][93c2e1e6] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:28:07.908 UTC [comm.grpc.server] 1 -> INFO 0d1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45518 grpc.code=OK grpc.call_duration=2.1597ms +"2019-04-22 06:28:09.826 UTC [endorser] callChaincode -> INFO 0d2 [][97392766] Entry chaincode: name:"qscc" " +"2019-04-22 06:28:09.832 UTC [endorser] callChaincode -> INFO 0d3 [][97392766] Exit chaincode: name:"qscc" (6ms)" +"2019-04-22 06:28:09.834 UTC [comm.grpc.server] 1 -> INFO 0d4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45526 grpc.code=OK grpc.call_duration=9.3072ms diff --git a/hyperledger_fabric/v1.4.2/network_config.json b/hyperledger_fabric/v1.4.2/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/network_generator/__init__.py b/hyperledger_fabric/v1.4.2/network_generator/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/hyperledger_fabric/v1.4.2/network_generator/config_manager.py b/hyperledger_fabric/v1.4.2/network_generator/config_manager.py new file mode 100644 index 00000000..5bf3fef2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/config_manager.py @@ -0,0 +1,6 @@ + + +class ConfigManager(object): + + def __init__(self, peer_base, orderer_base): + return \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/network_generator/network.py b/hyperledger_fabric/v1.4.2/network_generator/network.py new file mode 100644 index 00000000..2bff61c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/network.py @@ -0,0 +1,13 @@ + + +class Network(object): + """ + Network consists of several nodes: + * orderer nodes in a orderer org + * peer nodes in app orgs + * ca nodes + * client nodes + """ + + def __init__(self): + pass \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/network_generator/network_generator.py b/hyperledger_fabric/v1.4.2/network_generator/network_generator.py new file mode 100644 index 00000000..f2416b2a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/network_generator.py @@ -0,0 +1,242 @@ +#!/usr/bin/env python +# Generate Hyperledger Fabric Network docker-compose.yaml files +# base on input parameters +# github.com/yeasy/docker-compose + +# tested with version 0.15.3 +from ruamel.yaml import YAML +import argparse +import copy +import collections + +DOCKER_COMPOSER_VERSION='2.0' +DEFAULT_CONFIG_FILE = 'network_config.json' +PEER_TEMPLATE_FILE = 'peer.yaml' +ORDERER_TEMPLATE_FILE = 'orderer.yaml' +RESULT_FILE = '{}orgs-{}peers-{}.yaml' + +# Orderer +# consensus_mode, org_name, node_name +ORDERER_GB_VOLUME = './{}/channel-artifacts/orderer.genesis.block' +ORDERER_GB_PATH = '/var/hyperledger/orderer/orderer.genesis.block' +ORDERER_MSP_VOLUME = './{}/crypto-config/ordererOrganizations/{}/orderers/{}/msp' +ORDERER_TLS_VOLUME = './{}/crypto-config/ordererOrganizations/{}/orderers/{}/tls' +ORDERER_MSP_PATH = '/var/hyperledger/orderer/msp' +ORDERER_TLS_PATH = '/var/hyperledger/orderer/tls' + +# PEER +# consensus_mode, org_name, node_name +PEER_MSP_VOLUME = './{}/crypto-config/peerOrganizations/{}/peers/{}/msp' +PEER_TLS_VOLUME = './{}/crypto-config/peerOrganizations/{}/peers/{}/tls' +PEER_MSP_PATH = '/etc/hyperledger/fabric/msp' +PEER_TLS_PATH = '/etc/hyperledger/fabric/tls' + + +yaml = YAML() +yaml.explicit_start = True + + +def list_to_dict(l, sep=':'): + """ + Convert list to dict with order + :param l: list + :param sep: separator + :return: dicted result + + >>> list_to_dict(['a=1','b=2'], '=') + OrderedDict([('a', '1'), ('b', '2')]) + >>> list_to_dict(['a:1','b:2']) + OrderedDict([('a', '1'), ('b', '2')]) + """ + result = collections.OrderedDict() + for x in l: + k, v = x.split(sep, 2) + result[k] = v + return result + + +def dict_to_list(d, sep=':'): + """ + Convert the given dict to list + :param d: dict + :param sep: separator + :return: + + + >>> dict_to_list({'a': '1', 'b': '2'}) + ['a:1', 'b:2'] + """ + result = list() + for k,v in d.items(): + result.append('{}{}{}'.format(k, sep, v)) + return result + +def parse_args(): + """ + Parse the args + :return: + """ + parser = argparse.ArgumentParser() + parser.add_argument('-f', "--config_file", help="Path to the config file", + type=str, default=DEFAULT_CONFIG_FILE) + args = parser.parse_args() + print(args.config_file) + + +def gen_peer(template, org_name, org_msp, node_name, consensus_mode): + """ + Generate peer for given org and name + :param template: Template to use + :param org_name: Name of org, + :param org_msp: MSP ID of the org, + :param node_name: Name of the peer + :param consensus_mode: Mode of consensus + :return: + """ + node = copy.deepcopy(template) + addr = node_name # e.g., peer0.org1.example.com + node['container_name'] = addr + node['hostname'] = addr + + # update environments part + environment = list_to_dict(node['environment'], '=') + environment['CORE_PEER_ID'] = addr # peer id + environment['CORE_PEER_ADDRESS'] = addr+':7051' # peer grpc port + environment['CORE_PEER_CHAINCODELISTENADDRESS'] = addr+':7052' # chaincode + environment['CORE_PEER_GOSSIP_EXTERNALENDPOINT'] = addr+':7051' # gossip + environment['CORE_PEER_LOCALMSPID'] = org_msp # org msp name + node['environment'] = dict_to_list(environment, '=') + + # replace volumes part + volumes = { + PEER_MSP_VOLUME.format(consensus_mode, org_name, node_name): + PEER_MSP_PATH, + PEER_TLS_VOLUME.format(consensus_mode, org_name, node_name): + PEER_TLS_PATH, + } + node['volumes'] = dict_to_list(volumes, ':') + + return node + + +def gen_peers(org_name='org1.example.com', org_msp='Org1MSP', num=2, + consensus_mode='solo'): + """ + Generate given num peers for Organization org_msp + :param org_name: Name of the org, + :param org_msp: MSP of the organization that peer belongs to + :param num: Number of peer nodes to generate + :param consensus_mode: Mode of consensus + :return: + """ + c = yaml.load(open(PEER_TEMPLATE_FILE, 'r')) + peer = c['services']['peer'] + result_peers = dict() + for i in range(num): + name = 'peer{}.{}'.format(i, org_name) # peer0.org1.example.com + result_peers[name] = gen_peer(peer, org_name, org_msp, name, + consensus_mode) + return result_peers + + +def gen_app_orgs(orgs=2, peers=2, consensus_mode='solo'): + """ + Generate peer orgs with given number + :param orgs: Number of app orgs to generate + :param peers: Peers number for each org + :param consensus_mode: Mode of consensus + :return: + """ + services = dict() + for i in range(orgs): + org_name = 'org{}.example.com'.format(i+1) # match crypto-config.yaml + org_msp = 'Org{}MSP'.format(i+1) + services.update(gen_peers(org_name, org_msp, peers, consensus_mode)) + return services + + +def gen_orderer(template, org_name, node_name, consensus_mode): + """ + Generate peer for given org and name + :param template: Template to use + :param org_name: Name of org, + :param org_msp: MSP ID of the org, + :param node_name: Name of the node + :param consensus_mode: Mode of consensus + :return: + """ + node = copy.deepcopy(template) + addr = node_name # e.g., orderer0.orderer.example.com + node['container_name'] = addr + node['hostname'] = addr + + # replace volumes part + volumes = { + ORDERER_GB_VOLUME.format(consensus_mode): ORDERER_GB_PATH, + ORDERER_MSP_VOLUME.format(consensus_mode, org_name, node_name): + ORDERER_MSP_PATH, + ORDERER_TLS_VOLUME.format(consensus_mode, org_name, node_name): + ORDERER_TLS_PATH, + } + node['volumes'] = dict_to_list(volumes, ':') + + return node + + +def gen_orderers(org_name='orderer.example.com', num=2, consensus_mode='solo'): + """ + Generate given num peers for Organization org_msp + :param org_name: Name of the org, + :param num: Number of peer nodes to generate + :param consensus_mode: Mode of consensus + :return: + """ + try: + c = yaml.load(open(ORDERER_TEMPLATE_FILE, 'r')) + orderer = c['services']['orderer-{}'.format(consensus_mode)] + result_nodes = dict() + for i in range(num): + name = 'orderer.example.com' + #name = 'orderer{}.{}'.format(i, org_name) + result_nodes[name] = gen_orderer(orderer, org_name, name, + consensus_mode) + return result_nodes + except Exception as e: + print("Failed to gen_orderers with {}:{}".format(PEER_TEMPLATE_FILE, e)) + return dict() + + +def gen_orderer_orgs(orderers=1, consensus_mode='solo'): + """ + Generate peer orgs with given number + :param orderers: Orderers number for each org + :param consensus_mode: Mode of consensus + :return: + """ + services = dict() + org_name = 'example.com' # match crypto-config.yaml + services.update(gen_orderers(org_name, orderers, consensus_mode)) + return services + + +if __name__ == '__main__': + import doctest + doctest.testmod() + + parse_args() + + # network topology config + app_org_num = 2 + app_org_size = 2 + orderer_org_size = 1 + consensus_mode = 'solo' + + network = dict([('version','2.0'), ('services', dict())]) + network['services'].update(gen_orderer_orgs(orderer_org_size, + consensus_mode)) + network['services'].update(gen_app_orgs(app_org_num, app_org_size, + consensus_mode)) + + with open(RESULT_FILE.format(app_org_num, app_org_num*app_org_size, + 'solo'), 'w') as f: + yaml.dump(network, f) diff --git a/hyperledger_fabric/v1.4.2/network_generator/node.py b/hyperledger_fabric/v1.4.2/network_generator/node.py new file mode 100644 index 00000000..e4898448 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/node.py @@ -0,0 +1,15 @@ + + +class Node(object): + """ + Node is a base class, representing a peer/orderer/ca in the network + """ + + def __init__(self, org, name): + """ + + :param org: which org it belongs to + :param name: name of the node + """ + self.org = org + self.name = name diff --git a/hyperledger_fabric/v1.4.2/network_generator/orderer.py b/hyperledger_fabric/v1.4.2/network_generator/orderer.py new file mode 100644 index 00000000..f3637fc2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/orderer.py @@ -0,0 +1,9 @@ + + +class Orderer(object): + """ + An orderer node + """ + + def __init__(self, org_name, node_name): + pass \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/network_generator/requirements.txt b/hyperledger_fabric/v1.4.2/network_generator/requirements.txt new file mode 100644 index 00000000..9d42d870 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/network_generator/requirements.txt @@ -0,0 +1,6 @@ +# Copyright, All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +ruamel.yaml>=0.15.0,<=0.16.0 diff --git a/hyperledger_fabric/v1.4.2/orderer.yaml b/hyperledger_fabric/v1.4.2/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.2/org3/configtx.yaml b/hyperledger_fabric/v1.4.2/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.2/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk new file mode 100644 index 00000000..fe3c013e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/af34831458e9c46e1755ec160581a3a765b2b8f7f1924fe3c0eb683828e723c7_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglQvjrXdvWmS/WH7C +x5vN9HwsEDXy74nu72xImmwXBU6hRANCAAQPD4LkTiXEvaKEOOF77gxRpH45HTxo +rWIvMwJI4ZTyOIejP1kvaRd3lsFr6Fy0gehoE8z0hmzpfcZPcxC959It +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk new file mode 100644 index 00000000..aa913b98 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/a5b49acc26a61490d5cef5201c84d36579715dde229e6fbf4ee0a6427001e943_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghKhyCJtjNyxJUJ65 +rIZILsF2Ou5gmFWTROFTsLJPuUKhRANCAATsldLu2novx6PNHKg/kyEn27r/YqZq +tDnWntlNIs1pZPHAE/efAAzE1FRaptxsZQ9qVZh5g0erLXe+1Sz1mO00 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..aca66301 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQOTUD9xy42ZLTQ4hhADTJDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7JXS7tp6L8ej +zRyoP5MhJ9u6/2KmarQ51p7ZTSLNaWTxwBP3nwAMxNRUWqbcbGUPalWYeYNHqy13 +vtUs9ZjtNKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgrzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0E +AwIDRwAwRAIgbgn/Vuu7fJHJKrrJHbSrUkTZAbFfa+EGBcqHcv6jXC8CIAk8HTmT +ccG7gHGCEnH7rhGKyBGy19Qc5hGReLeQVeHk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..43b0f00c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANyo1bHNt4jxnauCiFIeceEwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDqu5UEyrHuw5TS+KjAGJiHAtKb5 +GAjCCKJ3qoDJLTQghKRQQUa4EEc012NT4sRTA6dS+2BgmK7eA4rvacdkMrKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMcvbSLKjMn5X7h898+0FmR4jFau +pL69wixjQtsuVoRGMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0cAMEQCIHFBvDhL+VnABTujMgAOz/S/EXkrbc0U +UkFiVuRedPdLAiBgrDFWZrSynPQQN60IurQCg08nY8DlcUAUamTfVcQKNw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..e3728089 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgOy8GTfiFfxsE7Gtp +PmQ9jXK/vDycqMvbXY11ZxI4bUShRANCAAQ6ruVBMqx7sOU0viowBiYhwLSm+RgI +wgiid6qAyS00IISkUEFGuBBHNNdjU+LEUwOnUvtgYJiu3gOK72nHZDKy +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..66fd1f95 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,8 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk new file mode 100644 index 00000000..0d7e426c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/82174c3c00d3785b889db53ebbeb1389d038299fd76b0535072e1f0dd3f6e57b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg8/NNTDRdHbAD+Z/y +i2VUZNaEW1krHadeQbGh/SmY+TChRANCAAQgjRSFd4+6zQ4Rl3hCbDcBggMRegKs +JeGXc12HGXCf42eDRHPB0JHMEfOULSOd/E7ERj5tgIPIUmcI/9yIb6H1 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..8aa6e098 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAPP10jryVrL+LaN1Qv/7xhYwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCCNFIV3j7rN +DhGXeEJsNwGCAxF6Aqwl4ZdzXYcZcJ/jZ4NEc8HQkcwR85QtI538TsRGPm2Ag8hS +Zwj/3IhvofWjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIK80gxRY6cRuF1XsFgWBo6dlsrj38ZJP48DraDgo5yPHMAoGCCqGSM49 +BAMCA0cAMEQCIHYbMvhJIg26aRsL6ho38VbR+pWFLCc4zuXFQXMSloh6AiBnMCg/ +rA0t1bNI1unNaIxrVAziUi8URBLd3mwGBqZCDg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..06dd8658 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMvGmkb51lBP8nmHdaIVbKwwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJfYYd2JnwkYJUHiA+6zjNjPaq3O +D7602qcyqfap7Fk4z2IqYQ8T5/fhTqH34QRGJaMvUxwOStrlojkOT0hwSb+jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMcvbSLKjMn5X7h898+0FmR4jFau +pL69wixjQtsuVoRGMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDbvju663SpdKOv8R8rOXPCl/VuA0Da +/0qAraDtEL5begIgRHNymLMPxHqAVJHNRG2Hyo/lTWA2wFOD51IaFS0onp8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..1f9f8f9b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghhRrsZfM7T6Wv+2d +HYCNt/cugSubsFunlEnlymKbyAOhRANCAASX2GHdiZ8JGCVB4gPus4zYz2qtzg++ +tNqnMqn2qexZOM9iKmEPE+f34U6h9+EERiWjL1McDkra5aI5Dk9IcEm/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk new file mode 100644 index 00000000..b6989263 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/c72f6d22ca8cc9f95fb87cf7cfb41664788c56aea4bebdc22c6342db2e568446_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg/2sL7eSqetCNHTu6 +Db/Kc9eWu+rt9PK+Adma/ku/WMahRANCAAS+alHUgwsTd+T9CI31zh5LTGV//XRZ +aZ6FuaFz/Mp7zj/pU+rCLTr6n/D7mZP9f9uoyuPgcW8X16eKUMdoGcqB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/admincerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk new file mode 100644 index 00000000..c60b49a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/35843e06aec41fbfc1ffa71b49967d0470486868a975948c69e4ff987024d4b0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbvVp1HvzCFU5QY3c +KNsL0eK1ofPZeC8lciS/Bu9iDlKhRANCAAR9VvswPijrzVN4Vnt8rdK8y7NPgDfA +xy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/kyu8IdQ6AGB7Oe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..ca20fb26 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..0be08e25 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRANIWPozfViRQ6Sg1rZ2wyYAwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABL2acgsOXR+/bEbcFiWDm3gnSVy2 +5+sHpye6d7VqjMELiw8ntjG0cQCH8RHMIW0TEMraF5NJyfkLRfqe8BBJSs2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+ +vcIsY0LbLlaERjAKBggqhkjOPQQDAgNHADBEAiAbNzlJperCFVfCnxxC0JVlzcWu +W709zi5+BX6zceCBuwIgWaG4odkgBign2qbmLqbVstXYSb0y/MqKtgBAMqaJ5dI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..3887df41 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt7wOT4PQw9MtEMo4 +FSxCGl/jR81/sbPGa8sANFZd2mOhRANCAAS9mnILDl0fv2xG3BYlg5t4J0lctufr +B6cnune1aozBC4sPJ7YxtHEAh/ERzCFtExDK2heTScn5C0X6nvAQSUrN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..6fc95319 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/admincerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQf5a1GSSLd33cChy/MwFTcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT5/JiQwbJp +GZbT37mMK02v/XbBz7y4Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7Rj +RYp4NRNNzIQHo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBHZyZqLLiJzWF84UbJ458D7abj13FsVhX6Ip7woKa7EgIgLJ73 +Gaa9RGuVlNfXbE7wyskoSYQI2YzPNQbW8UvncEQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..7e3be4ed --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk new file mode 100644 index 00000000..6bb94909 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/fdeb693649bb6090e250b9ad581da179e8344cdafe94221c11296084c477c24d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtAqu9LuuvEFZV0jl +tfonUzwXQb7LBKS2BbfRcxx7UJ2hRANCAAT5/JiQwbJpGZbT37mMK02v/XbBz7y4 +Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7RjRYp4NRNNzIQH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..6fc95319 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQf5a1GSSLd33cChy/MwFTcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT5/JiQwbJp +GZbT37mMK02v/XbBz7y4Vhs8uuFasnF9yFRendI1CF1zW9QWhiwwYuGq5aHhc7Rj +RYp4NRNNzIQHo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBHZyZqLLiJzWF84UbJ458D7abj13FsVhX6Ip7woKa7EgIgLJ73 +Gaa9RGuVlNfXbE7wyskoSYQI2YzPNQbW8UvncEQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..255d5387 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQQYYC/7zsHbWx4pFFfjjV2zAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEvmpR1IMLE3fk/QiN9c4eS0xlf/10WWmehbmhc/zKe84/6VPqwi06+p/w ++5mT/X/bqMrj4HFvF9enilDHaBnKgaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+vcIsY0LbLlaERjAKBggqhkjOPQQD +AgNHADBEAiA6znopw67tAA8XtI0Mb1WwIWJxhgWn1WI1ZimgBUl5SgIgVHJjblWf +SUelYfdn48X7BrJT8TbZGD3Gr4ngesmv3TE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..b9d7e5c9 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAJ9DLwbAMizHgE5YOsprbl8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABKTkb0RSX8aMU5Aucigyy6kZ16FN +gYpnJAjuSzNEuqjm/8AFnt/eE186tOMstFTmSaW60KhGvnZTefTJUEJenb6jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDHL20iyozJ+V+4fPfPtBZkeIxWrqS+ +vcIsY0LbLlaERjAKBggqhkjOPQQDAgNIADBFAiEAhgZhHqMQgsjBObCzH9u64tDW +ENqXceYVzU707rddrZ8CIAcq38EhaZHJS7k02t3mwu3P5dMj8IIu1B3qIxMDfV3d +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..eb79f68d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgea8S29NZ+VIi2q1I +rBaeU5Ps9SYipKW7BIVsIfWbA6OhRANCAASk5G9EUl/GjFOQLnIoMsupGdehTYGK +ZyQI7kszRLqo5v/ABZ7f3hNfOrTjLLRU5kmlutCoRr52U3n0yVBCXp2+ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.2/peer.yaml b/hyperledger_fabric/v1.4.2/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.2/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.2/prometheus.yml b/hyperledger_fabric/v1.4.2/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.2/raft/README.md b/hyperledger_fabric/v1.4.2/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..52706030 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,164 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 0000000000000000000000000000000000000000..d64a7b3f08ca4dac03773aac76628bca545ad496 GIT binary patch literal 324 zcmd-&$iyYfCC$Mk#l|t`^@*3PO8iNs#hH1j#l^`PiFtXcIYRT9xaKf%VF)J(#c^>v z78K-UCMT9;=I06db1({dbFupur5pMN2M9Sxv2!tl7z|2WTx^ahxtV#zKsG-Yw`*QX zeo=91Zfaf$P=K3@Jt#FXCAA173*>|sWtMv z78K-UCMT9;=I06db1({dbFupur5pJM2M9Sxv2!tl7z|2WTx^ahxtV#zKsG-Yw`*QX zeo=91Zfaf$P=K3@Jt#FXCAA173*>|sWtMH_jAL~2VR0hZCkzG+6-W8-m9^A{`; zZ1@q@@Dc10V#6meb{r>ZRVKT6+;h*lXYO41Wzt33br* zbM(j;13npW?0AdZ0=*Q59&>2S0!~b#!`zGLU~RXtPiC^sdb%;^0V)9(K@_u|PiD;T zI{B(k!awTTssCj7tHIe)Wk---8u_Wg7F-DtBfHY2j5~pg%^+WrRk)U1BjAu2}}4v2HV@ri!nmC>;=v{CF}_lorJK#{GLZ+ zlwNe$K{G;p9lCO_Oz;pcz0VYB#SY^vZA?`=NcLfc znYquY=qhWJZ!)xY#7bkT1U`n9Azw41Tu>*GS?<@XO6YN^&BG~R8$c%gO9&@7svUzbIgmw-We1i*xNG z;uGu6@|d$F*JoUqH^HdTkhYm8`v?VDCI$e^zFBK+wASSi%i=5xvK6^Z=Cw0K#tbqn z%Beb7S({MU8Fp%oyFnx{89Jm$mLy^U^s&P+*qwdCumsS{_p?JcMdqab@zk4JJlcl#os*b;TQhv|Ip8T#QMZ-<|CC4 zeCXk=d%wjq|I3|5zWDwV;Gf~&UxR-?a}qr5)QPQ=r@r>1kAC&Kvp2V=zBM#_U+-zd zp)o-IF;5m*UWrD!kH4_Us z95XoyE8;XQk>y2J8Rp`Npse(ZojD&6W|J$qEpA~aC|EYoWU35!tj}Ocg~EG0QLpoJ zYJo|(Db(SWWTG$h+RVUdr;1ZerRKDaDXVk3OxEE!3ul1t(9pK zXg%FjlR=wN;Q7LYm-K)Zn`B)SNh-+L&01z)F!TiI%zRLGgjrk03_3{6D>9bgVUY?+ z!JoJWkA?8qg17sdV?5oT6ASpD@J<1aHDzp2mwAZ~s8tIb6^zKHIv=&1LfCc&Jzi=C zG`4J=rGli~RMVz3EcV)tFakO%%y=mgFv0fi&83;{NCVxehdi;m&7Hf%TRhG)csOQi ze7b;{6axri`^-WxWefpQ*^s#Tf@>OB;1z(y!NFxuu`vmy?H=Hlj_57@F6eqM)OVi=B(?&DJf=*&3+%(6%zFn!p4v*RRh!_0;5Uc*lP(iV-EGU_W zxQ^gQ;Cx9$XW%!eJ;V}*#<0Hte zk1a=v^*{kGccfSk6yS14iZuj5Ti%bsbzjBS5M^XQbZw4Z&Qo5eoMiH7uG}(WDOZ|Xc9@lnYD?~ccFt5M3fC_eLc(aK&mY`L30_jd zI8$g7rFol4jbj5f4$L>|My)qzTY^=GBah_7>ep?+(MdrM)OZQ=aYqHycpTNWw2>_4&SO(pr(g3$8mTB*wl6Q`ymAVw< zi;9Y>gi2S&9K}#&Z{pB}Zo(F&epV28$`43$+10D7t`5gS)4+HvU_cbas8tXncnk|5 zKq5@oI3Wg{iyheiqwWt5>i;!(K}qC#SjjerWhvPY(fGuyQo{rnZ)iiKh_y737{=6s z>11s#S&FwP0<&UD5Az^%B%1TVr?aiv4bjKvd9fheW=R-YclaDQra|33@ zq)12!6Kz&laybx@x%CizNnDNzmRt_3y7J|7IS`S#6_*nOD(ZEjSfYZ-l4kDQ8Kps{ zw2YhBoR>Px98yDIjI zqaaqS&RsMSXbY^eiUs*4pIcHetr@Tpe~=Ob9AEO;T|tF|bj^pL5)~Q`AVbCS(KD_A zM)Qy#LSh({Ru`z?aIoiaNcm{0(9dEsEp(~_AG3hMcCu3unQcT&9@bI)JVA=$YI#-Vw)7&f| zT4RDqWy&Kd)ov+FV^LoW#pDb~qo!9226;c>9z+PYPGTL$8v18b;Cji>V8Y}h&qeNn zEN}}sg`9*xuRe9v)=kI_yZPPjN~&i~F0E1;Y`2M=L+*wRJbhO~XONqAH*^Ljd8_+7 zxBYYL8Q>OTmF7u?Kk+PmV!1;fIkhgh^&D^mp^db*HLxa@;UiCt?j4-0CtsX?F^XKZ zDffYM;6?&gHHQAwm&1{P{Lwk&t>?fgW1@FFtvf+pcMkmMMsTaUN+T1`Gv=Bz8W_*h zUFXcJa$Da#bSzRAFg}~5^;jfoEx($c8G)d62Lu_{%&tkm@N+)N^&eZ3yDI?7R0Ad+ z=!)nnP;8weCW%mS+6`Y!6lv z9IOJ4;}j@F^jnSMK)12wfW0$bqXe<*<*vsn5M}6lvR6{F9IH?f$hMGQ%mPK7)Kh$c zklR>Ih;_;_yI&MjonoP(D=>MTgJQRq;pUy8(h6f`m{Qv{6-5U^O4H`nAWJU-zNk*b zT<8P`vVpV5h`UH?d5kzH+K8(le~h>*hq&GGFL~+luMu%^b0hLVF3vG^v?C>^Fl(L( zs8ta4bP@ZRXqc;7tvL><=-7%zE{%$k+8Z?)Zt=y)1~POK5W)-wl{UVt$5HK zlZ&2Y2~MNwq%(Swa3}tN1Hr;F$;t%9(1uv;VT*iKj_ISCWYwfZdEO%oDy-V$QQWAG zZL?(tW=q+Vt3otJ$*OAdcw!mXilVsGb&V4b;4R~TH z7j!65w0MFbb`gmA`2@l=dpn}Fykcfxqd%Ggi;*~mSrpbs*+MqnN734}*G+Vdd^g3S z397C4O5~&($Lwi8Pc{TCKBfr3qFtfVw!QhBj=LV6inpN}U2VnHVTo@!)jC}^-I&f7 z`Xl}zu6~60cZ|4b(&dU|zsHD+Xy|6z;T3dBEdjAE`8Gr6ws#S{6glIf4a z{d0;x?ON1h7yqn-=M^s;|M;oShH%P2FZJ?iO16ugkayy#VY6AyxUn3an7VEu#+HKs z1zn%a59_mzCy7O&swOaOTC}yf(XSNyomz%f{1V+AJK@5P{S?N(@WA-DtxQ}X{$W*O z>gH<{TSh}=v|tJpqb4nUW zrA!O2Qc5x{vqRZqYi^axiv24c|BewC3Ajg|$={{^UL^h)k6xfWcF`s=HlJ-bnZZ%1xAbqxZg+Lhva=ITwEbKqut;OhOlHn2KcB=|1d zy9Rj@xPDuI-jqGNqhm++v@EkNZ0|0!maR8s&b!W9Z$`c?fz#M%G_dql!w*YPvi`w(Gu1rNb;9@nQv!f3t<}8V6Yay0`Ix#3iYtRJ>25e6k zc)1@4B%B{2%{lxTsL?U#KjIgWIbwATs5ZWc^zO^`bbz&~W0$7`dW-bs+!WE{MJRU; z`F(jZrSrJEECb*T%F*Q2g$wRYs4tXH100XXY`!v@pg8D=e~Rya}{cz1)zJvRY;uJ&uvllHT^~;nF2>6q5uL z8g?bn=eZ<~Vv+z_Zc?t2E!CeB-mKyp{QBVozwI0-o=W%mLY2;4Z<@lVN)l%g7CPOt%Lp z5EA1>dz#2+#$uz3HM+SlOxN8S>m{-5K`x1R9*VG1Gz-&Vb|K7~R~r3^t7ST=un3(Y z)9jE6&VR1pX9!`-8KoZNW6u&nB=J4$7j&p zsP9u+p!x8EmWthu3YYXnzY{lrY4{9b=5ckbhP{%wm=r4GA}d!jSc)EuMPU&(JT@%5 zLV76R`fO;kbf|iEx;zx)F+pg7K|V7=GlOxgP#-&`gDn-iXJ6KnFJQN&;&Q+eIYlCq zA-SK=;$e`(4cm%0=BiQ43`gqFC6t7d)0-LSsGvd8&KC;3xL@#3WG zRn=G(e$4Z&u^s5uxw6*SBZa8N%0UKatYms9`H?Xd8uuSAb^?bvD0|RojhBhM54_0~)8tFaXxM%D2+j`Gy&LS^Ai#)p0 zdzL5v?NBnUM4tWKdXG@cFBF-wC&QlQ;4;@5FkXJ&QiR7O8|BXPgI!eb*;nw1ruXbq zsV}DY>??RAy$AJU<7_C*jZw|1CSxc%b^QjDAX{}w>4bt%pvG-3m0A=D4m$DYjD^kQ zcEU)KJf2BcAe|@rSe(F8WIR=}14GREW>8`dCDCgR{p0IBU3^&5X^n(SRodkeZFL6S zrb!6A(VW*7X*SNL$)@FKP%Ou$lADypc%Bv}g-okW=i~}oG#XS`%~7(Li5=No{Oof`wCtX${v5sXWv}MQ8XWm_KNsS zY6CA@FpGlA8#eFxHNUU88Qh=drtNWkFqp`_jKbz)m4u(Cl1d>rH1zqbWKH{;-0uc_ zi|hlb$n=yXUr_Q=VmSUWHJ{4?%zn*>^T<}A=}d@>IHy@duPSLlD|!RBK?pN}$O&kQ zie)WENOKS{0f1}B1T!RR#mrRXm`RQ-IMuxDv_>l1ZB^7hRhCBWWXJ6N6m4D4BRLZ(G*wTSbe>4__+`8e26GRLEd#wytbW|xRg(1#EryJ1|C>fTtk zr@{zzbLF1CM}^#@`CyZIQ&nnCCdL$L7iIa`a5%1u1uC4z_+nd2q;RoTS8+munh%@9 zTS^@V(^`LKC{?(SHBAsz6|=okXYSj>tUtmryAKzo*2V{EJ`YEl&wri-$Hef7q513s z&@nMwt&m%-mIjv-=XOtRJg&rWqx*dQ7;sM%-RBr^2X0UBQx3R&+Rx!iPNb7;w4b9W zIZ=hnQF8V)bR=17ca637v-Pc0;986*`^Y1wkT0A9_k%kky(SfshgSRr zaM$`#xuHMNh7$|6*V())|IjO>z?0WaFKcnbu6t;u`@reddpg?tfve&7dLy_%y{ zqrg2c9#~yN5A}f&7pI07ZXS#@y4DabJ%%Q=!@2`(ef@;nFPGK)-l5gtH(9^homRDp zc4)-{xNY5@>}f+^TP~i)LykPO>i%1m=SQfP2FTv`8+E-y8_R-Qmk+pkI%;nDlf!!q z4W4!WXAv~V@JE_%?0lBPuk$=`!xH0F&mFn`#qW1}umgMBC0xg`CYyWTY51bgeV+I5 zs7u(--n&=Sz7x3x`W+rF4AGl))91`~a?FzMtH`OOo&p^(=?F$}-e{S9sf9VNuW_wdB ztkdz}j&X2*fB_=Z@V5GQ?KO~u1A{fiwxe;LZruk%KUhl#1mwh1akW;a^F3tU(LPwH?OJx zxAwLleB$fjyK^Vm%sUY}L0)}#{O=OKeSP_XXLoPA;jQu?KlGv-fAP~Vd+xVh_l)m6 z@S?k~dHb8Mz4~tK%kS~<@4S!x;>(`)P2}G1f8ZGpKJ<>;?|kEHKmVDBq%RF#{yKz7 zP**?msz<*4?#06&r$71|pEGUd)&KPOnfHFpd?4+P-}Tkke)xv(eHS+6vu}RSAE2*4 z^OfKEUihnzKKXY`+2pgo@XoKJZ<{~-$v6GWtL4=V-Sg?s{`m(_e(398x&Q6oxX<|5 z{nr#eb?W^mKKJN9ycxUWCGTh!uf99|OW(fhQ@?WUm!JQxd*9m4{@MGUhri{6@9pAf T`wi~L?tDr3#w`G@TL1TdM|FXf literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..2aba4033 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1093 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNSRENDQWVxZ0F3SUJBZ0lSQU05dUhSR1lvaHZQZDRkZ0NxZFVHU1V3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTdlROS0YzNzk1NytFN012VnQKTjZYTFFyOFlVeTdCV05meTgrOUc0SG1LZHpzcjRRZkxhV2UxM2cvOFd1Ny9oUXAvT25nckp0Qi8xYkZaeFlzMgorSlB4bzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSUI0RnJGRTlrNkF2YXltUGxzQWkKVUhkNnVDN0E0ZkdGZHZ0NkVuODNEeXI1TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFEbEhnQlQxSk4ya2h5ZgptRkg4YlVvcFgzb3JESHhpUExNa1ZiTlR4QVp1MUFJZ2NJVitldTd2d0NacUNHMzVMcFIzYlpVR1h6VnpuUTF2ClJwWXJTd2w4czBvPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIC/MMJoHTIklZhcMoVSvtl4NW9GBKPCUH/OJXiADo58EAiBB4bRyQvO4Rt+BG+8SLPi+H4u2pxgdmZLa0rZS4GyClA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org1MSP" + }, + "nonce": "hjf2KmMCSZ+WA1b1YaL5zux5szcGSDWu" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:39Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "lzQF1cP/2FWrz8c5KIvLBWV2OzUejUxY" + } + } + }, + "signature": "MEUCIQDn8rN64s1GyZPYZ2pHjNnTNbXrZ4k0b3Gx6ZLFDPf2RAIgc0iftKgylRDlm/d5hP8Rnks2MSXcruwyonjiz53djFQ=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:39Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "cw62PXxBWqQqGtF9ncrwh4p5WT3geItG" + } + } + }, + "signature": "MEQCICPR17vBBsLs5Tuj7S1lyjsDOdAIugHY/9SfQRl8p1lKAiA0e/Ie0H4E4TqxLKFmNrm4LkKgwbVmQjJimG/KHXx5mQ==" + } + ] + }, + "header": { + "data_hash": "i2gdV/q8xhviP977RiHnac4XZ+dPvsLiGizwTUf+SQs=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..10b7eafc --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,393 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O\nA1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\nfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw\nRQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICRDCCAeqgAwIBAgIRAM9uHRGYohvPd4dgCqdUGSUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASvTNKF37957+E7MvVt\nN6XLQr8YUy7BWNfy8+9G4HmKdzsr4QfLaWe13g/8Wu7/hQp/OngrJtB/1bFZxYs2\n+JPxo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIB4FrFE9k6AvaymPlsAi\nUHd6uC7A4fGFdvt6En83Dyr5MAoGCCqGSM49BAMCA0gAMEUCIQDlHgBT1JN2khyf\nmFH8bUopX3orDHxiPLMkVbNTxAZu1AIgcIV+eu7vwCZqCG35LpR3bZUGXzVznQ1v\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2\nfsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIC/MMJoHTIklZhcMoVSvtl4NW9GBKPCUH/OJXiADo58EAiBB4bRyQvO4Rt+BG+8SLPi+H4u2pxgdmZLa0rZS4GyClA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=hjf2KmMCSZ+WA1b1YaL5zux5szcGSDWu +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-07-20T02:39:39Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=lzQF1cP/2FWrz8c5KIvLBWV2OzUejUxY +.data.data[0].payload.data.last_update.signature=MEUCIQDn8rN64s1GyZPYZ2pHjNnTNbXrZ4k0b3Gx6ZLFDPf2RAIgc0iftKgylRDlm/d5hP8Rnks2MSXcruwyonjiz53djFQ= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:39Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=cw62PXxBWqQqGtF9ncrwh4p5WT3geItG +.data.data[0].signature=MEQCICPR17vBBsLs5Tuj7S1lyjsDOdAIugHY/9SfQRl8p1lKAiA0e/Ie0H4E4TqxLKFmNrm4LkKgwbVmQjJimG/KHXx5mQ== +.header.data_hash=i2gdV/q8xhviP977RiHnac4XZ+dPvsLiGizwTUf+SQs= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 0000000000000000000000000000000000000000..1ede72563c588121be686b6a51405911bebdcffc GIT binary patch literal 23706 zcmeHveUK|zUG~o1-MM$qe%5n7-e(!&L=wna5^Mx<|zo)VH z{<-|bKfe}v`(qp6ZSeOm-?IV!W)s|fW@Bsf%oo1)#OJQvzPUAVdqdrIwXQlG>I3Ax zo8Zlx0F<1z?&uC*DI>4ld`b9&Qw%4ZCn!ngXpX>SYOxjY97m8cL13+lf%zPc8JvXW zahjIM;yhg)W}-2_SncQAGu|hR23N3~+}w;&u&l4jR1xr4pTXi)3h(knt;Wx&IVRzT zP=iO3iN4TnF$1fW$WK&-n$ad!-PxzfWDV}?;SA6$deT4#^9Guo(Ii&cDPYS4T1z&R zxZh%`aDUF@CC#VB23ZqDlJZk#qmmlv4DA7pnGK4TFm1`0PW!Q0NycJ4EK(vV_=&4< zTL8Dsd9%OT#?$>7F^4A#dkS!@A!CD@%uBpa?Xk>D_w37CAOO(p46dYo-k^_WsDq=68bx^;;q2a>Dt z1fB_IbrtJjZjfi%F~_T0s-9~l%C)FI%?l0PkVHu<`?E-WW{M;}>jF`H`OCrLsip*S z{Ygjee9y0aw)3LD9UyN^{NtzJ@`>c=&DZ6;>p#~0J>*O8+5rFXmW?x~kdMD*19^7^ zT#t=LgPx{(J$s1!QU&7pk^8{ul4Ha}ME&A@5P@k}XsC5yIai@X4NF1Q=qK7wCj zFSTL8m+CXs8V&T9YPNOu^_i_rtZns%?$+zJ!PVhG9^OX2d=K(}?%6x+CyxYbH3Vv> zw+Gb1l)(}L7sGhEoEp>9dXA`D)it1M^D7NhM#kz(pi)dOXwIogv)=8t>bTpiq|6o? zo3SLO?v&wW3KhDb2(k1u1%0-w3B26*1rnR_q%nh^z7lSOfaT|0YPk(4CO+py*C%#B z%20m3R-IEa4+pn!3?gv8AfmLZDou#L)Tkj-3Xh9Be7TRP?aPzag10>)RX0uI-j(P`cx=eW7&~oC3W5+xK^ea-k&91Oc97`WE0&M@rkq9fyA;Q|sK7{pV zrF!49)l@qX_M-KfqE}MGkutQ2YRt-LjTF|yX%IKFxm-8u7A%gc zq0{6{&PwyN#z(bOD#}Vl(r`v*SMX}ap&=8$30zZQF%;Ph|EALUe>xICwGcp^^d5kO zNq>lTrvqsFq7+kJz)wgVwZ`dmkT0* z!#H)BVXDL9F$RQz5QZtG&CFm<{merZSjH-xY$n81#BWUVmDD_|WyX~TA&SX(Co1rH zL(EiBu~`%nXl9t~5^<86^m22*ngO0141{r`F?X!SpcS}iWLR%9exjq(1Zt^AhAP1B z#;VH=Re;@%Ri0dK5au+MV>ncvbUeY1mry^^aCEFcpOCQa}faEn+K zhAMW(HFK6&7R7px=QFV&PNFlb*iMm58s$@EbVQH4V}3ScD1sxCjxuXf0IxUV^tfoo zVg!$u%Nh=XQg21;={|Z$sA_)vMwoPdeiNJ|g(pejNmBR?ObU@rZP3$) z-qvSNz;-eNJDGufLuX*fH6cN=eN|C#qJP07nT*i za_?d<8j?K!dhgbocln+-Y$HFqjXbr(_bhgP`p9IuYF@ z$tKs5>2JntlshipvsUn1jqmAQOweA6?^!E&EWQVIBja=+%=A&kD#s%zIyx6p0sGbqVcLijm7|3Cbzuif{^B5*Vx!YkQibPNyJWj7%gu zE{oADEqJ+9vqfj*5}ViSV>aU-I)%L)&PSl8(=wqLcmi!t8ct>|PjkWgl=V9ZWzRn6 z6I>4G)1#d{K9yR)N#~5bVDq}kJ8s48SM3z;PBN3$xHcGgayM0FvyoEF%~J7dE;H1% z*|gA`^i{dv@%bj%2U4EtR^xoGnw4V1@z=@uTn=E?IUmj;o4JPN5h-y-v$|HUCIvO` z4D31~Oa&q%pb09H?lD4=gMjgYEMx^EAS(IPMC2GRL*}e~*{>)+3SYcQhdBL8#-`QK;2cZ0h^zAH*})!tCE+q!J8 z{zaY#o)hi}ReRBWa---jw*|7`_JONuQAYPjeKfFxkRz*%bnVERDR54o!opFyH-My< z-o^*E)<3e^E5LKLu)#{tnhaD=C+s2A8p)2XS4VC5{m27kz-{B*9xqzN17Tvdbmz#5 z4}j+_Pn8?Go;vh;u)X%`TDeCaApve#Hod6D4LkOcm0kj_-?>i5yFT!;F0K!}Av>4m zc-1Iy?}LM0N7n*vphv}t?gXn7BlS*i*juQ~j(Qwm>&r9Ty|}FEc8@$qcu$s>cCS^{ zQ;)2e19vRjlO1*Fs#@4hJmAP9tFCudo*koF5+Db!Z}{jP*;pFfx;Vkr*-^8e>mB{X z(BQs{Z;PN>x;s)eeebp$eVmtq8x|NZJNC$SFWukWK?oddm#{6X=dJp_*YG9Jd-piY z5pnB&a08)^)K+f*pCjExZbxna0BqLc4<;W(k*k*FwqJaZYkw|s?#$K5%?CD~J+&&m zy~nZNf!qj7LLPp1VA@}1IkK+GT-3Ym?G=xHCvp=!4D8tsUB0ia6u7mx#K->E0f%>S z#kao}5Bc_m+!^^QhWz+#EA=zfYa;)B>(+ z;q}r|(IVEe)4rbfXsME|(=Nsts4*-y^+>{&W<4`VOM1B}cR?#-C|;H87jprjH`ZSH zti&opizv)mOkx}vC;=C%7_MAx`jbBJVpH0fa7whGGL2GY)b2wqHl*}b-G$6yH&ZV< zrq!wrqFJ%t$F-4P4_Lq5!QwvIlPoCkzO=G>`{5%&M1*g$TErfR)OnU@WFthfQ}FPJ zQ!MesA-}xRN;W9A&kYB3Bp9ZH8rv)N z&7u<&a_x4GrRqu|&Nt_TnoU*;9aiwHN;NJILEcDat!PxNDyTvzbZN{{3{`YIi_Udo zrYQB(htuYvFl|jMxnC-I*z+Gg{@}3ZePSpTi@-8oVnV|B+=P{whTWZ(+sU>;jN4VFa!{BS+HP9pm6l2#Zo9Fe%ysE&p<^vp zSXggB=)GAE(a*?w!}ts94SX>fx`Zy@dILi5&5rd(^r=vwD~bim_ZF_8y`E7jG`1|_ zCR9aAOI2hTKfyk?g0IM!j2qf+2DLuNDf#7m*aT>?RSF?uxK{hs@kJ^!gfe@)+-nJeyt_QGpsp@L;0k})gt;NGxdq) zm|zmA;z&xgnpLJgug!;IdRa#tQ)fr^Y5(k&ICBU%sXF*JP%UlTl>TrH-+i% zp8IW8DY;BMkqgLqSm!zW>YPPx+FxgHUcU{ST1rih-PAHM-FiMa2NU~nelO{+=kyj6 zC>J@i?9*{m_pSF|05`%Jr>hU$i7N*q9eMW!9kt^jKX(Cq?M85`y^{vV z4tS4#GPCuCBgY~olx-V@b{_M1_T*ZjgCRU@N;pJyLfN>%}a9k1wfgq zL!a0}tzApPEP0<#@EIh!3Un}rF?u1I{(2H!nB?v_7+D!>E%R_XG)6JCpjqeqWj?-2 z$1k!pKp?Ms8st`SXpX0bHbXoPA_546Hv5VA3C_(JIxXZB$goerkWwDY;TR)t=}8OV1kDQ?ytR+~Yj2py1SMM2SlkWkfGZ;+6SZW1UBdG1o{R6=;ICvZehC}=nydC8rvpMC{2HmlMev4A(r2#+yMvtdCwqA9*UuLvE0Sx*|HqbMir@7kz&PJm(Z!8Y>r1! zy*xIJrr{gS>H%9HL}TddQ;g6>70y-jqPTDmhk5og%|1Z#mq=v8Uyl9W(HRLqam;uiBnjQ!ulwiOGo=CTA6e^v5ubY zBv>>?wX|-5^vY4pob<& zYN|g9)|Y@eiGMrG!0h9qE`i21ZOd`uA3xF90ItQL6}s6ZC7bznz+2J8u+b=|>_~== zO>8?CVT-@7$(!m-@0arZb|uAD-2&YiTfy9nd>h8UHGTMj z__xbUJWc$=%EZLZRw%ZJ2G!A=$x)0t7jx-2h1MIkS&R%b1-xJg@qF6n4A3Yh$$TOn z?QyEb+muYtWp*s3ns}M2#*;ETlpVHWm$|gqztZvV1aTpOd+ddmP7s%+zM&cCw-@3N z1YDbn#Vq$MxO3zDwJ&_=p@+bVXuS_yhpV2}t@P$P^cUWE=0C4K3kzI(C;YQA@NGR0 z+^{Gm_blC>c*sr2HQ*HLE{}37EyD$H^Fp0dQwKe$nF^PWIz$_>B9~WXE<)$TkSe96F<1?K$5c9wROiz54YQ1ba&0H z3jl=tx9xbni3O>91e~ob7T4O_y6Wz6^)OK3vV4oMy84%+UO9$RW_gE@pS}hB@mcU+ z;SzpOYICV2{Qhne{Ql<3VTznAT67FIz_V{)TbrQ6B?eCxEqWFfEkf?Bls2Bvy!8X` z?i+vlRrUMdpZUqRzw4m~|KrIYMjpQo{L(3~wr1uJBCkBS;$I2AAS~=5@PVz;HPy-LEfw>`Q~l zCtrC-{DY6YZSyN1jUY^nI(5%gufOeX^-sVp?{eLn9)I!;Z?E6=zT{IIAFh4+1Al>i z=ucnyfsw5xt~9mDc$UpY*d%pN@MDDRq zJlb_;$*o^M4c>Gb+yYL)G3|PA9k_bq)YWINx$|1&Yn$L?MdFhciBDD}e)<)O#oyg} z=S;uhZEyP8tDpZ4@Bcmd!9RQP4Taaf>Qg(w6kqW~_t7UF``I&J`iFDh_jk%y&wli$ z?s@2=FZkG3KKI58`S)!B literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..6326dafb --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,1012 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQCLFRthwwoRqXNzDsXVjZ5YGbc0/wHRVuPAyEHNxF4nvwIgIN2ScBKJFapxsEgjSeqUNFV3TT43yIlyKbQUhfHNbxU=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "jbk3mdl7G4tP2PVsK99eFzHBp5oG+dYr" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "U08BH0eZwKxrZ8T6YVy+N4qeqYBf8tV+" + } + } + }, + "signature": "MEUCIQClsutmhWbjdA/FvG5dBpb3QKpSH4i+azg3kSaxTnmBwQIgIc4oPcCx6HsCPnVPQFdFlzr4f7QXXCKF9OrRM6fi1eU=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sKjoZinTbBKSM+HjmN00cJUJOXQL2Gi5" + } + } + }, + "signature": "MEQCIDuzDjwLsnUTlhM3TAzRFdRA/xlKE+qPvXanwLWqxXxqAiBian0MK9/tBfEmb695n4FRp1SDgbDx7kM5sd2qaHJ4NA==" + } + ] + }, + "header": { + "data_hash": "mQba5U/vMxYRS+k22hLwI/LN2NWmKCz8B0Gyx1TJ64Y=", + "number": "1", + "previous_hash": "3t7ULD/J0EZNbDr2FiIpMgNE72QQX3/2JiXocX1yHNQ=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json-flat.json new file mode 100644 index 00000000..c495fc1f --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_1.block.json-flat.json @@ -0,0 +1,373 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y\naZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\na7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw\nRAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJmlYMvZ8bywI8LWoX9/L+AwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABAgdze7wHXSC/H4qhGUddWjFiJlASO+PXZ3sKmrv2TQQyzl3WREXa8Ci\nASCFqbYjzsBqfAl/PrUaNljvYtD4QAWjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgmAnRgqptaHU6zAjKCdwk5QxDfy/RRVrqTjuNp2o7LhcwCgYIKoZIzj0E\nAwIDRwAwRAIgAtxYWUSm5+GJFo2HMvnnqVQ9Eyu+MJba03BQSVWBCRECIH7BZUVB\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI\nzj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn\nJg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG\nA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW\ntUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa\n0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=2 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQCLFRthwwoRqXNzDsXVjZ5YGbc0/wHRVuPAyEHNxF4nvwIgIN2ScBKJFapxsEgjSeqUNFV3TT43yIlyKbQUhfHNbxU= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=jbk3mdl7G4tP2PVsK99eFzHBp5oG+dYr +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-07-20T02:39:43Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=U08BH0eZwKxrZ8T6YVy+N4qeqYBf8tV+ +.data.data[0].payload.data.last_update.signature=MEUCIQClsutmhWbjdA/FvG5dBpb3QKpSH4i+azg3kSaxTnmBwQIgIc4oPcCx6HsCPnVPQFdFlzr4f7QXXCKF9OrRM6fi1eU= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:43Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=sKjoZinTbBKSM+HjmN00cJUJOXQL2Gi5 +.data.data[0].signature=MEQCIDuzDjwLsnUTlhM3TAzRFdRA/xlKE+qPvXanwLWqxXxqAiBian0MK9/tBfEmb695n4FRp1SDgbDx7kM5sd2qaHJ4NA== +.header.data_hash=mQba5U/vMxYRS+k22hLwI/LN2NWmKCz8B0Gyx1TJ64Y= +.header.number=1 +.header.previous_hash=3t7ULD/J0EZNbDr2FiIpMgNE72QQX3/2JiXocX1yHNQ= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAQ== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 0000000000000000000000000000000000000000..c96aa8c3d99926796a1a6d0f260654f011ba0782 GIT binary patch literal 23763 zcmeHP3y|YxeZRXTo8=2h4qYCX4J5}lKzc5*Ex+5+qNgR>k}X;C3#L?-W!bVN*^+Eo zZkY*zA*B>3LzoVaGNlwK6zG&pheA8h(9&0i(so)HI?ztbOev3P`ry?ErJwAzclS28 zySW_C?#|r$R{mak{J#JH`|0=l0KItzx$s`|u6LdP(C_`(*FN#;-~Yug7603c{?UuS z%5yK?c*kSq*WG{jr?)Qr;|nC`E6=tbc=X)H+aIVr{MVmKc)x_@{_Tg~^}r4Dr(L}L z1IQooW)`0wT6=LWcQ^Yqrn=D&UOPrq>8_RZ~y+qX2=ReOqMX+z}w8{qXD0F<4M z=4cLAtspPocy9QEQ+bxZKv1H@(ky{V)Z!@MSe76qg238U9rIZn(^(NK;503grFmMm zGSQe{k_Uy(jPnV-$rkMvJ2zq!EbA*0RRSC~$YXJt!h0N1t8p`Gj)}O=*I-K$G2nac z{LpMC3KOMH&1eIYm*1%pS%cs8@jOsXdeTIP^Cp^|(Ii$~7O*7(ttFfFxZlpp@cW#{ ziK9w#<^8e8iA+qGe7nr+P5jX0T1Yqe5Z$vUH&q;~X*rjD~JIr4arEbFdP;Eho( zW)$i2h^Umasd}+k#HV(zY)1&(Ze>S#Lz3_khb6;1)**cgkNQG*D;c1Z7#Cg)M&xj; zo24)V!#KiS6l8s2z!61^6Vh8&8n$`N=bm^Bov zkGVl1--$V1!&J0fJ5i}cwP}HGYPu+hYQ>*L8Z$#6@mUWD!t{hn&TqRL7oBb1hbE z!Lu=pqbsQ~J#FNOhAAHasye^gK+Q{7V+B+yp9@-ZYSL=-dhG`8wyG(kjmBmSi7Cr6 zoJ65~50oI59;cws^i-ac20l+>Gmg|}@YAn{#~@(2Ih$G?19bzRbAsy=OOWO%zfhCs zl*GZwEu4c0oGS__?JD&a#9wOEl&Cs~3(NUw#_>Q#=?P1N` z32>saxSe@r7qFDd;r5~ofCH48C^dQff(MbkLIAb{Y=Gm@h{2Ud(@aZXqp5~Cp^H>C znV&d%EG1~kN=lhe+9hquSIn{GNU^dqZxd`g(+UcV9&G}pRVy{bxKuCY8$C8Jp+&Xr z)&ip~;m+eA8y^{1X94W0Ooj6=z;)fhb&AFXmBhjs-EZQ!ATw}?J{eA6VobsWCW>RS z50Bx|IW}4}AS5YP7j&Rxyi$d1)!iB4Ov|=57!vb*MIS~LC!+`{J_zt=O7(~cuV4Bk zk|Jyph#0H4r&ZMG^Eo{3R2h5{cP)+Nyk0Kt7J7UWO_Z^9_;v6EZli!1|{;b>>c(#)2 zB!WT~%}ml3 zkt!)HK@Z0QKMxuX6O?Q|Y4Nx^wG4(1>W+~tSwb|z^DQvUrbcLLIF96MW3$Nf9Oe3? zz5qsL2@C-ON5eSG4^OK@E#oM`VVDoWL;{E)11AKZwK4rlzyfv>EV2q)6a}`270ftk ziE;mPp+h89m;s>4%0){3dX1mBCPCBmA987e0R^fNCLty6Ig2@sojt_NGH` zRKg2h*QwMa6?ii*%_Td=cO^v4my;t*P$b$C-7u5uJ((~C7O~5~(JKWJz+s%a!Z6k4 z@K_#%fe?nNdM7`FIrS3{RbUmXaI%#UQW3v7EmTwUteP2Dn}i@F=AL2n)GvXU(Nte3Wof+*_=CObJz}CG-5Scc|XzBXaY5rBSRHnc4F0)hAP19 z#41m!Gznvx%H>&9nshzhj+aqC(R4IyFrQcYe5T)U>TEm9e+naY04!zPV(w2>a5hlHxu-`)t5&M$6&lcew@DLhFEzl}*DvY`(9n&oZ%^9k5a zR$wP9uy5-M47oNWNLF0Pb`sn`SsmMPH4`Ebc@_exP2_fD6WM^DXEsl5-GDr0&5x{W z#lZEVra*qveF8P=PTzY1HR520uL+4AIG8*34C+SYhV`J%LMnDi>|9(`czDSap&`lh z&SNk|=;fHA*Y7Yzui8c)*hap!WQrEee(uOLTsAIYiuh`FE=!c*S-rlAOKfYHce2R? zY4~?y9m^hjww1&@K{U{>PE)tfS+ljs#%FgP;_FujeLx3)kL`y z@O+LMx7kEuULaVw;GE_A*i>rAv^dG(sbm>01c(6^C9nh;O%x4Z6Vk5k7xPD^->dBV z$umV=+$yTHLQ+wyT`JQ3&am6m37*rMv+6v_M42Sn?3>CssbQBsiHo%_SS)@koE^t$ zv(jlW6OSjlb%`Z1gHa@2YBxl5K-KkJR!vY&Iah*<-!h-asJDT(g}al?q&=<;ho00+$xJp-w`JNo-a&lITS>q?k7F`Ko4zfk8L$-2F(<4&CjAk^oA}4vJ;0)~s z!B2T2!=ni*lJ4jEBntuK1BuV_dO%bQsfobmy$qQ%D_O~Gjp|IdRjv=Hk~nI|J9_Wi z&lVNTVUwG-vhBcUv+(6tBNr`24onXIcY-ZC5PfFM<=LVGg^v}gzJqMhfe1t$!WJDU zeED#-%NAjJXRc*@rcou}#6IrjPu&-;_OV5nH*41As+o%93$%?g+|;thH6cd@lL%L6E3pJFRBLsd z5FuN{Wbl?;!@;CFm}+vxiM5ghQK@5wQ|!!K!%Dj&95V*+MNM^l7+ds@AzSn>8{i}{ z{N7-T4glyRG2HhG@k-*{-j^cZ)x>bk7=8H!aNjG8(Fx!Ve`o*w4Y>WR(XsfSkSAGD zGuyDn(frT88pq*(!V0_m&+*Buy&bJsqpg441lM9j$wfZDiF{@g{1~_+WXhsMPw88# z-O(g_{a@rR@bvJDQ12JrBUFm+uwoz!ZX3F)8qI4Ssf~tq5VC94k)|G5GX>6RQ&>1k z_lJ-!(>nOjRtHB``$_N&HSDn3Hzz~I(+JywDkaI$GQq_F^%TqN!~Qz!YvmrX}WpRS*v!iBx z*E{-&p}{?u-WFalHFu<_+U{*Rx}E#LQx_PoIQGbPFF)R$sSE7ym#|H<@2$ta+wo=3 zd#9b%thn`T@Kiz>Dee9cK1Z61+=e_A0I*SuzbN@46gjmjxBVmgS^8%n=b%vX=6wgx zo>`aP-eu=+M{a~AA%nj&G3_n0nvd6IE*ahS_L_k|kK6>Cfg@WI?R)x4fm=!|eC&OZ zaQF~cb1w37Jmm2gLTTi`Fyz5o*Scw_^hCaK%ht!wEw!2-JBNJe9P)v4>+eHu|D#8e z@D&o0@LGALg%N7m=|C%Zv{+5j!KBkhQ-vH{+7+S9VcZ)SWvDP9F#{ik+7WQ28poA( z1nki`${fzFG>)Z9Wt#LHtF2_3q#4Rzmf|b07GC4Y1}RZchAH@*ge5r%e$qBP7D_X@ zP+Pq^wvdFc6ye}XCE+VYIJiFiKqE=~1J%D|)-o5qO%!MCd}16K)&n+H)m=$$`I7E+>p{&G#4_5 zy-cIz7-m}@Mzca=fU6_F5iowIi^YAiFPcyqetAvy_DhZg5fQ%0Y7@I4Qs!BrnT-(1 zZqdUdPN~chlOHS))u0yc>Vhb5V9gzjbCgUE+V$Z?$RAH+8S=|(m1UD+2COxtBY~9; zYD~X8FiK8P%yl|BhHBIkajrEdlx(tE>@vJ(R^_;4fr6gQn$f5r*U>srr^{oO%2OrB zGwED6W(eXSeK>6%O4<&nEcc2m4}1Q@#~&Q_{I5lpMMJkrVtf#wQBSW>R*a1{6iX{$ zEd|7^NIj>UX@iXyqb-Vnyt&dX)%kAUH5$WOR){$xbxcR;!X(X>F{Z>SY<$R$tt8|6 zPmnhM#F3Z~7lCEG!i0!%xd|iYn|5zn=_ETkG49Cu>V8REXxM3!S6gIxxM9bJ0@;-# zhK{uveqq`Hp=)O~ML!|aPTpUbcHoQ2&|h@rrX3Kvc9y0c!KXrLuOJjD-&^>Jc1K1j z&=RwVn@~?FuJn{)`~-V^4t`z2BwSZ_LO6@>hI0Qv&3bRv^WWg=9Do7OzQ zryC`~f$o$)*{*@ zGxdqqn8+tmrIDCux8!_dUYlD&dtXvP+D#!In{h#=?)1ps_0#vfZ^xTBzN)N_&b;6?g@Yr z)qoDOh0eQ{gjw<)hv5@QbnDRj7{=&@-1^BRx-iLIdLJ1HYp?QfIfYeB2Q`m20= zosM5(hJZjm=!TF|fy9UsM-f@J5$~1~ay2=s$E~@aam8TfwV~ayV90izfju-IXO25??u|*o@SDq9Ak<<7CMtd)a0Ug?VnZJ69{k>A(j& zla&Z3E1zXq8TzvZtwv#}8rUUjBa|TaT-?=M1wt$4KAR#b_RW5-%#&?CJD>V;-K!krfP+~*2) zPsjx35vr3D#9d}-d4f3T&J~tH{seJX4{>|r-+tHbvEpAN%*FLJ$pdq7HeW+KVr&9e z%~Kxj=L9ubI4EKHe$T~s4D?qs7r%^w{(v8MKc@pi2mJw3hmGJ(o2JXS)vV%7Z(?^_ zQNKGT=RL8{n~kQKOsR3g_S_*0{CQs|%N~lM4WZJ*=GlrAQAbs=Uln7eS&z`Dpkj-Q5YKWo8D}{G-k@7>QF@pTY(xlS@YjC|aHLy0Na7 z?IsvBMzz&mk@PB2%$N+aWP?|tV~PL_+U3h_!}L0e2&U1b0L?GQ)r`U8>NVqDdI()j~CKDtAl1KNfr|E zXrEO~&ZZ=KE-_;<)xs;398XG&B{@vhuCQrgaJA##3F1Nm_t;xDoggkteOoim?=Qq5 z2)Hg4i<$0OaQ^g#>+Ze({`+2^UcRp zfZRn`%nFxYxf}QO_R_D9*TyV$YTu3Mv+Nn_WoQdj991S@O-JRcp zKR2(7-+vmM-J#I2PRD_}*+DhR5D~x~k4H=YXeO45t-sp0V&DJOzGPqpP69e0m-calbZ+CQHx`dk(9=YAoiGl6v z8`zNZZ+q5%ev^LTW87D+dD-Wl{l}+Y`Pemo`M~sD|NRZ*51#_wdUw1Ebb!k`CHd76=bKj*ZMW&)b@Vy96SIGeIWuJOB?IwIAWW$#Cy}gzEubb_|COeLX|{>h<7c`dMszcr5E*xKC8LpW%sr_QXHC zvlTCL{u_@x_{a+%e$H2Z`Hg>D{lLepf4XJ+nLqx!pYHq*LdVE67oPE%*IYdN*?)NW zqj%|l@)s|?rSS9R8_0LP?3P#a{7e4p;zxe^vu7@x^NmlRd*pX+d+4Lnhu$I!uX*Vg zRsFjEG=A-U^cUFnM;?6DvK{^HiO8RR?cV3TyBB=dZ4w{oJkg z%e=Rx=}$fXA3pe-_rCOlnG5gV{OwPC{DV^i`I8ED*T>IXIQu(4@q2&sX7lZDO8goA rp4YzV!dsv7?k_(0^*6od_B%g(-+SIOeHDNU*v&KG6xfSOaO(d6K@~3D literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..8174428a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,1024 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIB3cjyoQ3eGzwh5nyNCDFEqKTwtEqYQUjk5Ogfoqv2DdAiATd2rZE8G4FpTCdpSeVVGPg+pjZwX5aqSuRulJYr+HjQ==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "+MGHwVyzJ/SdmtpTt8Vu5hQiITy72WT8" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:45Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "oyX5/UZc7030A4TjJscBi+8D0YJ2qfv4" + } + } + }, + "signature": "MEQCIGelMyvJ9ig9qmh57Kf/cssbJdZJS/6LRBayTufzke8iAiB6w1swrZ50H75FQLmX3xI/eGiZa1k27AZchh+VFghBSA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:45Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "1d0cplVLD0MPv5PFGRWN65oSMlvFd3hs" + } + } + }, + "signature": "MEQCIEORlEMqI9HwwojLfXlbdidlJIwViS4fUcFO6Wq6B0+rAiBEMxDZ91zjKIdmQqfu8iYAE+vnGH2iMMEloMsbnqjLQw==" + } + ] + }, + "header": { + "data_hash": "4ltUcvQmboLLEwalglCz1NczdJdBOfEpqYILehEqF7c=", + "number": "2", + "previous_hash": "rW0eqRi6vMr2z47AkOtL+24vxn31Tk19BqbvT5OAH9k=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYBhL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYN0YXe7feAU3Os/YUMfWJ3BBPj1h8CJP1EkcwRQIhAIgVb4R0ozZG10Dhua8og7k3ILIItc/NuXZqEshQRR7NAiAQuD681ZxtpZszykKskZsgoSeq6of3m48XG74urKx2jQ==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..9806c6e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,377 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRANukn2hvltpLBJtfrPW+PwEwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgx\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABDZ3Q5+wYvJS5z8c7qSYCQQ41f/NMJgQ7U2QZLN327n4hC1DEui9zwU7\ntTylNqYYzrmYlbys2+nXZGw3feFC2majbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtTPYCjv59GI2TuftNo1O2w3YreAkzzPiN7iXrWI+TOUwCgYIKoZIzj0E\nAwIDRwAwRAIgHxIZ9mQPQQXiMM70y1D2xmLd5DG62M5P2pFqhqMxxGECID4rWxZE\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE\nAxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA\nBB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O\nA1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU\nBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg\nfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw\nRQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIB3cjyoQ3eGzwh5nyNCDFEqKTwtEqYQUjk5Ogfoqv2DdAiATd2rZE8G4FpTCdpSeVVGPg+pjZwX5aqSuRulJYr+HjQ== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=+MGHwVyzJ/SdmtpTt8Vu5hQiITy72WT8 +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-07-20T02:39:45Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=oyX5/UZc7030A4TjJscBi+8D0YJ2qfv4 +.data.data[0].payload.data.last_update.signature=MEQCIGelMyvJ9ig9qmh57Kf/cssbJdZJS/6LRBayTufzke8iAiB6w1swrZ50H75FQLmX3xI/eGiZa1k27AZchh+VFghBSA== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:45Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=1d0cplVLD0MPv5PFGRWN65oSMlvFd3hs +.data.data[0].signature=MEQCIEORlEMqI9HwwojLfXlbdidlJIwViS4fUcFO6Wq6B0+rAiBEMxDZ91zjKIdmQqfu8iYAE+vnGH2iMMEloMsbnqjLQw== +.header.data_hash=4ltUcvQmboLLEwalglCz1NczdJdBOfEpqYILehEqF7c= +.header.number=2 +.header.previous_hash=rW0eqRi6vMr2z47AkOtL+24vxn31Tk19BqbvT5OAH9k= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBhL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYN0YXe7feAU3Os/YUMfWJ3BBPj1h8CJP1EkcwRQIhAIgVb4R0ozZG10Dhua8og7k3ILIItc/NuXZqEshQRR7NAiAQuD681ZxtpZszykKskZsgoSeq6of3m48XG74urKx2jQ== +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 0000000000000000000000000000000000000000..f444ac35cd5891ba607cbe5369971b46279e4645 GIT binary patch literal 4542 zcmeH~d5jzN702V<&F&6J1>q#ibAn_$1c_N z?NP_{d$+hJesa@ExBjF0?i&{^yL|hOFOKZ_>9#vI-*V6KPh>9Ib)o&gf*W%y1m^b>h4qv6ar;=Mt*Z9N z#=#xqU?SGi-26=3e#7|M!G}aFCrndFk~xN>pp53Nfaf?W(x)hxV>M`SB-A(wMoMNZ zRqoWYc+T4k2R!~cqJ|8E($ZX{p5gjBhAdx0?V~8*VVQ;QSwt3jDv{t#)Q1wO2?^^> zGF29e3R|fv-tb&DiA+X^v%_bqOed^oC6Wbdm6=O>D*d!4V6rky4ISz-VuQU*AI)V_ z#iEiT+nE_$S3H;*qG5LE!^_Ac6hXB5p^iqVs0zGXHUt`)Jgu45)kqF(dfDLn9KK)! zNu6x-V%wm^G@TGd78&8hY#+(IRkJ~A6v;>tW_N zl?HLn2k&l$9O4Vgob}Y(`1Isu<$%;DRNkfHxGN+@ zX|2`Ji$W)%opchI-~C9S|5Fk6sk@Iw4}Mu&b0_%mQ)leHcI7|$S9{Mtd+A=nzV!%j z#S!3hea#E;bA5fTug_Rt_a6ejYXj%mz-HT|ZK0nz&H&@Ne4|qDfrHy7SOZpDj)&Nn z=FJA?ag4gxVU8ogSgBU(09zJ}x-ksc6fo+suB$CSV0n*BF0sBg$8!6!#U{D9@K_xa zjODF13dXvFX1Z-T_~jUwX1~Ab>l3S*fAC)N+}F%=-+bWg$Suva552g1qf6iNTI^=k z{+%(fWyF3A7)E0Mf@9JOzzPV%26u{M5Q6+2Gc)#wDmGq*>K(Voh$C$_0ny}6X`#{^T26WpURoL?tJ3fr~LNm>#jV? zy!x+>yIwl$;nR$(ww$$Tys!knEwcHI_3bTz@e_|-KRx-7c53iy3wNg2pCA9;g@5}> z>3zHNk!zj-jWb_edg*42Jn^7%9%^5{Sk4tT$HH<@P;2?LZF0NK@&B9P35O2h%dynG z&bQ8Ee{USzbO3{G{YVB24;V}(78pzvaBo=2GqTeRH;Z&`jt}a!qz)sbrZtOYJr)Z-1N0?^}%#6tp<7s5XXk=Zn7EQ;UU?jWmrkbyu=%5h)WzY z8gx2oVUz`XO0`ntrL@7od0q=4!!27W_%x{&E-F=_p?ZWaFJcB|fr$llQDjI)CYk6R z$Y03J3~dx{L7i$^82QQht0w8WddHL`qSgjXiz8sJCsYKKFtEDY+ksH+(o{x4GCn&S zf@ZUd8X==y6YFLmr36AXe?w=ZbLH4vF-{TyuX>{;L3CA{pPau2_ys-pSX56- zhQ(iy(}d1UEz6jkj(g|~S$C%-k)VoZvE=R5kmyR3at#V8iJ&QK6bE}m)$|sCQH0&P z-i>mla=Q= z^?lJe0I^ms-^#ZJlh!#Osd8GjRIbb{s9du4JHtqHv`@^|{4UIh&X&VDlV615g-I(b zf7X*0L&KScNsICvwDTp^VD^tG$iVgV{u2QF`v~~>%C^RsMPUOHesX0WC~PpVYzZ^i zp|WXYN|t)1idwbQO&xqtk=9|xvt+Ny&hWk<)DR0OYX8DOA&7C16>fSx;1= z-9XAzQf}Huy+g`ly`M-edxBmF>$%VfQ_n!;K29g9zz=5I!Oa29$)VkOJ literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..d642cc53 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,157 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "vh5FySZnKrwKm9175KoZ703xeejgnvY2" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEMCIBtyGDG9GGeizQPKkcs3bIB2Rbls8yAJ9kuD/Q00pBsQAh8uy4rfDxkbVOSa2Bgr84NCSgNaGb4rR7S7xN/4R9wf" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.2" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "R5CDXgcbcc8zmuc8eIj1x4JLtnEtyurkgC9qmfJPtWM=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2019-07-20T02:39:50.747536100Z", + "tls_cert_hash": null, + "tx_id": "79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org1MSP" + }, + "nonce": "vh5FySZnKrwKm9175KoZ703xeejgnvY2" + } + } + }, + "signature": "MEQCIAuBxqcX1JamZvPLtZ8lGQOOYICa5axB0aMtMfIo9q5lAiA++b9F9Tbi4FpOd297GJ6zt1gw+GOApABUf9c+1Y/lsA==" + } + ] + }, + "header": { + "data_hash": "/LYxB5yyPbfsbfr0lQmiyMskAuWgs7qHtr8h2lqV4pI=", + "number": "3", + "previous_hash": "sPpj5ehkzRYRgFA1La2GOsFzzZhMS2hOaHa64mMviwM=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..6ab31f71 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=vh5FySZnKrwKm9175KoZ703xeejgnvY2 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEMCIBtyGDG9GGeizQPKkcs3bIB2Rbls8yAJ9kuD/Q00pBsQAh8uy4rfDxkbVOSa2Bgr84NCSgNaGb4rR7S7xN/4R9wf +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.2 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=R5CDXgcbcc8zmuc8eIj1x4JLtnEtyurkgC9qmfJPtWM= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.is_init=False +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:50.747536100Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=vh5FySZnKrwKm9175KoZ703xeejgnvY2 +.data.data[0].signature=MEQCIAuBxqcX1JamZvPLtZ8lGQOOYICa5axB0aMtMfIo9q5lAiA++b9F9Tbi4FpOd297GJ6zt1gw+GOApABUf9c+1Y/lsA== +.header.data_hash=/LYxB5yyPbfsbfr0lQmiyMskAuWgs7qHtr8h2lqV4pI= +.header.number=3 +.header.previous_hash=sPpj5ehkzRYRgFA1La2GOsFzzZhMS2hOaHa64mMviwM= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 0000000000000000000000000000000000000000..ba7100ea723272eab217d58717a10997fb207583 GIT binary patch literal 4007 zcmeH~eT)=$8OOOjxI2E(0BeBrOzO3Us9fmI&hG4sDGk4Q+1a<>?9S}$t3=(Iotxd+ z-P!k@*(HrMv?Ps4Dsl?3CfZg-(8kbMwLxN1Qx&WQOG1<;67ei0l2+SlRSM4D-ceE; z5$&JsKQsHxGtcIE@_c`v?}EU@a{KgTefMQKGj*}Ehoe68$eG{I|FE1`zi#f#`L}-b z0=4O@pPib%`_!&4oBJlu-K*n!pY`6?5>9`8^RYS-R$Y1O%!SO+zuS*&1cx?)mo|VC z<3OJnomxF{;OZ}4S+REKzSm!~-MvQYv`V_tYRSdCt}B(z+g$Rjr{Gm^9LEU1U-A=* z+dJ#^N<`i>>vBn694q+T1)tYnz+}SdByeTcTPXMx2`{)6uM7XgO8dBdg<{q*+k;5mSP~S zkuAix42sXvDV}E;Bb-Y184+1C8?;7|D8l1`Rz98U%2lGC6`3?5`C;28;y@A)bV5w7 zmrWB|KEr8JpNS)g4PQ19o5js~E=^!a@EO73kI*!kBXg{?E|tlyH3Qj=ysnIRIRd6UkRaz{i`p9%6-77};e%l{wgo9$7 zfUZEL!E^myrWx!-Yn)r>NV%(P!9XwF)Z9^>cg%2H4pe+Z9VaS{8Gou#jc^=dS_Z9J z^ANB&F*)zPP zqLmyOGp!^Dy`I)ej7bVfz`5{&z*#Cv)i0Q}<^Q;-63a;qVVGvF#0o-#)yx{OJ?+J!`De`N2sr|&_Xrk`nYwPFj+W~982P|T76BxHj*liP|gBxjZ zGc|}z+5FhlgcX?@#jV=w!SYH=mhE?dRZDLUGDjzVK63Z!MZ`{xI`6^kSI5B78#w#T zn{qZh;H>Of;w;Y*uCSy8#2GW(DAI)v@@slpgAr0y8^y8~i}Ti*tC9Tyo524HrzJLl z8{m{fq&$RE5%CtBb(A0~3L9w4tXYXxxvnHKG9qgWITk#{EY5VmdnZCAU|?oUgczb3 zBStgUmCReQo)zm4Si2Mhh^?7aABKnY&Wf;-5|MxmW{AWPW7O$v+CrrTbg5b?A|Y!8 z-~y9_jNufm7Tl_!hl^5`tIIgoMLcFu7JMvdM;Svfa_Lm>M#eH`ZWyBo3*544S%q6? ztS)GUTH6!^kKO`-X2=5zJ+8trDFdrHU2O>EE=}bmMkJESAT%3QrXDm}I$tw=8Oaya zy>*R^cFM6%F;02_QFTR29Pg+$Zk@3M#Df2au>-^c%em2lVKEklRIZ)S^8quY5jdSA zYtD?od#IvWEV+6*!#h%?LY-oyl;0FpDg=9;s_B{qMiF*vS~nUhm0PnhpD@eyW|;7d zY6#w%hF2uQQ&RsEUs;T?-L>rTmFtR6hhO;R(eoQ(hiq?{)B~Ge|JkL_xi9xlH2!k_ z#D3fKy>HU&mS0_Y=+V^Vrhn|4bIg;E?f=q9^Tki97e6q|KUKC53mtmwi{Fp#SzW$w z?4WnY<4O7_pStqI9e@4X=>s1n6MMdr+Gv|5uWhnT9y{6j8g4tj@^?>Ezx$yT_VGVu zwp^I|-p*%_?L0X32$CTZl_I8&MbouZCEE36Oey1}-5wUKAEn!IpB_|t$di%>V8a%1Y&h69`h0DNF+jbYsFY?h9YY@U!B!Nk&GhfUhu^9 z&=U{-8wG(%Lo}FtP(UP{^)XO`5K*m##E`+45fyuOi^LVA**^dhG30dYKyc=K}?2-;VoUZ*d806DKPE;;c57?Nd-$sBObub zbXyrANLPfGj40CEGc$Quf~{VdEnv-drkYp$k}IBaDBUoZRaAi&~rS Uek}`@4>SpuSuB1>m0;Pw0L0rE*Z=?k literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..c2e2eaae --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,167 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "Wk2c0H1YU1TxyuSqt+pHdBZk2ok9a1/K" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcxTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRTjUzSmJlRlQreEpxaERkdU05am5XakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN4CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVuUmpkb3R4UlI2bnMKRnJJNkFkeU5sTkVWdzBvMTN0QUFjdkRDWmJFVDVVVUhBeHFtRXBId3NuUW94OFhiOEhuN3BqR0x1a091aFBCNgo1bTNMaU5RL21xTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnTnRTbmFGeElqNTJEWkJvMVhSUTZDaHhoaTN5bkVRL1ZpZHBDRWJWOXhUZ0NJQXk2bXgzZgp3aEF2b2p2TElpa3NmTzhSZk55K0VKK2d3UjdvajJsYjU2aWcKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "signature": "MEUCIQCjCRFotkrPzLLgFk+oAvR4Q4Eq88fqizTtecpx8uDKlAIgPPVERy3O/IWcVhgl+pKVL+VCopSWAXLTW2foE2ZRs2s=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "0+XvIL45hdCnDxC8mDiNq46pIH3Xe83G9HJNdqr/FeU=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-07-20T02:40:24.773638400Z", + "tls_cert_hash": null, + "tx_id": "3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "Wk2c0H1YU1TxyuSqt+pHdBZk2ok9a1/K" + } + } + }, + "signature": "MEUCIQCoopO1TIwMaz4GmTd7o1VEwF78pA3299GYJ0JTjJtWFwIgQv8lAhi8y3WgMgK+Cd+kba0bBRIH7Fgt45WwgMO8gJk=" + } + ] + }, + "header": { + "data_hash": "ItCDl3iSGNs8bjKOwzc+c1LRoSq8cE1SC/yz1ONYsvk=", + "number": "4", + "previous_hash": "GHCG7WNYGuh1jE5DYJDU4uW4a1MVEZXU4Pi5z0MlnX8=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..052dd630 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=Wk2c0H1YU1TxyuSqt+pHdBZk2ok9a1/K +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQCjCRFotkrPzLLgFk+oAvR4Q4Eq88fqizTtecpx8uDKlAIgPPVERy3O/IWcVhgl+pKVL+VCopSWAXLTW2foE2ZRs2s= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=0+XvIL45hdCnDxC8mDiNq46pIH3Xe83G9HJNdqr/FeU= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.is_init=False +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:40:24.773638400Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=Wk2c0H1YU1TxyuSqt+pHdBZk2ok9a1/K +.data.data[0].signature=MEUCIQCoopO1TIwMaz4GmTd7o1VEwF78pA3299GYJ0JTjJtWFwIgQv8lAhi8y3WgMgK+Cd+kba0bBRIH7Fgt45WwgMO8gJk= +.header.data_hash=ItCDl3iSGNs8bjKOwzc+c1LRoSq8cE1SC/yz1ONYsvk= +.header.number=4 +.header.previous_hash=GHCG7WNYGuh1jE5DYJDU4uW4a1MVEZXU4Pi5z0MlnX8= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 0000000000000000000000000000000000000000..32ac596f6f4e310baf536b93a0ac6a54ef07a20a GIT binary patch literal 4004 zcmeH~ZLHhW8GyODz3uIxsBJW$yG-J)6m9Aqy^izE#>BCG>^RABV#oQUFl@(h;(Rza zUv~0iVq!3$MYMEOjP8q06ipROMH6gDW1ul$-O$j4wr+)?feLhE6J-(z3C5h8dkbS| z48+g+kDb@APjp_N=RB_gJ3Hf@e_&JQW&YDIZM4FVfBSPk`pl+t8$UQfCe7`5gZHmj zU;g#`=H~0izMx$A#=fJQ!DEB0e%GDTCp|YlWWBQa(LZnd-L@THd(->F^TDC>!SVCJ z(RH9TJ3Y5y_Q1b>b#i9Yo|mrKGre`A+V9p{dbg`pl~zk{Y`~r;*WsuKO$H zu#eONWJL8>DgiAJ3WoyWie3&WeqTimm;L@IQK?k)aG8vT2_@=_Ub^19&O4(!ZG!av zVJ&!YEm)W87$nZ5z4xxYWPDJFQ$hz^lW8$~{0mH3fKAUD_6Mkom|taH$pMN}2jxg2)T2uhS8D zx-L{zuF+Ke@xGEr4r{{f|m})I_*+ENMI>q$0mQmFjR>ualW=%rv`2fv|+ND3l#G{TjjED zJ)%9#)@@`LV=EP>p?JFb3=}m+G$5+6oj5g+RL}`UjksW8-Nc=4rd!WiL8{vi_tm9b zqtTPA!E7wDkRrMfu?mA0TWT`F*2;}a z(Vzva7oE%~5L=7|m}0G|ECqCUdQpLuRmEi75hanYLcYV4qQz#94vG#N)3tOqASm%p z!z$3iK%m0{=|>Bp8YcvJSfgwp3lYH>(wTU$FY;V3%tV{%h}VJFi~Jzj&nag2(sRH^1}xlCl@S=G_T6?+&n{#f!l@cL=X%cFp)g9be3i zBXgbzF*oZ*=B7!K@SY3SG`gDRJqMh<`lQDd`1I@(Q(HHzD0Xhzw}bG$y%yXz@vLv` z*+U=d+4$JAT4>d?q7d}QRh^X=ocL0eDfe;IY~@XupbTTFS~pW^(cN=RYBY8e__%Uf zbrX1xoJyF|CUUA`(Uo%xXMzo#V|yCsG?GnWpvp+Yl(n4W%2O_qs1H6k5$dc>I4Kzt zm_c@mLGGDS+}O~KjmEBBjRDMA4n2bLiM@+5Y~*AtVH-`9$RoSW6!WesU7@SZMiom% zn}y3xjv?D8yHf}lQY&6nn?hS7g#i``n|9^nN;`>c$u8w{!}mHCIi*RA4!Yvj9Jf{Y z=#FhkX4&dFk`!un0o&n2usjqR0?OHh<@5I-)CLS)Qjr|YW@FG4_ioF z%+<FW2bMWV^0j)ml8Q(bVYqz8*OS$g`(eY^G_e{gv1z5L0mZuTyZ)42S*UwO3iEPG&YZfA1K^%wl&sni^G z$rrcX{?u3fyB;}b-ZMY*n`6%&5?*}c`K$Inz@19`@ut^7_=ZyJIe17-Q+zlq)`RIO&-A7>Th^}te%o3AQk}Bi(K}M?$w8#xs0AMr2DPtQrYE(TzsL70&Fm}6e(tPBA-lzfUq#=7Ni){kh&VCsqoM# zD6j^*!#GzaI=wsbihk9mABqrKLIm&>n)+*?l0eMp6AWkE|lP` Fe*?C`50C%= literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..ce3a80d2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,167 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "VKJFXVWf97EXb7jyVe01mkGMhWD/8dvN" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIAz8Viju6xrx2A9bUpENEVyr0MgiubblGKKl5QPj5YmKAiBhmwkqwAGZdOEwbmo+y+iLsXHUzZOLltu6eYOuSelejQ==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "4", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "4", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "j243a9vFXDqnI5qh2P/wXUnmsWzjAjHGlJ32cWGRTfI=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-07-20T02:40:27.838874Z", + "tls_cert_hash": null, + "tx_id": "cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "VKJFXVWf97EXb7jyVe01mkGMhWD/8dvN" + } + } + }, + "signature": "MEQCIGxAnl/Ect1Gm5FWXEwYhhvD0E8aQi07JJjQfjOLwQ0gAiAFzNjdpk7m9+JelrdH8UvZivYKN1tYAmABk/PijMpMhQ==" + } + ] + }, + "header": { + "data_hash": "a9gsYR/3k8oRCsZ2VWWloQPpAom+b+wRxN4k0iQugfk=", + "number": "5", + "previous_hash": "txBT6EkZ5w9vN8ecJ68cEBVso+UyTGoqTQwS6mBAhLI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json-flat.json new file mode 100644 index 00000000..0dff731e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_5.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org2MSP +.data.data[0].payload.data.actions[0].header.nonce=VKJFXVWf97EXb7jyVe01mkGMhWD/8dvN +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=CgdPcmcxTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRTjUzSmJlRlQreEpxaERkdU05am5XakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN4CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVuUmpkb3R4UlI2bnMKRnJJNkFkeU5sTkVWdzBvMTN0QUFjdkRDWmJFVDVVVUhBeHFtRXBId3NuUW94OFhiOEhuN3BqR0x1a091aFBCNgo1bTNMaU5RL21xTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnTnRTbmFGeElqNTJEWkJvMVhSUTZDaHhoaTN5bkVRL1ZpZHBDRWJWOXhUZ0NJQXk2bXgzZgp3aEF2b2p2TElpa3NmTzhSZk55K0VKK2d3UjdvajJsYjU2aWcKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCIAz8Viju6xrx2A9bUpENEVyr0MgiubblGKKl5QPj5YmKAiBhmwkqwAGZdOEwbmo+y+iLsXHUzZOLltu6eYOuSelejQ== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'80') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'220') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=j243a9vFXDqnI5qh2P/wXUnmsWzjAjHGlJ32cWGRTfI= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.is_init=False +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:40:27.838874Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.header.signature_header.nonce=VKJFXVWf97EXb7jyVe01mkGMhWD/8dvN +.data.data[0].signature=MEQCIGxAnl/Ect1Gm5FWXEwYhhvD0E8aQi07JJjQfjOLwQ0gAiAFzNjdpk7m9+JelrdH8UvZivYKN1tYAmABk/PijMpMhQ== +.header.data_hash=a9gsYR/3k8oRCsZ2VWWloQPpAom+b+wRxN4k0iQugfk= +.header.number=5 +.header.previous_hash=txBT6EkZ5w9vN8ecJ68cEBVso+UyTGoqTQwS6mBAhLI= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYCRL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIY8LFPEtSVwZDfSNy+aKKH7HIK5wVm/P0JEkYwRAIgTJKPNs+WZKdqFjGM5dzWojrKFL/xoOW9TUVGS99SiS8CIC4FXKtS2rSFtkwCJRs8rZgYM4sxIivHyo2WBYj5Rq3A +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAk= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 0000000000000000000000000000000000000000..dc56e2764558d8a3edfa7b8aff3842d13a76fbee GIT binary patch literal 34896 zcmeHw3A7_ud1iOpJlfY=M-6uSnWbqA_E=+Umr4UMsl7^4l~kpYO46K!kxHdfm82@E zN>Zsr#$$&-Fnb`7$zcggW(W*0Gmwys2?>xeIY5BKfng3|3ygye1dfHEOM22< z)cxM;=e7+*eNOl5SGu=0-S7VY{qFyNKcG%-1kV1d{Oa3&@X+sazwn#a-~WRfV%Oex zGkIC}#2v5bJ?B5)@v;}*Slm3@IsNU={BQE5Cx7R@j}(J9zw&>5;(=F{|Kf$eb64$Y zA5Hv-{rrytfBBLV;4|>=FT=n0ZGan39^c$J`JRVA{@@eNUE3Hrx~V#j(yp7P+6}yK z1H5hnfV|yQZPn(Ag}{q9Zu9?OB+c??aZ;36ip5choE-%m%i@HD<7lI(p)QM|8Y`k1 zjG{y$H%*qzR4DA`N}Wt|!nwFsWwTa|of=^hwsq?gnFAc!q0vZ*#M&HQE^`xdii()V zm*JTtyu-H}bhp=tWkz+GoKOZ@nt!H9L>YdjV>D2D)TkQmPODL5LJ??j-oTRZXgOY$ zBW{B(!Ozn}PE=ef9i(35Vi$B!Els#0!vl9$jh2b<&x68^;M z@R$dWO*x~pJjPL-2|k4n3hxwPXjMYHWr-6xmz-aLCEY$zl_&jLFYPsY-8LsyT?(CD zogv+bRF&hJXlB}t9^VH_lpk|q*rnaA+nb1Er6+ckUfJXD`E73BC064wj>fzJUF70v zR3mAC<6FPDB!h-o6k{%jq7LoRnP8KQQ;FmNsg~5RoXaKw9~?Usks-RG zqi{Hu@+Or!s-upVp_^fQSn1W(bR$+MhtzR~ud13Th)Tho1S=CmAh1ar2*S_)ESQaI zk|$P2df-epIegbU)8GB|cYgXmsGocKE8qCq=l;W&-}>;wuL}H^yH9}EeCYVe%L6a} z(DA^RU2rAZ?{{^jKGZEU@M-ttiNN=t37(j@wV02n2cNn5tLMOF{(tW|7kKy?fq#0& z_J?0T5N;&{!mXum!;PJirE06(uEhJUVimI!I&3$P6}TzWOAR+#LMscnk#yRtO}SC6 z(rz~@m{Thzj7Bs(VFbe$Hzw!pg&nDIm^Ety;0;REC^rta2VfK0OiS-S%IfG}hMEbKRz%lpO|Xhlzz!C}Hzf%4+4c6dWCv>F$f=bMHD3 zWm(^-HSqvf(v>EOpzlq1gdK|KIU1jBGOES1dBvFQ7*t?3sx+QK35S@%qDZQk&DsrooYDC<0kBo(ca@lr^&2lKwXZJIF z*frqtB7;T)8~(qEWab+Of~Pz)QPCxMglZKJrKS$kkSFmzMYRm09NqDpTi}WM)B0l$ zo)(9NXY)D)kKCjuQ*hzA{cr#RzT3z#)guE4>~#_69%9F(<{n~}oM6zlDbrkUuak?o z3x`5{L;E}_kUQ^APZkwS^WT!^-vW=lc~Gc<0woR|c0 z2Tc}-&sG#oKxl%F;RKV5hIP-HW`gBlyj5rwhFGnmvJ=@J6oX@hb*kZ9BiF5yqOp5A z2j~)cXmV;=eK(mJq9{@svSF?fkzH2KOxl`kMr1Zp(|a0L>L!XBtCg9I(df!8P%Nq4 zYO86+kxB})GZG>-YBUj}?YOC_PH!BO$o-I4``Xnfj|aZ90oG38+9_N+g^#jR7}!v{ zx@rzLzr6Bk^44x>ebx3eJ7tuqu z_2J=r+`4#_cic3)e#9qx-f$CSUhmmre(pXO_`x#*|98&(%s&3gfo^rlUz6@+ezId4 zjqz+4<)}hpK#ePDywWS}U2nUO1@l85mibv}_~XX>Z1KX|gzJTvpOuD(VScbs(BSg@ zajGV;p+rR-QCYGWr$@FHP6%qekf={bjhs5>3%!A4OW}Nd+Q8XHs^(=FEmQ^dS~*t{ zBa)n>D{YpRqFJTkl)cB0`KhOdxdKs>oe6G_^OoA_;#0bybwhPKRTmPx=V76QGQ@+t zws#~FA|#W5h_YH^T#OoUHGxI!B7==0j;Rvdu$@jinKoaI@)*+TYh9u?#VnkqhGwH5 zOh^@LKsCBiz=sFZ#wd&=212EUR$3{~i!N zU+E03dZHQgGDtKvN}8m*_ql$W5awKJZneOn^Yt}8;pl1`uhD@=#!{2;?fg#;R-x&wiq zdKH`Tauy#qc}y9b219u=T%zVoAr$2K8t5X4el*b?1k>d~FU#{BdA^0JigKvy(*{j) zz7K+Pkky1VDqMSuVFSYjm$gvsC}06w8)P${bVieAdJ)1%_i{RBh9zFWJU4}@h90U+ zWVM(u`?6`_rEo8$R1=UTqCmtz(&=`{$@W;X9396e5+Y8M3Kvomi4Y^^2+i&rZGKqR z_N7UW!u+Rwqg6MRMo!VGe6(l0Bfi4$AkG<0npkh+_fEe6g#&tbC0W2xMY1EScC1yh4op3ZU4RZ zpIor*Vth7}Fi^%++Lm2_JdoqlKHx@holgpdZ?|kMa=SXI_xfG+cE#$QdRb~o;2fIv z@p+YHuS3y3dwU#A`|Rp*7!J$tu+3pDnWFd4nWCuA6urY|iVk=?(F?qt&DU))Os_Z> z_@#4!f1Wc;v(p}78;LI>(~?9QL$j^-Fo~^oVGKrm#eIJ)7$)|x4AV-(L%Ht0=l&SQ z7U_qLEm~=KVYhwZwF3-`I>ABG<0opr*egVW(dfu>Ds-5rmBmuiXt1%^G=sBn zp*o>;bSyQ(YJ}jhL_7}{5O@a-;b@Eq#j=L03Q0$Ev-E*(`@(B~YZ>0+ zRD-jfqSGl^3CtO#MvXza+Z{^nM2SIy`LKhKky1Kks>)=X)kmGW)M>d~jpzU|L$^y2 zE?q*zusL{yEYnc{v&u5DHc?AgdqX@SOejWG3Z*z-&)8k7g7ae@Pw~+h8BFRlA7>$8 zTp;lXuX%VelNbpsJxmelUICGMwZ6=>YI(Us=EQy@($w0IKFgHpb*tRChBQ2vMPSf# zB^}BIS0)Gdv0#~2tj~Td(@Nt*nX1Q-Wm>U7`>{+bjW2Ajwpk`rYfjaa%T$UuoY)6# zy3}mS2Bl}ZXfYowRBACuW7^}WBnaNL8a(dmtGjz8|$xx%Tc**j+3W zI-FGHQn8l^(izH%GThiS2W25mdZQqhY1G3pOemIR3>P8G#H6rVsf>Y9u`^an1v^}e z<9IX1s)~J8Ik0B}oL0xMafs5pFiJ{oVqHt=9N6u7;Hip#!J^(9b?ZYFw@et_ zB-yH3>Nnx<2c94Wo;=vPUfI(?0MS;diolwcA&%59C_efHZhMS4(z&m ztJ35U-Qpmy`~CVu@4$;C!INeWxO_TtqC3NbM+^mS+WWQe^`7eV>x#PlwH$n&+rd>c zj2CRHZ#fsf->n%1?7l8;^?LendGFg7zTk6joo6w~Tmw%7uQd<< zJauAuo`1bN5cH{m)3D*SyAJMXod8eDE%323esuqCi#a#&V$6@}oF&Ky{vR6nl_xLr z@O!71pZnbYM-L1_D-bY-M$Io`XoNB{?x>j|B^Kk9 zH)=MbiA)+U?e?Y~_Ahz%REfjbMOJKXZ(=VsMa%vcFie7zh@KxdGfzbV%Y=I@ULhnB zChiI@C!ujpf9`loVIX|a%vfrD; zi_r}x5|5FE41;zWObUs}xo#=i8hS|tR4CgC((?+jpR#Gd1_7O#08W^SV^*9N#flvJO&&liFXpSo4E)LqZ)HHH5jwR ziEemFQ7zP@HfW?Yd01jQxwMC?)s-!uWq1tVz_XJE9UBC@vd4ytnj@8J?x+KX;W4F+ zSUHrf)75;j-|WEbeMsroRR=PM?NlXa8@)!U8$yIi2UGfP#bexN3yrvhF7}`#z=d=1 z&)t0>h;Tmzv9X=MTdq$LyovA(boVmYHivb1bniR6Ktq@;-xS+j65WmrsGU6+nhRfTxjL$vKonLAw(XfLT#ZR%A1;< z8DgPGgQ`ucP80+)g^3jnyY=(rvZM9tEPEJYq>EuQ!I~Yy5G>SVacGzrJWIvJI273# z{!DRD00t_*xLH5PUkv9lIN7rp)O4Z9bSH_9>t3(Wbx<9Ym}YW>r_gwdrkcJAjETeu z&rYl=zGzVKrG&Er(PcDDie&g`r|q>sk7AHU$?8{PmQ64dy^!NNh12z@5 z98^cCv5VIRI2}vm`eLk6E76r{d1?xgF%bJzyXbZiCv5GPe!KK8;|q^7aBJW!jLUq= zjtrwyfopcUcRR>~*wWn%+!A;i?6$e1+cmz^ysfgdycF!TaEK4xY2lb|{^70QYPe8z zRMQzblGj%Q@4hwg)?2|zb*MD$dTSW?wOheMSA!>6bMH00D}>~wsm<>mIEBc5e7BZe zOd&$O<`m*%)#dB0E>48%T1&&B)!6Hs&bE6mX=eYvzUdCTC6N^<2s8`pF2|uL#STHJ zi||inC{^W~)>(A*Bk@n6Z#tK%VkES&aGxn(JBKcNwF>Jl+~}njy~n&l{B39HFU+fy z@FYf*I1)$LN~D#Gm5TAc95JVE$`QTEumRPnGDgXg39bj&hT)aQXibcYg=|`{;(bl< zf@1=Am43eMYCVq8S|Wub**w-GaI7osR=t4gH82ssj_xy6kh7^`k+i=zQ35)*^Gu1I zwwTdmrzAxoUzN7A)u8O+8KD^)#B&bOMyll~bWe+|sZz*}J1*FoV?;Q|xGc+-pxQ~N zR>^b~1KkrO6vgo!FLyD;0AD%Fe~hK76d~$8J)P%?29Hd~Zb=@NV_X`S8fcLZHgiFv zlM!OgOuC|!ps3UYWLm`pJ87DwnitGLsVk!>N26UnRvXtoby;ZH>wf&o`A?~1%E`Y`Z zLc7jy|G1IDcu@OH$+nR=DH)lj$Mr%nvsx`AtYC@?k1Q)4WOA+>1ucg_%<{Nti$aDk z$YB&6WsLen?c_6^W--B(oGjHE^t`DN{0X#wD`DNc?B5nMaUT1J7VwdU6iKKS=au?X zI!)5`sgO=a$Y`Z%8M&aD%3@iKk7SZiTM<-qaUv6ogmkvv<1A95rV=v{6E&N^&l}H0H=zxoYC#07yH^_fXgXA(n&Wpw5wTA_p99t1Og|)mj3PXe7AucX0MEZ z(M?+&ibH#(3`e#aI0d!K{u%zccG29Ahgnej7kaaYigh_eT+QMe3cQ8@{}Ts4^ou^g zV3`XQefazaxOZb)r|bv`Y-^dMM;x5ImPxuuO|jJkw#P{(DRAca-G6gu{~@bvH( zjys>e zd=@NZvF|Oe%Ut-;aO*M`^C~p!G8gMI7w4_Ovd}kMm$_J%x$t)))@3d(qI}U&!Lu%N zF)uy0E_1ObJZoL%;wYsC*R{{iS0rusUj6yD>eo);N6iX^Wh&#-~8m6 z>;K?S15}teaW?<{FP^>YzUTf&?Kj?szxlyGzU5=gmLh*C(aJO zaxDMy`>9)g?n~F1Pk!k2m;I*KpznJ1GcrZPXyon$6x<Rr#~<{%wC zFaB@!aqlg^_l^f%^zK{k{nCH>gxme2lizsl!|!rG_012IUwGnd`HN@O=YH-}uYcL; z_<#NSGj4p~dkpkGd9;9naYHX{!J)Wg< z0%xe3{~(-fKJb!%e9@hiRQ&Dg9lw40#*aUA!xeLop8d$5>&HL&H!r>OOCP)E$+x{| z`in0Jp5@t7zi?;xVZHFJ57tkdZHI2YNhJU3!H4er>Yr~$f9w9hH81Zx|A)hk=39dK z2flpfO947eo_NNw7k==bn-ULNZ~AonzTdw}e@FWMd!KUmkN)HZZ~E;I6~FW5FUiV@ zvse9}58eO9#AI`$`-Q)Hp!T9WZ@#J({@^`t{_n56`*U}EZ(R8602#(lJbn26?-;jy z{|hfizyCG;fgj!X+Weo^@Bi9gzaVV>(aZkqhkyT>6K4aT{nowD3H|zWzf%9`ZU5uN zcaOev`|rQq{Nx+o`+_Ut%6}_&z~+0O2!8E};Ag;zlN+!)-xc7p<0mdVb@>?(cz6T6 zZv(t;V`qYE;Kc`~mJ)t-yGC)5S}LL$jG{y$H%*qzR4DA`N}Wt|vKm@khq;+BrEpgC zmpp22CagO}jTX6?`)8*sE;TP>PLOWGFRnaG{|4Ln--jy_J*yGDl~&^?fSX^O{r7@J2r!HnLQ{j~DVtLe6Hh*w|{r1Q8swYDk|pBngA*v?~fH4A6+( zsWRuyl;N7mSTQY*`H>f`_zC1n)j~#{iUBo4;&KqCoR{$o9#S;3mtSOjt|WY-4(-vI zV3UkfiR1t#)T?1RmrVjbICd%`Lv&%*Fidkzd6P;VW_&tchHi%KVWn4B(~Vf698$*_ zzN%`XASwlS60A%NfxsqhAPD=`)C!z=eev6Gf5T_r{qVc~{?(fOvK#XET=#cxex7ps zySD)ThyVUHA9(NAzi{;(XRdgFSMQBH`Qz{X-9LHjd!F#rTVMNZsr#$$&-Fnb`7$zcggW(W*0Gmwys2?>xeIY5BKfng3|3ygye1dfHEOM22< z)cxM;=e7+*eNOl5SGu=0-S7VY{qFyNKcG%-1kV1d{Oa3&@X+sazwn#a-~WRfV%Oex zGkIC}#2v5bJ?B5)@v;}*Slm3@IsNU={BQE5Cx7R@j}(J9zw&>5;(=F{|Kf$eb64$Y zA5Hv-{rrytfBBLV;4|>=FT=n0ZGan39^c$J`JRVA{@@eNUE3Hrx~V#j(yp7P+6}yK z1H5hnfV|yQZPn(Ag}{q9Zu9?OB+c??aZ;36ip5choE-%m%i@HD<7lI(p)QM|8Y`k1 zjG{y$H%*qzR4DA`N}Wt|!nwFsWwTa|of=^hwsq?gnFAc!q0vZ*#M&HQE^`xdii()V zm*JTtyu-H}bhp=tWkz+GoKOZ@nt!H9L>YdjV>D2D)TkQmPODL5LJ??j-oTRZXgOY$ zBW{B(!Ozn}PE=ef9i(35Vi$B!Els#0!vl9$jh2b<&x68^;M z@R$dWO*x~pJjPL-2|k4n3hxwPXjMYHWr-6xmz-aLCEY$zl_&jLFYPsY-8LsyT?(CD zogv+bRF&hJXlB}t9^VH_lpk|q*rnaA+nb1Er6+ckUfJXD`E73BC064wj>fzJUF70v zR3mAC<6FPDB!h-o6k{%jq7LoRnP8KQQ;FmNsg~5RoXaKw9~?Usks-RG zqi{Hu@+Or!s-upVp_^fQSn1W(bR$+MhtzR~ud13Th)Tho1S=CmAh1ar2*S_)ESQaI zk|$P2df-epIegbU)8GB|cYgXmsGocKE8qCq=l;W&-}>;wuL}H^yH9}EeCYVe%L6a} z(DA^RU2rAZ?{{^jKGZEU@M-ttiNN=t37(j@wV02n2cNn5tLMOF{(tW|7kKy?fq#0& z_J?0T5N;&{!mXum!;PJirE06(uEhJUVimI!I&3$P6}TzWOAR+#LMscnk#yRtO}SC6 z(rz~@m{Thzj7Bs(VFbe$Hzw!pg&nDIm^Ety;0;REC^rta2VfK0OiS-S%IfG}hMEbKRz%lpO|Xhlzz!C}Hzf%4+4c6dWCv>F$f=bMHD3 zWm(^-HSqvf(v>EOpzlq1gdK|KIU1jBGOES1dBvFQ7*t?3sx+QK35S@%qDZQk&DsrooYDC<0kBo(ca@lr^&2lKwXZJIF z*frqtB7;T)8~(qEWab+Of~Pz)QPCxMglZKJrKS$kkSFmzMYRm09NqDpTi}WM)B0l$ zo)(9NXY)D)kKCjuQ*hzA{cr#RzT3z#)guE4>~#_69%9F(<{n~}oM6zlDbrkUuak?o z3x`5{L;E}_kUQ^APZkwS^WT!^-vW=lc~Gc<0woR|c0 z2Tc}-&sG#oKxl%F;RKV5hIP-HW`gBlyj5rwhFGnmvJ=@J6oX@hb*kZ9BiF5yqOp5A z2j~)cXmV;=eK(mJq9{@svSF?fkzH2KOxl`kMr1Zp(|a0L>L!XBtCg9I(df!8P%Nq4 zYO86+kxB})GZG>-YBUj}?YOC_PH!BO$o-I4``Xnfj|aZ90oG38+9_N+g^#jR7}!v{ zx@rzLzr6Bk^44x>ebx3eJ7tuqu z_2J=r+`4#_cic3)e#9qx-f$CSUhmmre(pXO_`x#*|98&(%s&3gfo^rlUz6@+ezId4 zjqz+4<)}hpK#ePDywWS}U2nUO1@l85mibv}_~XX>Z1KX|gzJTvpOuD(VScbs(BSg@ zajGV;p+rR-QCYGWr$@FHP6%qekf={bjhs5>3%!A4OW}Nd+Q8XHs^(=FEmQ^dS~*t{ zBa)n>D{YpRqFJTkl)cB0`KhOdxdKs>oe6G_^OoA_;#0bybwhPKRTmPx=V76QGQ@+t zws#~FA|#W5h_YH^T#OoUHGxI!B7==0j;Rvdu$@jinKoaI@)*+TYh9u?#VnkqhGwH5 zOh^@LKsCBiz=sFZ#wd&=212EUR$3{~i!N zU+E03dZHQgGDtKvN}8m*_ql$W5awKJZneOn^Yt}8;pl1`uhD@=#!{2;?fg#;R-x&wiq zdKH`Tauy#qc}y9b219u=T%zVoAr$2K8t5X4el*b?1k>d~FU#{BdA^0JigKvy(*{j) zz7K+Pkky1VDqMSuVFSYjm$gvsC}06w8)P${bVieAdJ)1%_i{RBh9zFWJU4}@h90U+ zWVM(u`?6`_rEo8$R1=UTqCmtz(&=`{$@W;X9396e5+Y8M3Kvomi4Y^^2+i&rZGKqR z_N7UW!u+Rwqg6MRMo!VGe6(l0Bfi4$AkG<0npkh+_fEe6g#&tbC0W2xMY1EScC1yh4op3ZU4RZ zpIor*Vth7}Fi^%++Lm2_JdoqlKHx@holgpdZ?|kMa=SXI_xfG+cE#$QdRb~o;2fIv z@p+YHuS3y3dwU#A`|Rp*7!J$tu+3pDnWFd4nWCuA6urY|iVk=?(F?qt&DU))Os_Z> z_@#4!f1Wc;v(p}78;LI>(~?9QL$j^-Fo~^oVGKrm#eIJ)7$)|x4AV-(L%Ht0=l&SQ z7U_qLEm~=KVYhwZwF3-`I>ABG<0opr*egVW(dfu>Ds-5rmBmuiXt1%^G=sBn zp*o>;bSyQ(YJ}jhL_7}{5O@a-;b@Eq#j=L03Q0$Ev-E*(`@(B~YZ>0+ zRD-jfqSGl^3CtO#MvXza+Z{^nM2SIy`LKhKky1Kks>)=X)kmGW)M>d~jpzU|L$^y2 zE?q*zusL{yEYnc{v&u5DHc?AgdqX@SOejWG3Z*z-&)8k7g7ae@Pw~+h8BFRlA7>$8 zTp;lXuX%VelNbpsJxmelUICGMwZ6=>YI(Us=EQy@($w0IKFgHpb*tRChBQ2vMPSf# zB^}BIS0)Gdv0#~2tj~Td(@Nt*nX1Q-Wm>U7`>{+bjW2Ajwpk`rYfjaa%T$UuoY)6# zy3}mS2Bl}ZXfYowRBACuW7^}WBnaNL8a(dmtGjz8|$xx%Tc**j+3W zI-FGHQn8l^(izH%GThiS2W25mdZQqhY1G3pOemIR3>P8G#H6rVsf>Y9u`^an1v^}e z<9IX1s)~J8Ik0B}oL0xMafs5pFiJ{oVqHt=9N6u7;Hip#!J^(9b?ZYFw@et_ zB-yH3>Nnx<2c94Wo;=vPUfI(?0MS;diolwcA&%59C_efHZhMS4(z&m ztJ35U-Qpmy`~CVu@4$;C!INeWxO_TtqC3NbM+^mS+WWQe^`7eV>x#PlwH$n&+rd>c zj2CRHZ#fsf->n%1?7l8;^?LendGFg7zTk6joo6w~Tmw%7uQd<< zJauAuo`1bN5cH{m)3D*SyAJMXod8eDE%323esuqCi#a#&V$6@}oF&Ky{vR6nl_xLr z@O!71pZnbYM-L1_D-bY-M$Io`XoNB{?x>j|B^Kk9 zH)=MbiA)+U?e?Y~_Ahz%REfjbMOJKXZ(=VsMa%vcFie7zh@KxdGfzbV%Y=I@ULhnB zChiI@C!ujpf9`loVIX|a%vfrD; zi_r}x5|5FE41;zWObUs}xo#=i8hS|tR4CgC((?+jpR#Gd1_7O#08W^SV^*9N#flvJO&&liFXpSo4E)LqZ)HHH5jwR ziEemFQ7zP@HfW?Yd01jQxwMC?)s-!uWq1tVz_XJE9UBC@vd4ytnj@8J?x+KX;W4F+ zSUHrf)75;j-|WEbeMsroRR=PM?NlXa8@)!U8$yIi2UGfP#bexN3yrvhF7}`#z=d=1 z&)t0>h;Tmzv9X=MTdq$LyovA(boVmYHivb1bniR6Ktq@;-xS+j65WmrsGU6+nhRfTxjL$vKonLAw(XfLT#ZR%A1;< z8DgPGgQ`ucP80+)g^3jnyY=(rvZM9tEPEJYq>EuQ!I~Yy5G>SVacGzrJWIvJI273# z{!DRD00t_*xLH5PUkv9lIN7rp)O4Z9bSH_9>t3(Wbx<9Ym}YW>r_gwdrkcJAjETeu z&rYl=zGzVKrG&Er(PcDDie&g`r|q>sk7AHU$?8{PmQ64dy^!NNh12z@5 z98^cCv5VIRI2}vm`eLk6E76r{d1?xgF%bJzyXbZiCv5GPe!KK8;|q^7aBJW!jLUq= zjtrwyfopcUcRR>~*wWn%+!A;i?6$e1+cmz^ysfgdycF!TaEK4xY2lb|{^70QYPe8z zRMQzblGj%Q@4hwg)?2|zb*MD$dTSW?wOheMSA!>6bMH00D}>~wsm<>mIEBc5e7BZe zOd&$O<`m*%)#dB0E>48%T1&&B)!6Hs&bE6mX=eYvzUdCTC6N^<2s8`pF2|uL#STHJ zi||inC{^W~)>(A*Bk@n6Z#tK%VkES&aGxn(JBKcNwF>Jl+~}njy~n&l{B39HFU+fy z@FYf*I1)$LN~D#Gm5TAc95JVE$`QTEumRPnGDgXg39bj&hT)aQXibcYg=|`{;(bl< zf@1=Am43eMYCVq8S|Wub**w-GaI7osR=t4gH82ssj_xy6kh7^`k+i=zQ35)*^Gu1I zwwTdmrzAxoUzN7A)u8O+8KD^)#B&bOMyll~bWe+|sZz*}J1*FoV?;Q|xGc+-pxQ~N zR>^b~1KkrO6vgo!FLyD;0AD%Fe~hK76d~$8J)P%?29Hd~Zb=@NV_X`S8fcLZHgiFv zlM!OgOuC|!ps3UYWLm`pJ87DwnitGLsVk!>N26UnRvXtoby;ZH>wf&o`A?~1%E`Y`Z zLc7jy|G1IDcu@OH$+nR=DH)lj$Mr%nvsx`AtYC@?k1Q)4WOA+>1ucg_%<{Nti$aDk z$YB&6WsLen?c_6^W--B(oGjHE^t`DN{0X#wD`DNc?B5nMaUT1J7VwdU6iKKS=au?X zI!)5`sgO=a$Y`Z%8M&aD%3@iKk7SZiTM<-qaUv6ogmkvv<1A95rV=v{6E&N^&l}H0H=zxoYC#07yH^_fXgXA(n&Wpw5wTA_p99t1Og|)mj3PXe7AucX0MEZ z(M?+&ibH#(3`e#aI0d!K{u%zccG29Ahgnej7kaaYigh_eT+QMe3cQ8@{}Ts4^ou^g zV3`XQefazaxOZb)r|bv`Y-^dMM;x5ImPxuuO|jJkw#P{(DRAca-G6gu{~@bvH( zjys>e zd=@NZvF|Oe%Ut-;aO*M`^C~p!G8gMI7w4_Ovd}kMm$_J%x$t)))@3d(qI}U&!Lu%N zF)uy0E_1ObJZoL%;wYsC*R{{iS0rusUj6yD>eo);N6iX^Wh&#-~8m6 z>;K?S15}teaW?<{FP^>YzUTf&?Kj?szxlyGzU5=gmLh*C(aJO zaxDMy`>9)g?n~F1Pk!k2m;I*KpznJ1GcrZPXyon$6x<Rr#~<{%wC zFaB@!aqlg^_l^f%^zK{k{nCH>gxme2lizsl!|!rG_012IUwGnd`HN@O=YH-}uYcL; z_<#NSGj4p~dkpkGd9;9naYHX{!J)Wg< z0%xe3{~(-fKJb!%e9@hiRQ&Dg9lw40#*aUA!xeLop8d$5>&HL&H!r>OOCP)E$+x{| z`in0Jp5@t7zi?;xVZHFJ57tkdZHI2YNhJU3!H4er>Yr~$f9w9hH81Zx|A)hk=39dK z2flpfO947eo_NNw7k==bn-ULNZ~AonzTdw}e@FWMd!KUmkN)HZZ~E;I6~FW5FUiV@ zvse9}58eO9#AI`$`-Q)Hp!T9WZ@#J({@^`t{_n56`*U}EZ(R8602#(lJbn26?-;jy z{|hfizyCG;fgj!X+Weo^@Bi9gzaVV>(aZkqhkyT>6K4aT{nowD3H|zWzf%9`ZU5uN zcaOev`|rQq{Nx+o`+_Ut%6}_&z~+0O2!8E};Ag;zlN+!)-xc7p<0mdVb@>?(cz6T6 zZv(t;V`qYE;Kc`~mJ)t-yGC)5S}LL$jG{y$H%*qzR4DA`N}Wt|vKm@khq;+BrEpgC zmpp22CagO}jTX6?`)8*sE;TP>PLOWGFRnaG{|4Ln--jy_J*yGDl~&^?fSX^O{r7@J2r!HnLQ{j~DVtLe6Hh*w|{r1Q8swYDk|pBngA*v?~fH4A6+( zsWRuyl;N7mSTQY*`H>f`_zC1n)j~#{iUBo4;&KqCoR{$o9#S;3mtSOjt|WY-4(-vI zV3UkfiR1t#)T?1RmrVjbICd%`Lv&%*Fidkzd6P;VW_&tchHi%KVWn4B(~Vf698$*_ zzN%`XASwlS60A%NfxsqhAPD=`)C!z=eev6Gf5T_r{qVc~{?(fOvK#XET=#cxex7ps zySD)ThyVUHA9(NAzi{;(XRdgFSMQBH`Qz{X-9LHjd!F#rTVMN|_jnKR^^ne&}9bHFFwej8=M zcIz)^Sr(*~uO3ytd<34sJWnHkwu{zT<v%F&R0=(YWM^^!`Xbj*#@g1 z+cCkfz%TmIBJhuX8obeR{ng9LmoL9D#FtM$e)kY7|M~oELE|*!e|~=bmlxnCr`tch zsQmA<%6~umy7BKCXQoKgo`MIR6{V-Mo=s9*j?Dm z37=DcZT1SKy72@mhOX9IPqi|xVx~*|688ati2`e5jFv>SZBpP8j!>xE>`j)K=u1yY zS6-vLpErIF`Icm}wg@S}U&(v7o|bN1C=?4$E(&W4E1l!CB>U-Px%4JzJ2jiJ zSFaYT1ZNi=V&S^J1pU=p6{))Pbz&t{mtaApuwYl}oMdrANvSpOWWb40NsKKO4Og-a zL&3Cbk4tP3HfJZ(L_~TA_z$bJxNSLB_@Gg6Lpem-iZ;9$lvy&n9~8m3T^! zf9bp=2D3jS$7UKR^3GR^w7=31o`rpa)@L2S257l;ynnkQVlN{KI=)g&!gpYZ6;Zss zr&xtm4FUv(VYnX+y1v<2uMM7`9QKl|B#Sti50z-=MnVabc$p40e%T_NV|H@65jfO2 ztS5aFftC_l<YeQ+HuiNXzAZ#=5 zSZDN$FTfcYtV`d<=*3^Zm$IJ4D4UCSlo`tU5Uoda!tZwnpVQTwaKBoYu*W9y)iQ|( zL&K2Zt!IJ{bDh<^zr3MGUY08TP7=gwlv zLPHC0)P&1)-&aCzzCYwe>qx1mXNJ5prvlZ&#m+Rqs8L_dI*@MUXdEmi&SKp5YP7S$ z4bHIb4K?RB*UYtd!GeAc9-AtxSFTR~%~tmx-wTg@PEqxHcnsGSxpui#J*VJvSzg4k zU4PBaTX^cHu>PaNvmmH?j_V8_XRZ__`0m*LegJ_JRYY|^7$9&W=vx4d5-OiUvtjgb zfmm+y%l^vdU8hDpWz4d2XGcZ?RT*S}DM`4PRy|dZU9$c09WamP{?5zkwkIgmmlLZYPh>(%JEF1t7O4Zj#JhC4J(0+y$MquyDX`mh4jcUQFTKKg&K?fymp literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..8b797ddb --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,314 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lRR292aW9Sd1g0dXR2Yy9OSCtndW1vekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUd3eEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE4d0RRWURWUVFMRXdaamJHbGxiblF4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6TXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVI5VnZzd1BpanIKelZONFZudDhyZEs4eTdOUGdEZkF4eThUdzUxOHJKdnlNRXRNSDdTRVRsV0dDSHBaZGlUU3czNWsvcGF5Ry9reQp1OElkUTZBR0I3T2VvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NDdk5JTVVXT25FYmhkVjdCWUZnYU9uWmJLNDkvR1NUK1BBNjJnNEtPY2p4ekFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCV2tYU2RXZlpramg2RXJIay9uTmNjR2cvZHV2cHg2eXd3Yk5uUUZ0U1o4d0lnZnRTUQpSMzJtYTlBd3JGaVVlZlhXZlU3YjF3OW1FMy9RVlZyd1NkVi81cEk9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 0000000000000000000000000000000000000000..eb2acdcdee975f44f3ff8335286621183e31aac8 GIT binary patch literal 7789 zcmeHMd#vPC9p1gHmrGaN&4{w>Mzbtg1a3^{(V6K45KrHonRcc#o#}LphH0nMX{YV< zb{_3C{(&MUqWB1gKy(!e1SN|mY7LH5FUn&fh8gduA(8Jotb;@?sC_C zfPsJR{bSmm{?2L7xxerGedjCmgKMDI7oj~%3%eJW4!-sH(GTp~p^OHGqYVaXx8*pR z6?m~34CrhH z@Z@-0#w8s~CEFv}%ZB1OHz9pom)SzU$%bZ}jADH?B#RISdNfGXNUY1@^*R@jA*f(F zUynu-@gCn*Xvd`#|qaoF%Msm^$(>Al`b0M2v zYl9>c8*swF#|4?F3j$60`FbrRMJ`&i>C|wHD+ozy(2|;C)lR#zNJ<f2JXA|k zBbIDVWGQX78oa55WSIl;dFOzmv%3NA-NtmzmWS$APfE`UDVELeK$eP+lGzR}{$0=QNY^2Gv2Y)=y)D zQFf%P)Gcc$cGEQmT`t83D4D3`vW}((=bA(hs^sZzEy3k#XeI8f@H|Hj zd_s@bqY^Izfq^j~5J1-e2mI-@+N4inurJ^o0Di%j2`CCQFc~3IbDA7fLxh1DgpdupwSs71J*lA8tRkw>h!uhD0@fp%IoTfKX(6B(O)b|D zzLoc^ego&nJf7u~DRMbu&^*Ed1M?w~M|pjMSM%wSz|zAkk+aLFXg6Jn=`>4Hk1SSP zCDGQq`nA_Wv+O5%Vk07AyKcQ;+Z!(&K05ez^;OmO{_~xG9&*M9F8a-*vAfgIQ}-y3MQ<_x2TUC>2Eqob)4)zVJBvmH9WqP5zZ zH|-Z)NS-mAUF^Pdf9$~ix4q*2rG?YKV(cH6&1R6A&fw@}yT7#$I&XUVm3^_dE{(l$ z>G7LK&d4z}Gvb(zahzk=kgUm_dbfeNzS^%A0y^#~=z2Q5mmI^LEyrvKJSUC`|KA+b ziL)kz>&@;PMnMJx84wkAp zmr7}pFOB<+Vikijv@V9_Dy@{PT+qu!)g$G^jijlFn8yKR#w)~}SEls^b4}2mGCfnR zk<-!vVY=>NI!R#>{efvQ@?{JYY7B^ol88ts;vjKORy99r!{89OvjGHzWOYG@ys%18 zl<5XE(x_{`gvqq&CZ)-!+zEO;*z`-oehD`n7FFM#i8Ee;X2etwCPhDRhGP-5`bsUU z;#!w(PX>i%Kap-=m9j0mETxP?ED;e?oAyvO1*76}+f^YPLu-ZMGCg2Ya260A-_Q0t zB|VFUT;K6eOHBLjJ0r>p;Ly({A16c%CUF0g9PtJ=jOZqM$OHnb7B!gmGU9KYg6qr?ghV&C+GzCPjIQgz( z^RAlY$DDxr#JqEn^qXd+W-P@K0w$cNCI+~uPE$QavPMEASfFOOkt8G$h?uUft~iSw zUwsb4d>#j&lBOjl0z!pc0G&9l-?>iO{IY3V7e+Umq8|}BZZP`1}7vH zG|MWTX8?hb5dfrKquQ1_&4?N@q{sANhgVfvhufpE8)PQFukemQ4XaJmXZ6moDnOM~ z(r)E|?@>lg>olZJEvqE_oK2=+plBrG)77RY8B3d;bSRFVKmn2(@@ZDA6u%Mv`oT-;rd?TJ&c3~e{PTL~ffRz=_ zGZBUwQ#s8sEP`o8idJv&LykU`ET-+%|3(|i3&Lz~fa3!i2sH}xBeb1ZwnR{#p|Qfv z(I`f^i}W>z&$dx*h|mQC!wIICj2n}Fm|w0hBb{=mJj9wkjSVDkrMf&;*?}A{Dn+YB zR?L&>90Kde1DVk2yM87+1OROe**K>pB%hV?L06ZYgv2JAhOJ{YD_zxDz0TxK#gaNu zwWe8er|lqUBa3-?5fzmtO{8cKadd59k5eLfI^;E9xG)mCe_Mn$Md4X&JU2z*rYL+j zqA<3oT1K=l-2K;0z@3%TvkACOz`ZNLZF4ov+r8?~>`SaWHJ^xmEUJ5##Fk=<(Q#pE z%kB$fkp~mmuv7nJ=hpQu$jOGz{@9)<{^Aq*ZI4~B-fz8E{J6Js_C3}NptI|7)#{|) zQ)_DNp|QKphmJefGt=xHIM)RuC^dS+ekHT-EgAIEAG!lJHq4$Y_FlfUX6iG@N*HKJbktW@O5Ds&tl{_Ps(;!7zD*_)*8Xhw# z_IbqNF?H;i3^kD=ab9!;c$w#$kcFn*WZGI;&ed1!!n<^?TiIc;Of;oIfP3RoU+Y)wJFevP z@mk!@s&YEoA5&1mM02?=JSf;KSx=6UKtwBHM&)2Noral8k@}k|8CdCzx-{CiW3WaONXA>d&3{Exm~~G0sMPMAHCwS8%*X$ zj~{yEi+}!1RLceB{mB&inpEp>OzRaN|vHzOv)W;r1_` z4ARZdOPimUHa{<&^XH}4c093s@X;gJ-_d{I{`)V#?$xWj&+hrgeV21{kdCfHK4XmS zJAZ!fOE(?7;=yO{dBV4Tz4YR(Z{6n~e)(th8yEK0pV_Nj^QXhNef7i0PmWx==cQwB z7IrpYsoni6*Szb6BcFdGM#ss8OSimq)niw>&+PodjoXhk?z#Qu=bwN2*d-tT;lC1B zUTu>PWez{Puvh-~-+!7s_~qaiuibO-q2i&ZKPMmi?!DfNOV{80^;@3Ync@EnQgXU* literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block new file mode 100644 index 0000000000000000000000000000000000000000..e96f10ffee182292dc106e0736a14eb9a0bffe5e GIT binary patch literal 18426 zcmeHPTdeEYS?=k~oH_MedgN*8bOY^l50vUeZ4&3^R8;En-AU}kjvdEFP}#BL*oouB zcH-C)(v*i*RJ6PR;t7d|iU%rQt5zza2-J!S@s5yC;em1~2o)iUgvxTVZ)fj0`&@cv zdePond*>W``KtB(-?zT?t&JQXz4mKg{P^d}zx=h&e_ed#rT+8Z{=KpO#dm-0v+Zwa zzuro!cmLok=r@1+7V;PH=g;6zhWyH%TX%0A-M;ht|N6~;e(v~%#EFy1%=DI?eeaWI zb81>9hB?h@&9qGuuU0U-Il)>s)~wg?+SG2=@QPJ$OzbM&tW59;-fFgLEpuA6rnUA2 zJwjjot?zHY_52@y@73?zYyH(HzVw;!KR@`%U;XNPo8Lme{)Jn}*S>HI{R;f~41qk~ zk8CG$BJ_U&`q}p)$jN{Ek&FJ%dyfA4733LVI6(jM74)mGpkIFFY=5!w&u@RU_#$YQ z7hfZ3S>YL;1PZ<1iU>SU4k(fYPTvJ7PXL#fM)-E_bP`4$)|qT$TUevho=~7mxbAv3 z_xl4$qJU4V1Sw7tQqrlBB(Zeb8L2s~2=GFns?sDObR~?5P0iR&g2qZ$XiXrb{XSwR zh$_Zxc-qJiU2FK}SoE!&Rt17T96S?x#&|Zf#zbrk8@`2Ac1#XNge#5+AShHI&U(S9 zu4~m4u~>DZW9>vB>SIcw8v-Szf&%J-0za7$ZsXxLA?u%SOHGCD31Ggz7(&bhax@Zl zbPnXh6?(+zC5-{+>iyYB0e8*5=cxVtRBzCy9 zvpbU~DRX#F6rDDFeb`tyER#&w-J%zWTf|ZbLm&i}$kyyosJDSjvm|-)@08|1g$D#{ zan*W_9&|V`x40Hw)p`pRn4b`QIZY0uu4;KY&-EqFjw(i^ zL;=yk{hq?-)xN5X@^Gj5@Zu37fO_#VY$~ORaw^e9Us(CTE*^;+s`TOc-H32$hLB)y zaCN?$>I5OF97yRDp;Fin|T|{u~yG;O0`hl zd4ATEoq?gu5Ub^CiOSD=?TmEvdP){o2n{~>E5+SVGCZXWcvrN@?#^Os>(WBY_{z|Y z71c;Lb0n#38F#~L<*v!<{o%@Y|KG<2f-|rQ?iC?J20H zlqUz6itG_Vi_}$=9Dn+uAR>JTB8xl+k(uM9j+e;#w3`s6sMio#y8Ja>10cWiuObUVrZQ zqO9At?KVe`wOUm$a?-@>!|s$5lVGS;l_k<~>v&KuOR9!xq{j5uJk8R*C<&PMwBk$h zyeWzT9jBDL@9Kj?SBJIGb$|d;7AXKk9{@xO0HhEg1txrglu|wf*Y^LS`yelLbLn(|VIq}fNo%`7)90(*vO$x;Bg|<}6Q^G6j~63c zszj^Fnkh4#O_T2fuE(2vb-}NfbuLcbPkiDU3=l6P&ki|&p|^|Qjb`U>9*PNhPb}+G zOvpfJZ#bFN!`XIV*KL~?U%k#slbC|MV&teoT^c9N} z_Z1qsSfVWjI80jEK@zD5u!#358h#Qc+*S}vF8K4aZ33I_$Q*Q#Ls!-nuox+VETr^- z19&=JQM$HU89_U0Y|4*Mc3-CyzIc57>KJ0CT;~;O6j84Nm7?ill#cS zQfN~k+&z_nogmxnF4r-7Q}8Epfk0DD0Se(xPAHrw&gonrh*Ts27;Y7@%hX!!Myo`( zgzYFn#OAmsMYyhJEdq9<3@^3WIu~^9JdWzpv}bBgwdR&_ZPO~xq*b}UbfZo}l&cnF z?DQBzN}a(j#44$ogZ_aFZ~{zm8qzokOg-g_cOq971hIby7f6MN6c|HLNh(96kR1WO zXQ&f^F#-^Z6Q$k53Hk&q_B>H%B8G0yn_z2Z!C(;s4^cV0xglGiK4lqun>6VqUZb+8 zA%O6VWcPPdaRID4Brj15&Lxy;N5tl{Y>EU7hg)j68rQ;z;&$GkC(K8dsO*5TsX|7Y z@S~EmX>C)|Sd(n6(Obzi%TU>IKFXI;b&JR=JsPG9Jg$V-A?)Zjumf)yAJ>rQWygeq zFGfFte&Eh6s1)y@x8dhI@4VyaW%R|1`tIUETI3~RTrj&FO-q%BDMYNl0RsrE>iC zO63bQs?cLOh9zV#m!a0Kre~t`G32s#B9{w>qo1@O7xfrQNP6b;9%t!?rVn z9c9LtPfu0-*Z~2+J1%`~tgKpc?$(1W*r7cCKlU09~x`DvCQ<)+0Zl4G!l2|DB7cQiz6@&?{ zsa%D4kJ*#L1(g7#mkY`OGTT*Yz`0tiDwqwt(%f^Yeu4pPEDdHL#|KJj zvKq?XP_FcLGt!~6fxljrox$374L5ZS^}Z1=L}M}J)m(w7?0KytNqcAS0_PQDi*u{U zhf2M$k>tH#rxD;o#wZ99k|Li&evAZlFTz7W< za+QNJL(W`GSL6Ui(7>a?9OK%}@*Km4o7uE7b?|A8!z#2jnRTgTPzL^Hj#FdNEU#%2 z;jpRLxBO_gW6EK~)XG*rEDemZw(JTjCH!Mwr_IxE=r}!U%|85XhSiVnX41I&R z8^m4YKkO;+AHT*x=#^Z48b{>{-c%d&RVLi<-@_fP2cXfre`@5>_)pkOxC~A_Ou93? zPAh)L&V-;`Tk86t5tdp^WfO+&64y&p44K9hz8r1sNR~R{K&t?->GdhNN7K&KWtHBgU_&)ncw(UiMb)9P>`SQ_oih-7O1hB3}UlGia=t?YK>jgR8Sxll*DVVzCMsA57Cw zp$lIxKTPwS`+b!iM*;KHSf!!wi}c_m)0;F*x!FV%lzA#raMp-&cknaSifwQvOUR4J z#96E0BxqkQua0}^i9m$=HVC{yrI^xs^M((P zP9OwPF8M-#wQU&^Uv7-$4b!EEb#@cEm4@Wh2MsgdSUqPe4uZ83DV4sNTO@C_jI6`C zWgRh%QEx0)6|KjPXFRK5-H8>CvVC^qQKA!YD)7R9_)>P_QKA!w*-Cl?%FyB+8EyNa zGhdK7J8&0eGisSqL(DRw+?XU}Npvr(&wX?PDY6sRc8K|&*e0sckRvwLc!Xk-+CGcR?9B5t2NUEUi_kp^U>dV=XX5tgLfuQ^6Z+X*>nvX)DX>qj1PYRnWX< z-uU=W9*VGTF{@&;7ZB#{`r~;Lnhm>_bzoj((_GT&<>yL&iV(J+A$pn!8wg-;&(P#f zV08>mHfxQFAmfK=3+Osggh3c=b!E+oEu1T#Tyai>OH(gzHuDlvu@u{72XUR4C0(4* z)><~}N_o=muREMFXn-2CSW9A_jUz7Wg<^dv5|i!H=a@{3{CaOGl}n;%APc;)!WxTp zsXbZ;-RpxE1&v?MSs)jK7Ec0}B0sVZ8l43#Izg54+dPrP4ouLSujY|$J^~$Iqn8LJ;Jv2or24Gb0U-{jYgT1dz2fk{F#`H9y4h1 zPY(sqr~uHkc@7|PGhbq}?IKzAh)yz%23lzVQ!|$`RjCaVJWn@h@kkVvA97`I21;R; za*Q12C!d_AkUe+#1oosfg$5gFL#LfQASN_lu~`$ z88&i!(pnF7Qj+S`X;~CHuGCU7$>@nSthKDq$SOr|ymp?dEhJI0g}B!BJPP!MmBm`>i5OP>EAD!;5#^v`EfhmXa^F^nvOj|XjQT*h3$f#-JsYeCNu`vidoOr!fwaXaQdRuKL~l>O`WwgS4-S6Me&;_vR7|TylK-OLBM$LgRcJq1&b)w7cw@mv z_>~0;Z_8+uzm)HKpx<+);g6f&b7h|AL4MDbhL7a;U~y^P%*36u8U}-E3BxvFJZ3AD zF_Kj~6U8>Yw)k2t?~pvq=kHh#Y!$2GR4IXI)ca7*lXFleL5(Wcx_;_N&Dc%5>_bKL zsfPaH{hleY>`oYyf(uxzUYGIg#Z-4mQE>F#Ft2lEu1@J*V6N-Vm9!02j9`)dT7iKO zRtY8;*kf*!h~!jLc(OHLm8v~!EMs$8bKCf&Mo0a24-R4bA`6BUJDEi0c8hd+rHvd` z6{(CfV$yCH7SmGtT*n!&xzVSL&5QdC?3XhHEa;^rnRxwqs1aoW(}3Y zOZ`fW(^a+IS~`>6w(D)?rZS(Vf!Xs?b((xw2gUke<(z0OqRa!$*|S)`Ns> zNIQmeCIhuDnw@A7j!AJVk}VOd(WR!xigg|WCPm=NGSSV*VW+W?cs6NK?O=c_fw9uK zsnOTwbWdJcRok7t^`1{BSm?smz^yFh@tzir+vQ&AN^y8wJfADL*l`c`e6BQpBoMug zp3fBqqOb9Mt~7oyU7dSAz_oLym2%@D2@Csr#;Ufh`Ha_DfMLHh7#lTcDn?sOk)$kN z)HInMn>gtqU`R4+OZW4bSWm&CJcv|NT=-i(q3RMiEbY8*dgAGMJ^@(D?s}D&oZ8HR z-zDvI4k1KMv$8CYqP600#1$5{db7!WF64cl4@h>prVfKfiR~~U#tGZyay^pTbhar8 z9m}lL2x&Od2vUZg57#0LbwnVW;e6|;1Gv1kPLcx+_)*v1#s0DxuL$7J;ZoJ%`Z~|& z9}3Us-)|!~!tlq#^SJ_`8)3Ll&z_j8$dmBg#i@-SsW3eAeg5qRa6c}-&kf+N{i6jx z;edO5@29Xyp2Yhpj(a@s=kgH`_kJ!Oaq9gXeG+-^$pTU`a`us=LAdZH8T7YagrTE5 zr+(Mb`^qQn$|rw6rF^oW^+7w1KYDsB`Z{_C>V#*}cftjy4{CnzK|78)mI~-?)X` zJ$V#h+mRE;aCz(km5}$p*%H@}wsKy1v$nvG_)X^tz_xZ1Me zBly){``-GS&;R~+U;Xxj=HGn!E58!`_fLK1=fC#B#y8o%B(BiAqmaP!q^gi4KK4C4;|bj3WxTUy@v6up zxWM%5OJ+T4k)u$}NKfZGk---MLW8!MUC>=fz^5!;QE6f#ki(&{p$l9lJaGs{Qpl+| zvDjH?Rog35qc==|tNU}dLJh$=pI{+7WL7#lD|8gwunIofH;5FPZRJKmuZ+=TVvUHz z7}Ns`MK&CToBK9`LZjjY>V|LHFykh+C@9lRr0|VEc^mMUY1?DLG!qKGetHbj0-_M4 zBqJrA8cGsNXYHX{(24-A+4iH6gwT;tCNVW*ZHM)RuF#r5Nc)ey5kyEunH5hPxvtd% zb0h{L?>kQf34H#!FsRR5mPu`PGwX)p+EQp+AfjCx2)sc>N9om@HzdGd0!!pe zb|BPRxJR=jdGb7?IUM0}h#<3OCe$buWjF^LuE8k&ZO;k zPb>o5*?tS$K&7`|D@1r+On5XyNH&FUZOQLu2PNZZoBqZa! zXRQZl;EOGy5)U|HRY~S9C8U#9BWX`W9Tf>|y6|R{Q4kTyGwIw~lUOF0SAWXa^Tsq%K3~_z$i{Sf>C8bJ#No^EbWGG>y!*=n9T8+K_TE*NPZUPqQq;69KFrqB+6TBT( zsGt>gePWI%qD16blW+sSJlbgPpgvz{^N3WDuxaac+$R{Q5@4;?q?~j@o*ts>+D5_T zqG1bVyIwDIa+mVrMKBT5q4()eUjZ26W$4)fhokV_?caK%{V&%7Xt)K?xbYA`;%Yia zC+k_d=o0O89QUMb|xGNygn}P@;08ibJ zrp5w+u+WwW0ZnNRy8%@F@lwHlb9>XW~-Vi#XJ0R-T}x`N&|i>eyvSG&HZJD(IA}Zc0@U zcfwVv($~pgU2m~Gs;tJT7*%>`R@Gw{pB6>m7n}Yl*7%arJ1?5RHQ;w#wWTUPynd7lbB~S15E7cAYxKHc+A7M;FX;vJ^HOmL_?s7Hb=WhKP|~VV2zhK}dn<1=w11 zl7X{UGb6=UBda`WOwlWlXZ-z3_wK;|b{D!8g}0*cRuujKMIn6Gp84)PJ^J=7*luTF zw==LG=nM>gcHz45(OujL{dsa+fli*mKLh_H;JXjQ_u#wW@tJ$?IeH0x;b4ty{hpI9 zHRuI;?nH6oh5)qiPs2YB+JERwzZc;59r_)5A<*-(YdUV6JV6gF_S47j@!<5Md~fgf zpj(sYJFg%8=850)#bfxFj^Xd`{hr;)f4){stHA}oM;u^Vl)b5s6a#T^IGRBB$t8Q3K zQ|WPSceLc1*_Bh+n|MAVycp{!f^)hy0l?9*Y2w|(QL=FXhe!@k!*@+l`b`W zR;=*=Fd3wXnCRu?pj}@{JexMDR@lds&{$~P*yw3fx+^cNisMaw@SaaQoaw^az^pvu zv91=4TIFu(QgO)M4$tQj`)s&Jdp?&MKNeNJjh@dX2BNRgjntAwHMA+8YA@EYeMU;LfeQ-$YoRT}ymNXJR+-ezrErO}w9NzbEs4 zF7~+I`#Ia=)cZO54D>;AV$SF8jEr3~^`m(|n)!AP{H+)7y%)ZB>USM|sC?3{+>3!N z<;LZ`zxCizCyqaH+82Huz6W%|v+y(Ud!Bq8_?L;TJ+^yI_uVCbid8vQ;Tb26|Fl{(Q%qLFlfZY z3Bt~CLsu0B8{1U8DQI#KcT~&Qd9EjM4$!!<5{E<^3%UwlRC=m1ETYX`=Yy!(^*N-g z)^?%C$suj3vD2-vAd=HH+)_1?H-3;eWVdf96Ub_MTB`EXZYw8U{gOj^SlbmXva_++ z>asM`avm9YiJ}_WY6_*un(Ur-Wx2OsYLR?0W;kMOtdG>Q8x}kOP!T5X*4D5 zMK;R0%o*dAjPm6WRj<(b$Dg|vMC8`^waAAcG7F5n9i&XqA~-+H57U7r^w0WYN}+IYf(enw#?T8B@yVjeN-Yy=l;m^G?fgS{yyn zsujT~NE53KI%7^u!+}~+=1|+KVPUx}sT!)08q-_yG)s5mG-O(1B#`83<7$^_o8xdU zMvKlSi>|u=x3@oZ)%|}+7Igw|-jyrU94)6_pPnOpd1TJrHg1>@GB0T@FKh&SrBgO& z64*@UxT}d{KM6*&AtoX5!d^0EroC$LJ)GgpVURM;+_N`V|LVsYZGLPO^xrMSyv z$Oe!IB2aYJqiFC*nBdr!Sc+}%_4Js)W*f4=+rY=)W_5K1pA8j37BYIz0X&^8C|v`o zI*_il!r4TS^^DoS1CGurimuf>dEN#!F%%ad-?SEFDWkV}Hc9HxS$Z+-Y6^t6<4q7E zl21cKTmFR3gnKhh!4<-@Pbi!x9@4o$5Sd8g_+YJw9j4lB)te={DXfPnBsNA}DaLd) zZxY}(%CS<5t#M(;DU!G*jk~7iR;peZ(^k#$L|T-4b1!bEM7d%y#zs$2sMPLnA{5EY z0`G0F2Pa_!KE`N}-y(5S-zN%XWJVCXYj7sp%7Z9w0>V*}$`Bby>EhVg>>eZF!gipn zv%RP?(j!2z=ZP8ejakN7rww|JRjE9#3wU%0`|jQi z;^Cm`ki10AIFC>&Z4sSL@-Y-L9A>G}VpNS{ire`8t}q>1qO!q_RRyGtY<^gBSIu=s z8cUL`*1HS2Y8fg!Du%^es;nV-p~r)4h9yXJRd(;7e`^Qf_yB$l2*;l|vsii`e)+7t zJEOI$4_8b-4u1r6J37lURcOO9a z+|+hrbDYAz@c{b2m!Jbb(nia?VXKdOwoRdrBXXq9=9 zH4{1Cq!uW@?Ldt*N(dp|3UYOg8!{^QJ1t))7oL=t))bl9i{2#jLV@$fGDBjW9uZO` zF;mXhEofUR2ot}eaBcSxBR;kgDEnht))^k53gD2y+zz3=BKxad#Ds{5%=^Ecb5MuPtJd% zt)TY~P7x6FJUc`k8Cij;_gX~#mSor3mzRxy)CD~=ed>Z9$=L1AEnub58yReUlV^4~ z%rEa`J8uj@Z?;2?;7f!aF-(t`>jQ$DtfH||&c;isn8>~uj`R@ho~)2jn#_18D}0aY zr6`V$r2Ygiu)b2V7X#TJ$VhiHAzeD}2g^m-?Jon*@G{R(&uygvXx#3l(Y)=>h3$m5 zElIl_duKRrJGFSYVJ!eceJlLsonEIQJOGTbB}mYj&!nk9cJMb7?vK*#kU;LXMLM)3 z`2tCjX9UEheMp`+d3bS^y)uIiCZ;EHI7QI7PvcXRYck!*+Of&5UvvZ z$Jg`UE#jWq6#5o%w}?B-f9O--KYoegkzexoaT1pitfAJYi(EJtQh7HRT5li!U0P3m z9R3qlHkX6_&vs{m)o3MXJGl^+t8-oN*P~LCK~_=JDskN`L!og(Ve{eIiDjuR_B8~@ zSM9*uxYJ&H>I~|fnsk`)GR%vh^drcBmok~>`0vD-coY7^`{XLZ1~k`2b9GU$Et)k8 zsnw{^=tz%(ZfV}^5FJmfv>O@kL3+1FwX2n~&zqqT(F#*2+)}O^M4whGHHDiiF*k_% zd_$T(ZT`DO+*UN+#6o@q|J@?)U=`m)asFr_4u+xU>If1h_n}wsy!PD3fl~{e8mPy| z2iy5o_+^lN050r4;&A_&Lz@TC`-xd(Plx8rcXn|Ju$AW}&=_ptIWdwCZI2%s(uX!D zdwR~cIrX0pZ7z&+u$w;teR%iUlnIieW-{^T-XM)vcDjmP_&(T%^nLL2{?nl!+gSb> zbpK>DeC9=92hk*i;cf6^zk~iT-WzwI`zN^z+;L(zNq}2DgC*$0Z)PZes)^K*!>My~ c?enM3$&lTtM@B>*>l=F7SN$IJp8dc72PigZ8UO$Q literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.json new file mode 100644 index 00000000..e31576aa --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer0.genesis.block_updated.json @@ -0,0 +1,743 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQUlxMkFvaStnSWZzci8wODZVNWtweU13Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQk11Y0h5UUgvY0toODRFVGpKZHlNbS8zbllZUDVvKzdGMHVvbzkrSEx3dzIKZnNEOG5WdmRyUlFKTlBXMEFBdUpqYXhla09Ka2RTNUhVc0tGZnFteXpqK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUI0RnJGRTlrNkF2YXltUGxzQWlVSGQ2dUM3QTRmR0ZkdnQ2RW44M0R5cjUKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBUEN1bzhTRUhMMnlVcHpHOUVHYXpROTYxRTJYWW9qTCtuN0tCS2dOMUo2d0lnCllMNERKMzEvaUlhbU1vRVRGelRIcVI1WkJQRVUxNFRIblRySFNvUEk2UWs9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-19T21:26:48Z", + "tls_cert_hash": null, + "tx_id": "a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "jPl2ywer8xjoKjfKPayGb/EfQF26FTbL" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "XqU6ii88vY3BThMNTwfhllhZpQ+9hznHV303dDEQnrk=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer1.genesis.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/orderer1.genesis.block new file mode 100644 index 0000000000000000000000000000000000000000..e96f10ffee182292dc106e0736a14eb9a0bffe5e GIT binary patch literal 18426 zcmeHPTdeEYS?=k~oH_MedgN*8bOY^l50vUeZ4&3^R8;En-AU}kjvdEFP}#BL*oouB zcH-C)(v*i*RJ6PR;t7d|iU%rQt5zza2-J!S@s5yC;em1~2o)iUgvxTVZ)fj0`&@cv zdePond*>W``KtB(-?zT?t&JQXz4mKg{P^d}zx=h&e_ed#rT+8Z{=KpO#dm-0v+Zwa zzuro!cmLok=r@1+7V;PH=g;6zhWyH%TX%0A-M;ht|N6~;e(v~%#EFy1%=DI?eeaWI zb81>9hB?h@&9qGuuU0U-Il)>s)~wg?+SG2=@QPJ$OzbM&tW59;-fFgLEpuA6rnUA2 zJwjjot?zHY_52@y@73?zYyH(HzVw;!KR@`%U;XNPo8Lme{)Jn}*S>HI{R;f~41qk~ zk8CG$BJ_U&`q}p)$jN{Ek&FJ%dyfA4733LVI6(jM74)mGpkIFFY=5!w&u@RU_#$YQ z7hfZ3S>YL;1PZ<1iU>SU4k(fYPTvJ7PXL#fM)-E_bP`4$)|qT$TUevho=~7mxbAv3 z_xl4$qJU4V1Sw7tQqrlBB(Zeb8L2s~2=GFns?sDObR~?5P0iR&g2qZ$XiXrb{XSwR zh$_Zxc-qJiU2FK}SoE!&Rt17T96S?x#&|Zf#zbrk8@`2Ac1#XNge#5+AShHI&U(S9 zu4~m4u~>DZW9>vB>SIcw8v-Szf&%J-0za7$ZsXxLA?u%SOHGCD31Ggz7(&bhax@Zl zbPnXh6?(+zC5-{+>iyYB0e8*5=cxVtRBzCy9 zvpbU~DRX#F6rDDFeb`tyER#&w-J%zWTf|ZbLm&i}$kyyosJDSjvm|-)@08|1g$D#{ zan*W_9&|V`x40Hw)p`pRn4b`QIZY0uu4;KY&-EqFjw(i^ zL;=yk{hq?-)xN5X@^Gj5@Zu37fO_#VY$~ORaw^e9Us(CTE*^;+s`TOc-H32$hLB)y zaCN?$>I5OF97yRDp;Fin|T|{u~yG;O0`hl zd4ATEoq?gu5Ub^CiOSD=?TmEvdP){o2n{~>E5+SVGCZXWcvrN@?#^Os>(WBY_{z|Y z71c;Lb0n#38F#~L<*v!<{o%@Y|KG<2f-|rQ?iC?J20H zlqUz6itG_Vi_}$=9Dn+uAR>JTB8xl+k(uM9j+e;#w3`s6sMio#y8Ja>10cWiuObUVrZQ zqO9At?KVe`wOUm$a?-@>!|s$5lVGS;l_k<~>v&KuOR9!xq{j5uJk8R*C<&PMwBk$h zyeWzT9jBDL@9Kj?SBJIGb$|d;7AXKk9{@xO0HhEg1txrglu|wf*Y^LS`yelLbLn(|VIq}fNo%`7)90(*vO$x;Bg|<}6Q^G6j~63c zszj^Fnkh4#O_T2fuE(2vb-}NfbuLcbPkiDU3=l6P&ki|&p|^|Qjb`U>9*PNhPb}+G zOvpfJZ#bFN!`XIV*KL~?U%k#slbC|MV&teoT^c9N} z_Z1qsSfVWjI80jEK@zD5u!#358h#Qc+*S}vF8K4aZ33I_$Q*Q#Ls!-nuox+VETr^- z19&=JQM$HU89_U0Y|4*Mc3-CyzIc57>KJ0CT;~;O6j84Nm7?ill#cS zQfN~k+&z_nogmxnF4r-7Q}8Epfk0DD0Se(xPAHrw&gonrh*Ts27;Y7@%hX!!Myo`( zgzYFn#OAmsMYyhJEdq9<3@^3WIu~^9JdWzpv}bBgwdR&_ZPO~xq*b}UbfZo}l&cnF z?DQBzN}a(j#44$ogZ_aFZ~{zm8qzokOg-g_cOq971hIby7f6MN6c|HLNh(96kR1WO zXQ&f^F#-^Z6Q$k53Hk&q_B>H%B8G0yn_z2Z!C(;s4^cV0xglGiK4lqun>6VqUZb+8 zA%O6VWcPPdaRID4Brj15&Lxy;N5tl{Y>EU7hg)j68rQ;z;&$GkC(K8dsO*5TsX|7Y z@S~EmX>C)|Sd(n6(Obzi%TU>IKFXI;b&JR=JsPG9Jg$V-A?)Zjumf)yAJ>rQWygeq zFGfFte&Eh6s1)y@x8dhI@4VyaW%R|1`tIUETI3~RTrj&FO-q%BDMYNl0RsrE>iC zO63bQs?cLOh9zV#m!a0Kre~t`G32s#B9{w>qo1@O7xfrQNP6b;9%t!?rVn z9c9LtPfu0-*Z~2+J1%`~tgKpc?$(1W*r7cCKlU09~x`DvCQ<)+0Zl4G!l2|DB7cQiz6@&?{ zsa%D4kJ*#L1(g7#mkY`OGTT*Yz`0tiDwqwt(%f^Yeu4pPEDdHL#|KJj zvKq?XP_FcLGt!~6fxljrox$374L5ZS^}Z1=L}M}J)m(w7?0KytNqcAS0_PQDi*u{U zhf2M$k>tH#rxD;o#wZ99k|Li&evAZlFTz7W< za+QNJL(W`GSL6Ui(7>a?9OK%}@*Km4o7uE7b?|A8!z#2jnRTgTPzL^Hj#FdNEU#%2 z;jpRLxBO_gW6EK~)XG*rEDemZw(JTjCH!Mwr_IxE=r}!U%|85XhSiVnX41I&R z8^m4YKkO;+AHT*x=#^Z48b{>{-c%d&RVLi<-@_fP2cXfre`@5>_)pkOxC~A_Ou93? zPAh)L&V-;`Tk86t5tdp^WfO+&64y&p44K9hz8r1sNR~R{K&t?->GdhNN7K&KWtHBgU_&)ncw(UiMb)9P>`SQ_oih-7O1hB3}UlGia=t?YK>jgR8Sxll*DVVzCMsA57Cw zp$lIxKTPwS`+b!iM*;KHSf!!wi}c_m)0;F*x!FV%lzA#raMp-&cknaSifwQvOUR4J z#96E0BxqkQua0}^i9m$=HVC{yrI^xs^M((P zP9OwPF8M-#wQU&^Uv7-$4b!EEb#@cEm4@Wh2MsgdSUqPe4uZ83DV4sNTO@C_jI6`C zWgRh%QEx0)6|KjPXFRK5-H8>CvVC^qQKA!YD)7R9_)>P_QKA!w*-Cl?%FyB+8EyNa zGhdK7J8&0eGisSqL(DRw+?XU}Npvr(&wX?PDY6sRc8K|&*e0sckRvwLc!Xk-+CGcR?9B5t2NUEUi_kp^U>dV=XX5tgLfuQ^6Z+X*>nvX)DX>qj1PYRnWX< z-uU=W9*VGTF{@&;7ZB#{`r~;Lnhm>_bzoj((_GT&<>yL&iV(J+A$pn!8wg-;&(P#f zV08>mHfxQFAmfK=3+Osggh3c=b!E+oEu1T#Tyai>OH(gzHuDlvu@u{72XUR4C0(4* z)><~}N_o=muREMFXn-2CSW9A_jUz7Wg<^dv5|i!H=a@{3{CaOGl}n;%APc;)!WxTp zsXbZ;-RpxE1&v?MSs)jK7Ec0}B0sVZ8l43#Izg54+dPrP4ouLSujY|$J^~$Iqn8LJ;Jv2or24Gb0U-{jYgT1dz2fk{F#`H9y4h1 zPY(sqr~uHkc@7|PGhbq}?IKzAh)yz%23lzVQ!|$`RjCaVJWn@h@kkVvA97`I21;R; za*Q12C!d_AkUe+#1oosfg$5gFL#LfQASN_lu~`$ z88&i!(pnF7Qj+S`X;~CHuGCU7$>@nSthKDq$SOr|ymp?dEhJI0g}B!BJPP!MmBm`>i5OP>EAD!;5#^v`EfhmXa^F^nvOj|XjQT*h3$f#-JsYeCNu`vidoOr!fwaXaQdRuKL~l>O`WwgS4-S6Me&;_vR7|TylK-OLBM$LgRcJq1&b)w7cw@mv z_>~0;Z_8+uzm)HKpx<+);g6f&b7h|AL4MDbhL7a;U~y^P%*36u8U}-E3BxvFJZ3AD zF_Kj~6U8>Yw)k2t?~pvq=kHh#Y!$2GR4IXI)ca7*lXFleL5(Wcx_;_N&Dc%5>_bKL zsfPaH{hleY>`oYyf(uxzUYGIg#Z-4mQE>F#Ft2lEu1@J*V6N-Vm9!02j9`)dT7iKO zRtY8;*kf*!h~!jLc(OHLm8v~!EMs$8bKCf&Mo0a24-R4bA`6BUJDEi0c8hd+rHvd` z6{(CfV$yCH7SmGtT*n!&xzVSL&5QdC?3XhHEa;^rnRxwqs1aoW(}3Y zOZ`fW(^a+IS~`>6w(D)?rZS(Vf!Xs?b((xw2gUke<(z0OqRa!$*|S)`Ns> zNIQmeCIhuDnw@A7j!AJVk}VOd(WR!xigg|WCPm=NGSSV*VW+W?cs6NK?O=c_fw9uK zsnOTwbWdJcRok7t^`1{BSm?smz^yFh@tzir+vQ&AN^y8wJfADL*l`c`e6BQpBoMug zp3fBqqOb9Mt~7oyU7dSAz_oLym2%@D2@Csr#;Ufh`Ha_DfMLHh7#lTcDn?sOk)$kN z)HInMn>gtqU`R4+OZW4bSWm&CJcv|NT=-i(q3RMiEbY8*dgAGMJ^@(D?s}D&oZ8HR z-zDvI4k1KMv$8CYqP600#1$5{db7!WF64cl4@h>prVfKfiR~~U#tGZyay^pTbhar8 z9m}lL2x&Od2vUZg57#0LbwnVW;e6|;1Gv1kPLcx+_)*v1#s0DxuL$7J;ZoJ%`Z~|& z9}3Us-)|!~!tlq#^SJ_`8)3Ll&z_j8$dmBg#i@-SsW3eAeg5qRa6c}-&kf+N{i6jx z;edO5@29Xyp2Yhpj(a@s=kgH`_kJ!Oaq9gXeG+-^$pTU`a`us=LAdZH8T7YagrTE5 zr+(Mb`^qQn$|rw6rF^oW^+7w1KYDsB`Z{_C>V#*}cftjy4{CnzK|78)mI~-?)X` zJ$V#h+mRE;aCz(km5}$p*%H@}wW``KtB(-?zT?t&JQXz4mKg{P^d}zx=h&e_ed#rT+8Z{=KpO#dm-0v+Zwa zzuro!cmLok=r@1+7V;PH=g;6zhWyH%TX%0A-M;ht|N6~;e(v~%#EFy1%=DI?eeaWI zb81>9hB?h@&9qGuuU0U-Il)>s)~wg?+SG2=@QPJ$OzbM&tW59;-fFgLEpuA6rnUA2 zJwjjot?zHY_52@y@73?zYyH(HzVw;!KR@`%U;XNPo8Lme{)Jn}*S>HI{R;f~41qk~ zk8CG$BJ_U&`q}p)$jN{Ek&FJ%dyfA4733LVI6(jM74)mGpkIFFY=5!w&u@RU_#$YQ z7hfZ3S>YL;1PZ<1iU>SU4k(fYPTvJ7PXL#fM)-E_bP`4$)|qT$TUevho=~7mxbAv3 z_xl4$qJU4V1Sw7tQqrlBB(Zeb8L2s~2=GFns?sDObR~?5P0iR&g2qZ$XiXrb{XSwR zh$_Zxc-qJiU2FK}SoE!&Rt17T96S?x#&|Zf#zbrk8@`2Ac1#XNge#5+AShHI&U(S9 zu4~m4u~>DZW9>vB>SIcw8v-Szf&%J-0za7$ZsXxLA?u%SOHGCD31Ggz7(&bhax@Zl zbPnXh6?(+zC5-{+>iyYB0e8*5=cxVtRBzCy9 zvpbU~DRX#F6rDDFeb`tyER#&w-J%zWTf|ZbLm&i}$kyyosJDSjvm|-)@08|1g$D#{ zan*W_9&|V`x40Hw)p`pRn4b`QIZY0uu4;KY&-EqFjw(i^ zL;=yk{hq?-)xN5X@^Gj5@Zu37fO_#VY$~ORaw^e9Us(CTE*^;+s`TOc-H32$hLB)y zaCN?$>I5OF97yRDp;Fin|T|{u~yG;O0`hl zd4ATEoq?gu5Ub^CiOSD=?TmEvdP){o2n{~>E5+SVGCZXWcvrN@?#^Os>(WBY_{z|Y z71c;Lb0n#38F#~L<*v!<{o%@Y|KG<2f-|rQ?iC?J20H zlqUz6itG_Vi_}$=9Dn+uAR>JTB8xl+k(uM9j+e;#w3`s6sMio#y8Ja>10cWiuObUVrZQ zqO9At?KVe`wOUm$a?-@>!|s$5lVGS;l_k<~>v&KuOR9!xq{j5uJk8R*C<&PMwBk$h zyeWzT9jBDL@9Kj?SBJIGb$|d;7AXKk9{@xO0HhEg1txrglu|wf*Y^LS`yelLbLn(|VIq}fNo%`7)90(*vO$x;Bg|<}6Q^G6j~63c zszj^Fnkh4#O_T2fuE(2vb-}NfbuLcbPkiDU3=l6P&ki|&p|^|Qjb`U>9*PNhPb}+G zOvpfJZ#bFN!`XIV*KL~?U%k#slbC|MV&teoT^c9N} z_Z1qsSfVWjI80jEK@zD5u!#358h#Qc+*S}vF8K4aZ33I_$Q*Q#Ls!-nuox+VETr^- z19&=JQM$HU89_U0Y|4*Mc3-CyzIc57>KJ0CT;~;O6j84Nm7?ill#cS zQfN~k+&z_nogmxnF4r-7Q}8Epfk0DD0Se(xPAHrw&gonrh*Ts27;Y7@%hX!!Myo`( zgzYFn#OAmsMYyhJEdq9<3@^3WIu~^9JdWzpv}bBgwdR&_ZPO~xq*b}UbfZo}l&cnF z?DQBzN}a(j#44$ogZ_aFZ~{zm8qzokOg-g_cOq971hIby7f6MN6c|HLNh(96kR1WO zXQ&f^F#-^Z6Q$k53Hk&q_B>H%B8G0yn_z2Z!C(;s4^cV0xglGiK4lqun>6VqUZb+8 zA%O6VWcPPdaRID4Brj15&Lxy;N5tl{Y>EU7hg)j68rQ;z;&$GkC(K8dsO*5TsX|7Y z@S~EmX>C)|Sd(n6(Obzi%TU>IKFXI;b&JR=JsPG9Jg$V-A?)Zjumf)yAJ>rQWygeq zFGfFte&Eh6s1)y@x8dhI@4VyaW%R|1`tIUETI3~RTrj&FO-q%BDMYNl0RsrE>iC zO63bQs?cLOh9zV#m!a0Kre~t`G32s#B9{w>qo1@O7xfrQNP6b;9%t!?rVn z9c9LtPfu0-*Z~2+J1%`~tgKpc?$(1W*r7cCKlU09~x`DvCQ<)+0Zl4G!l2|DB7cQiz6@&?{ zsa%D4kJ*#L1(g7#mkY`OGTT*Yz`0tiDwqwt(%f^Yeu4pPEDdHL#|KJj zvKq?XP_FcLGt!~6fxljrox$374L5ZS^}Z1=L}M}J)m(w7?0KytNqcAS0_PQDi*u{U zhf2M$k>tH#rxD;o#wZ99k|Li&evAZlFTz7W< za+QNJL(W`GSL6Ui(7>a?9OK%}@*Km4o7uE7b?|A8!z#2jnRTgTPzL^Hj#FdNEU#%2 z;jpRLxBO_gW6EK~)XG*rEDemZw(JTjCH!Mwr_IxE=r}!U%|85XhSiVnX41I&R z8^m4YKkO;+AHT*x=#^Z48b{>{-c%d&RVLi<-@_fP2cXfre`@5>_)pkOxC~A_Ou93? zPAh)L&V-;`Tk86t5tdp^WfO+&64y&p44K9hz8r1sNR~R{K&t?->GdhNN7K&KWtHBgU_&)ncw(UiMb)9P>`SQ_oih-7O1hB3}UlGia=t?YK>jgR8Sxll*DVVzCMsA57Cw zp$lIxKTPwS`+b!iM*;KHSf!!wi}c_m)0;F*x!FV%lzA#raMp-&cknaSifwQvOUR4J z#96E0BxqkQua0}^i9m$=HVC{yrI^xs^M((P zP9OwPF8M-#wQU&^Uv7-$4b!EEb#@cEm4@Wh2MsgdSUqPe4uZ83DV4sNTO@C_jI6`C zWgRh%QEx0)6|KjPXFRK5-H8>CvVC^qQKA!YD)7R9_)>P_QKA!w*-Cl?%FyB+8EyNa zGhdK7J8&0eGisSqL(DRw+?XU}Npvr(&wX?PDY6sRc8K|&*e0sckRvwLc!Xk-+CGcR?9B5t2NUEUi_kp^U>dV=XX5tgLfuQ^6Z+X*>nvX)DX>qj1PYRnWX< z-uU=W9*VGTF{@&;7ZB#{`r~;Lnhm>_bzoj((_GT&<>yL&iV(J+A$pn!8wg-;&(P#f zV08>mHfxQFAmfK=3+Osggh3c=b!E+oEu1T#Tyai>OH(gzHuDlvu@u{72XUR4C0(4* z)><~}N_o=muREMFXn-2CSW9A_jUz7Wg<^dv5|i!H=a@{3{CaOGl}n;%APc;)!WxTp zsXbZ;-RpxE1&v?MSs)jK7Ec0}B0sVZ8l43#Izg54+dPrP4ouLSujY|$J^~$Iqn8LJ;Jv2or24Gb0U-{jYgT1dz2fk{F#`H9y4h1 zPY(sqr~uHkc@7|PGhbq}?IKzAh)yz%23lzVQ!|$`RjCaVJWn@h@kkVvA97`I21;R; za*Q12C!d_AkUe+#1oosfg$5gFL#LfQASN_lu~`$ z88&i!(pnF7Qj+S`X;~CHuGCU7$>@nSthKDq$SOr|ymp?dEhJI0g}B!BJPP!MmBm`>i5OP>EAD!;5#^v`EfhmXa^F^nvOj|XjQT*h3$f#-JsYeCNu`vidoOr!fwaXaQdRuKL~l>O`WwgS4-S6Me&;_vR7|TylK-OLBM$LgRcJq1&b)w7cw@mv z_>~0;Z_8+uzm)HKpx<+);g6f&b7h|AL4MDbhL7a;U~y^P%*36u8U}-E3BxvFJZ3AD zF_Kj~6U8>Yw)k2t?~pvq=kHh#Y!$2GR4IXI)ca7*lXFleL5(Wcx_;_N&Dc%5>_bKL zsfPaH{hleY>`oYyf(uxzUYGIg#Z-4mQE>F#Ft2lEu1@J*V6N-Vm9!02j9`)dT7iKO zRtY8;*kf*!h~!jLc(OHLm8v~!EMs$8bKCf&Mo0a24-R4bA`6BUJDEi0c8hd+rHvd` z6{(CfV$yCH7SmGtT*n!&xzVSL&5QdC?3XhHEa;^rnRxwqs1aoW(}3Y zOZ`fW(^a+IS~`>6w(D)?rZS(Vf!Xs?b((xw2gUke<(z0OqRa!$*|S)`Ns> zNIQmeCIhuDnw@A7j!AJVk}VOd(WR!xigg|WCPm=NGSSV*VW+W?cs6NK?O=c_fw9uK zsnOTwbWdJcRok7t^`1{BSm?smz^yFh@tzir+vQ&AN^y8wJfADL*l`c`e6BQpBoMug zp3fBqqOb9Mt~7oyU7dSAz_oLym2%@D2@Csr#;Ufh`Ha_DfMLHh7#lTcDn?sOk)$kN z)HInMn>gtqU`R4+OZW4bSWm&CJcv|NT=-i(q3RMiEbY8*dgAGMJ^@(D?s}D&oZ8HR z-zDvI4k1KMv$8CYqP600#1$5{db7!WF64cl4@h>prVfKfiR~~U#tGZyay^pTbhar8 z9m}lL2x&Od2vUZg57#0LbwnVW;e6|;1Gv1kPLcx+_)*v1#s0DxuL$7J;ZoJ%`Z~|& z9}3Us-)|!~!tlq#^SJ_`8)3Ll&z_j8$dmBg#i@-SsW3eAeg5qRa6c}-&kf+N{i6jx z;edO5@29Xyp2Yhpj(a@s=kgH`_kJ!Oaq9gXeG+-^$pTU`a`us=LAdZH8T7YagrTE5 zr+(Mb`^qQn$|rw6rF^oW^+7w1KYDsB`Z{_C>V#*}cftjy4{CnzK|78)mI~-?)X` zJ$V#h+mRE;aCz(km5}$p*%H@}w3qg#VP^3t+?d%&q1vUGqI7@E-k6^T`8r z>e+tu37e=w3}`LE-oD6tfaqY}A03OJUNoGKtMO zd^F;=WQK~E#gAZ5629Q)I_-LTwX@a~a!Wa=ygz41#0Z|VF&Y>iwN?=~Q<2t|meBFO zK_HQIJDp_YdNQ8R^)VJrhIL0r%3Fp&wS5~-A`yNLdfo>%OqjXBbJ8N=33SU5))syy zN`A~)BwWVU566JwU>PSw2`;F_NDyc;>5SxzlsLF%`K93)*A);d(v-=@@ajudA{7o3 z_LsfocpxLxnk6Txs?;5A%sYBUPB_fi8_zibUcb)`>#j*tu|aR$p2u%=i8MGY*tG$0 zf|81m>kn>-!Ol1uOIP%etF=*!q;dT0?}TK~GK&HXD-|8CzuYt@0$Zw&#WmF>hc$W~ zTIIT6)&_MgTkAb@!w7KmK9544RM$k-&u& z%MvOuB@C4lcnm9L=yKPAP$OAOuz=Q#djn#kL|Z)E^aFF@;u$@#+>#bHHKER@DORc* zF<#`Yt4|^!!Y+Y`vX;IXB96_su}U~(uyrN!O@fQ(?MBp@^D4q)t;N!EiAjb9I7`L8 zzAVFv7Xf^EmFeqptG*J(Gju#_rfF>y44JTkHoy)pBu`w2(9=IYiLh=45jLeS zAk5zO$BQ`7>eFi4X(7#Z!zYug*Y#;aSoES1HsH|m9${OKR*~&;qSVWr*h-i^j0pmp zU=zBs)EC$WdKqKe^F}pQsU$irLyyyrIcfnPPL(AWjsal60jFw&roRw;KS@L4(znY0)1HJ`_fjqfm2s)SCh=L@AG&rg8c zsxOhcyDGLvE3eD*92q5qwFAar4-5eU$3!_a*`bZxqYdX!G=X3u07Q_3;X=X&sC5^x zfHS{M3}KI=z|PT*S0S9X*RwIdEb#)CCQZzA?9zCvn8UiiRQv#!%U;t^>!^)UpyIUJ z?RhEcdMr6YHnpwP60?TEm5h45#E3n@3YX5Dk4M&bzHTI4N+6)6A4k--Z^3@CsDo_0RzUVj}oT9 zE_OK>a#s)m492NDhN&5cm1&R%LKvo$DZPcE`oo7R0G<9WR$;`XD%6XKy6Ft-S<7gy zhAJ)ywaTo-a~(@)%7`%O@l~Yh*XDSIAlG&~OXMbqrPSqDs+xtK>gs8P6#empPO3AL z!Vyn98LGe`R^2sJ0p=`L#nM2vxu~w#e7idBS}>aO>~iE1DkK!<4|FXQvY(& z1lNGw#i~41FY`xyJPS6d6s}GPRwVJQE?Up8SmZ*iwc0vMd ztX8O1&ncI24(mIujWUgf(~X==Vst&$OXJ1@xdC~TzkMAho&WLx+$V+iN#T7`_+v~8 z3l9v}HvRa?Ki`Axeg}5H1N*V=zzVPA1j&I5d0Gaa6HRTJ^C!Ph_zDboZxtRE9>CAf zJp7p_uNFRk(&=QVTiBh%eB&N`a ztfWhyOurA=_eW=nW|-eKD2*UXzTWFn_SBuJ7S3~~x*cXUro_|;)%LVi%|x$0iMzco z*lm6XTu{L%Z!jG*>zK!9ip1j0#j;rG>0=RDkc!oA8C5duw|j8&+vjO?Sf0j4sBJc& z(<`pUpdtyS7RATy`b4LiQlIIV;}z3PZruFdg)QRA&1Qfr7FI>3Yc*_U(x#nW-|T*h zQ1;2QMd@AGBAW_3*hbVr*l1fFKHyA;3!`DQkb^oFt($9oHFDipn%8BfRqU6e7Fm(o zP2V)Oo36cHXwqVqa1&wy#11`|D_mP{iDiHF5!s@<0OmSd#D>JAt$HzD7q%2*8Uwk; zYn{*y#yG#>@g|Q{$zsE%`5FrWlK_ct@m7itJN31|(s7e$dxMtbO_mBXoAi|h*%Oy~ zWopfT{A^Ljb5(9LY3XUgwt7l1ZkKw+YtAA0IM||V(Pzs%pDnu9_*S9nV`Pi2MIiD9 zw&+^p=ZC9vwg|PRnb}O3@eqfOeKn`$=~QtjyW^t6esM6KR3RN1ZV*Wj(#)+YB01Jt zxDC)DPOWs+$s%kuL*3FKlr`RUHfl`N1XMX0u3j8ll}Y!f>Qu zxCq%Irio4D5eC-7#m1BeVR=%+@qvOmVRyQX9KR7QG1OVW7d6AxO>EIW_ zPjn}Cg*Cc0J(F`KM^fijT+>yH(_GUfi`#HbxxqQtbYP91{KrG^3X1ol!Ve!7{_Y{5 zz`Ngd?U`w$hHIAa!1L@FpKG>n1XGhRXSQ$ev`O!Pua@9(-#6XT1Ja0OOe(K<{5gA5_He)>Sp^^!617mU0tOg2~ z&7{yYPg?yd_}b2DXnSi{i_QIrxv9LI!v9Zp@NMv_xq%E|>2|Y(7q@Rt*)C)#&FSsT z8sJSgUz6i~A-8rEpI*x*_~OnkU(4f@p~c$C%W8oy9SjL`=>}=eat@cKankbFz&i&^ z){kP%k8QY))8p``C;cnn?VJHVzgQ_aTAv*LJ@DGjcn}85AbS4&J3RdGhOEw>w%x73 zQbvpBCx?Lxd&P`jd%78(G`v2Zv}K8tW>xUBhw*l6!TPh{q){8Zbuf}b&5txA_Xk*d zdc1>2eDY238m=uh-FBfbF{8ql3aoedgHamo8K9Un@L@4Zm>d;Dy$8@MiDeBrh`d zH=7-NZs9kuoc)KdAK<Uj*RnU#Rpf{Lhw@TZTD=W}lV zFHVy10|JupX8)jt5k{@e!tBJ9IIL0Wda5J!P8)9Rx=`k@nlGF_R2UGbgDrFI2)L`p z@t_?67c`DChp~GF)|~5Im1$BLIy%TS2``tw?8R5$sJ_B#V?rXK3{yxr39WGw{GT3?j(SD937{zQ zq$Crgb*56Ql7kL|E_9~Zswh2IMrLu^Xn`>mMrGPZC#oz_t(ifD+l<7AVOQ2|m1X(@ zGliS>PzpV)({g$en^pRP3HJtV;G*l<{CT6i3h+Er9 z8=^UwNOPb!EhU!OMX#OWrh4s_&r#;W>v(so)74ecRZ_M*v?58KBO(tt5mkdWd`jaq;wfCqabg zZ?bg!97I~y!qrw0ug$tKRt$T64qtz|Ks16{xEBi|+CkMbjB}(+Ep)|Q3-lE*Jx64j z^UFt-rAjgj)_195>NnC6WA_(MFHF1b>9oy|W2IW*CK;}^YQye~;bU(oS0o>FtXj(} zl>}Kq6kMVDE0(0mUKo2+dscP?anZP$HqRw()2k}Wiz3ULp8x#u2RA+cN0DXMvHYG` zS)@oQwg#kMW=mtuH#_J=17*Lcv@NgUu$69ULgJ7&*JeG1pV^T!c1JCt94?I&RiZlU z2HQuO9;>kxmtFZaCQ3deZT{CMF(K{(%j$p$5#`!zMx@nXz8OqwQwv{BWqNp7(w5f& z=){W_S>EiO11ON)DfJ0hQc%_ze&?aVWpzDjQb~CWgGiYp$fQq@@DtPEu{^M3c@4nf z7)K{tJVQJ1#bjQ#ph~Dak~on|$bAf8$z(~W3KST_LId4%=bWe})P4pGnN%cIsac}m zfj-gWmr&}t;Y1-Jb7`+2bjc*Xs{7YC%-Y3GsHYSUddfV0f(vyHi6WsAW*KK8oW;(= zIfr2hkE7^tBk^6T+HBXGMY73lMls+U5Lg!A*b>63TBYnT=rbIJD1U>z6UD7*qbgG7hxxNYYC^)72z+_g?wqOM)*1 zNQoSa(Ow5Ws=+M!LK(t`NQ9NMM0h91{wRqsOoI0%SB!+}XE9u&@{%ihlupKMa>&<@ z>H3v84uO8XT0*L)5+h0+iMQBsW!9_8!`f1*_*v47#B>|$(6e?NIZz1B1FY_(@&=uV zh&brBZ53ZyLR#Dqcw#L3^ThHv#+r!~-s<)-kH9fky6lob?gcOny}>8tl~NIX=8|9~ z#pTKhm__ePD=r3o#!@0#LLhJfUeQ@}gzB`@9vd=hqg&9K4eRW7>dTX~*h5jy87c_k@>NaS+HQl&60W1f zLNoPFs8a3`_nfWgJ>t%jfP2KfIK*9yf0wIzZx#Q>d9H39Ng$Z3v-Aj=isd!jRd0C2 zZVN`Ob6w){)1IqSix-}&mlHa#PlYTQxfNl7ujm@yD7{{JVe*>tHr1C9@Tg%|)B{#;RAV8x=f=BbNn9W?Mu*Mo?rd4CZLo8c0QBITY=oSnh4- zxJjl1XSFPugOy`Vti+ngmkI_U8uN-l#meim^1WBld{zcXgy1L7Y#z}G=*NHRSnm6sXaCTT4b+Kmc{jMc#D75!!x>soxJ z(@0ngsJ$A|sa8rht9e{NN>nB>E3rPo2Bci6NsKRr%rF?R4Po)3W#Z9)T~v^!3kv>;3oN2S)<+UGVuGQ#-UX6IL(2{_wwE zegqqQ_RH|sc|qaRBZd5Y<-;@Zg`G%cq`5X!C*@x}b%T=PNG>1S+(D6XW``KtB(-?zT?t&JQXz4mKg{P^d}zx=h&e_ed#rT+8Z{=KpO#dm-0v+Zwa zzuro!cmLok=r@1+7V;PH=g;6zhWyH%TX%0A-M;ht|N6~;e(v~%#EFy1%=DI?eeaWI zb81>9hB?h@&9qGuuU0U-Il)>s)~wg?+SG2=@QPJ$OzbM&tW59;-fFgLEpuA6rnUA2 zJwjjot?zHY_52@y@73?zYyH(HzVw;!KR@`%U;XNPo8Lme{)Jn}*S>HI{R;f~41qk~ zk8CG$BJ_U&`q}p)$jN{Ek&FJ%dyfA4733LVI6(jM74)mGpkIFFY=5!w&u@RU_#$YQ z7hfZ3S>YL;1PZ<1iU>SU4k(fYPTvJ7PXL#fM)-E_bP`4$)|qT$TUevho=~7mxbAv3 z_xl4$qJU4V1Sw7tQqrlBB(Zeb8L2s~2=GFns?sDObR~?5P0iR&g2qZ$XiXrb{XSwR zh$_Zxc-qJiU2FK}SoE!&Rt17T96S?x#&|Zf#zbrk8@`2Ac1#XNge#5+AShHI&U(S9 zu4~m4u~>DZW9>vB>SIcw8v-Szf&%J-0za7$ZsXxLA?u%SOHGCD31Ggz7(&bhax@Zl zbPnXh6?(+zC5-{+>iyYB0e8*5=cxVtRBzCy9 zvpbU~DRX#F6rDDFeb`tyER#&w-J%zWTf|ZbLm&i}$kyyosJDSjvm|-)@08|1g$D#{ zan*W_9&|V`x40Hw)p`pRn4b`QIZY0uu4;KY&-EqFjw(i^ zL;=yk{hq?-)xN5X@^Gj5@Zu37fO_#VY$~ORaw^e9Us(CTE*^;+s`TOc-H32$hLB)y zaCN?$>I5OF97yRDp;Fin|T|{u~yG;O0`hl zd4ATEoq?gu5Ub^CiOSD=?TmEvdP){o2n{~>E5+SVGCZXWcvrN@?#^Os>(WBY_{z|Y z71c;Lb0n#38F#~L<*v!<{o%@Y|KG<2f-|rQ?iC?J20H zlqUz6itG_Vi_}$=9Dn+uAR>JTB8xl+k(uM9j+e;#w3`s6sMio#y8Ja>10cWiuObUVrZQ zqO9At?KVe`wOUm$a?-@>!|s$5lVGS;l_k<~>v&KuOR9!xq{j5uJk8R*C<&PMwBk$h zyeWzT9jBDL@9Kj?SBJIGb$|d;7AXKk9{@xO0HhEg1txrglu|wf*Y^LS`yelLbLn(|VIq}fNo%`7)90(*vO$x;Bg|<}6Q^G6j~63c zszj^Fnkh4#O_T2fuE(2vb-}NfbuLcbPkiDU3=l6P&ki|&p|^|Qjb`U>9*PNhPb}+G zOvpfJZ#bFN!`XIV*KL~?U%k#slbC|MV&teoT^c9N} z_Z1qsSfVWjI80jEK@zD5u!#358h#Qc+*S}vF8K4aZ33I_$Q*Q#Ls!-nuox+VETr^- z19&=JQM$HU89_U0Y|4*Mc3-CyzIc57>KJ0CT;~;O6j84Nm7?ill#cS zQfN~k+&z_nogmxnF4r-7Q}8Epfk0DD0Se(xPAHrw&gonrh*Ts27;Y7@%hX!!Myo`( zgzYFn#OAmsMYyhJEdq9<3@^3WIu~^9JdWzpv}bBgwdR&_ZPO~xq*b}UbfZo}l&cnF z?DQBzN}a(j#44$ogZ_aFZ~{zm8qzokOg-g_cOq971hIby7f6MN6c|HLNh(96kR1WO zXQ&f^F#-^Z6Q$k53Hk&q_B>H%B8G0yn_z2Z!C(;s4^cV0xglGiK4lqun>6VqUZb+8 zA%O6VWcPPdaRID4Brj15&Lxy;N5tl{Y>EU7hg)j68rQ;z;&$GkC(K8dsO*5TsX|7Y z@S~EmX>C)|Sd(n6(Obzi%TU>IKFXI;b&JR=JsPG9Jg$V-A?)Zjumf)yAJ>rQWygeq zFGfFte&Eh6s1)y@x8dhI@4VyaW%R|1`tIUETI3~RTrj&FO-q%BDMYNl0RsrE>iC zO63bQs?cLOh9zV#m!a0Kre~t`G32s#B9{w>qo1@O7xfrQNP6b;9%t!?rVn z9c9LtPfu0-*Z~2+J1%`~tgKpc?$(1W*r7cCKlU09~x`DvCQ<)+0Zl4G!l2|DB7cQiz6@&?{ zsa%D4kJ*#L1(g7#mkY`OGTT*Yz`0tiDwqwt(%f^Yeu4pPEDdHL#|KJj zvKq?XP_FcLGt!~6fxljrox$374L5ZS^}Z1=L}M}J)m(w7?0KytNqcAS0_PQDi*u{U zhf2M$k>tH#rxD;o#wZ99k|Li&evAZlFTz7W< za+QNJL(W`GSL6Ui(7>a?9OK%}@*Km4o7uE7b?|A8!z#2jnRTgTPzL^Hj#FdNEU#%2 z;jpRLxBO_gW6EK~)XG*rEDemZw(JTjCH!Mwr_IxE=r}!U%|85XhSiVnX41I&R z8^m4YKkO;+AHT*x=#^Z48b{>{-c%d&RVLi<-@_fP2cXfre`@5>_)pkOxC~A_Ou93? zPAh)L&V-;`Tk86t5tdp^WfO+&64y&p44K9hz8r1sNR~R{K&t?->GdhNN7K&KWtHBgU_&)ncw(UiMb)9P>`SQ_oih-7O1hB3}UlGia=t?YK>jgR8Sxll*DVVzCMsA57Cw zp$lIxKTPwS`+b!iM*;KHSf!!wi}c_m)0;F*x!FV%lzA#raMp-&cknaSifwQvOUR4J z#96E0BxqkQua0}^i9m$=HVC{yrI^xs^M((P zP9OwPF8M-#wQU&^Uv7-$4b!EEb#@cEm4@Wh2MsgdSUqPe4uZ83DV4sNTO@C_jI6`C zWgRh%QEx0)6|KjPXFRK5-H8>CvVC^qQKA!YD)7R9_)>P_QKA!w*-Cl?%FyB+8EyNa zGhdK7J8&0eGisSqL(DRw+?XU}Npvr(&wX?PDY6sRc8K|&*e0sckRvwLc!Xk-+CGcR?9B5t2NUEUi_kp^U>dV=XX5tgLfuQ^6Z+X*>nvX)DX>qj1PYRnWX< z-uU=W9*VGTF{@&;7ZB#{`r~;Lnhm>_bzoj((_GT&<>yL&iV(J+A$pn!8wg-;&(P#f zV08>mHfxQFAmfK=3+Osggh3c=b!E+oEu1T#Tyai>OH(gzHuDlvu@u{72XUR4C0(4* z)><~}N_o=muREMFXn-2CSW9A_jUz7Wg<^dv5|i!H=a@{3{CaOGl}n;%APc;)!WxTp zsXbZ;-RpxE1&v?MSs)jK7Ec0}B0sVZ8l43#Izg54+dPrP4ouLSujY|$J^~$Iqn8LJ;Jv2or24Gb0U-{jYgT1dz2fk{F#`H9y4h1 zPY(sqr~uHkc@7|PGhbq}?IKzAh)yz%23lzVQ!|$`RjCaVJWn@h@kkVvA97`I21;R; za*Q12C!d_AkUe+#1oosfg$5gFL#LfQASN_lu~`$ z88&i!(pnF7Qj+S`X;~CHuGCU7$>@nSthKDq$SOr|ymp?dEhJI0g}B!BJPP!MmBm`>i5OP>EAD!;5#^v`EfhmXa^F^nvOj|XjQT*h3$f#-JsYeCNu`vidoOr!fwaXaQdRuKL~l>O`WwgS4-S6Me&;_vR7|TylK-OLBM$LgRcJq1&b)w7cw@mv z_>~0;Z_8+uzm)HKpx<+);g6f&b7h|AL4MDbhL7a;U~y^P%*36u8U}-E3BxvFJZ3AD zF_Kj~6U8>Yw)k2t?~pvq=kHh#Y!$2GR4IXI)ca7*lXFleL5(Wcx_;_N&Dc%5>_bKL zsfPaH{hleY>`oYyf(uxzUYGIg#Z-4mQE>F#Ft2lEu1@J*V6N-Vm9!02j9`)dT7iKO zRtY8;*kf*!h~!jLc(OHLm8v~!EMs$8bKCf&Mo0a24-R4bA`6BUJDEi0c8hd+rHvd` z6{(CfV$yCH7SmGtT*n!&xzVSL&5QdC?3XhHEa;^rnRxwqs1aoW(}3Y zOZ`fW(^a+IS~`>6w(D)?rZS(Vf!Xs?b((xw2gUke<(z0OqRa!$*|S)`Ns> zNIQmeCIhuDnw@A7j!AJVk}VOd(WR!xigg|WCPm=NGSSV*VW+W?cs6NK?O=c_fw9uK zsnOTwbWdJcRok7t^`1{BSm?smz^yFh@tzir+vQ&AN^y8wJfADL*l`c`e6BQpBoMug zp3fBqqOb9Mt~7oyU7dSAz_oLym2%@D2@Csr#;Ufh`Ha_DfMLHh7#lTcDn?sOk)$kN z)HInMn>gtqU`R4+OZW4bSWm&CJcv|NT=-i(q3RMiEbY8*dgAGMJ^@(D?s}D&oZ8HR z-zDvI4k1KMv$8CYqP600#1$5{db7!WF64cl4@h>prVfKfiR~~U#tGZyay^pTbhar8 z9m}lL2x&Od2vUZg57#0LbwnVW;e6|;1Gv1kPLcx+_)*v1#s0DxuL$7J;ZoJ%`Z~|& z9}3Us-)|!~!tlq#^SJ_`8)3Ll&z_j8$dmBg#i@-SsW3eAeg5qRa6c}-&kf+N{i6jx z;edO5@29Xyp2Yhpj(a@s=kgH`_kJ!Oaq9gXeG+-^$pTU`a`us=LAdZH8T7YagrTE5 zr+(Mb`^qQn$|rw6rF^oW^+7w1KYDsB`Z{_C>V#*}cftjy4{CnzK|78)mI~-?)X` zJ$V#h+mRE;aCz(km5}$p*%H@}w|}tHy=N`zIObp-}%JfUwih%NOwnCTQ&P; z6Zy~@c$OCKl1YbDCaKagal4OqN2u!BtM*+`q1St~))+ia6$Kja4 zNmv%AX^G6wl1e`nj(B;clWk6Uk1%Rn&aQJaD?-7to+?v$z+)W-iz*b}=81BdpHeeS z!VRGeuOt&4q1|A*y+$lMRx8w$wlHOJPLs(pJZItz(0cT^hIVH)G(DwBth6X#%LH1E z*D6u3!6@*2X2eUHM~gMGEQ%!MC9GO0(bXAx1T<#a&G&>!L&kL4i%bhL7U5x$0!hJ7 zT!qJccx=X7oz*d(?o5dpyiwRwfMYco>y~9+;yr570!MiRvR0W6>b;EL=ylt?RP$(T z-a1QpQMp!$8&W^pZuEo!&`@E*OA(LpHo7;JCR$JGYQ3`06N_$c_7bo2IM3kzkSX!; z3}#RaAc&1$Jc`949ENi^Z|0``NWNm1yZK4FI&D;=WIU;t^GP-B49c?BG>W=5Ol#y| zB!GCqaMi3}4KficM;8V}v5-zwa=9EnvD*bZMBsKkJzy+Z#`8QD58hal^e8;+iNUL6 zfk9$?@Gw}3$FWwL!YmBq33pzQ^TZBMqJCS#?HG!e!=TAhrNlvcCT<4)B=6%en4 z;{=+062`aCj*!qG3EG5*+3-K9dbKsW_cT4%0P7k5uxxBoIOqw<@t@ zS8_F;z*GLTs$wSQ`dOwKaYogis%ILpVmYi&vO-NaBvI0e-ZWI5S|W*0+dvdw{&FxM z)s#T)9O=j{5B|-~5tE)cwA0K${Bdw~Fs=jRx`c7LH$3|C`>^^ioLm3QYu@$AufOggzxMJk zPTxQyk3M_|{NmdWK^%O~+YccR;NaK>I3fRvA+LME3abi^f&9x&>z_IWjs&pv2d9w7 zP9eW}YIQz1_^~~)tVlvE(+f*16U*sIN6(IEsT8OEakGIYvKfuUa=2j(+a0S=glK|U z_<$E(4-kvVpP{^LS(#BX4?#1)HUj5!B1*ezr4Hxy#Gocq6&@ECxHshm1*OLvRrf)y zlCadOU^Qlx!sFbca+}ZBtL=89io5kv!fK$ADLuo=3!LL+vM03jy#>~R71-hNDk)P5 zo)kS^#^SsTKWQ5t977gN?>x zR58n9od%mqM=SZRg0@C}G7YM<<3^Z1R<9{Coo;EQGo4XH$;l}Vv&OLnk!?DWx+6P1 zJe#)iGB=AB6uCUJrxgn}?m(Ah2f*P23v15tt)x&3H^gvogQ9T}j)uUm@oG3ODlF`w z2gm@&rHG7)Y#7HB4<5wBGi)%wfEcGZLo}u_r!Fw}O-;*BN_w#_w?QLi zR7MKd$!B~*uf;F)oJa{?Qo=YxXb`z+gNY48-HOjeN`@;db#L4OqsW9d##|+wQ<++! zG-!4pa#G>Gs=Km~Zl|hw$LckdZa6JgJGeIRsy^#ATUgX1O{oXr_|iCd_WnJMh_C{O zkk~XLb(SV-=@1cbjY@YcG8g!? zbO(;N8oS|D6PUR0umN~6PiADMP zj8N0@Qm(}cqh3jg%6*VE;^|&EEGiYWLR9F&kfRtX?~HnMrWLV7sgo20o^n0Xm=E>h zVyMHp(9kg+^B53#h}6PEBzO$-pn(K7Vc~@6aW=N=_z#9Z*lqlm-~}a-YhyXf=;x(q z$4A2>qe%55T)3+C^(yWFrJXI;ingh#lX%iC0XU43=)a>@8 z*o-#~V%Suel5(M`dkym04U%k+S%fJhjJF~UR+tA$Ac&NfQ}ks8N{lxTl)z#rUwNPe zf=Fo*D2W~wj5<-wQQl}C!)^AAQehY}$4zX?OHF19<3eg2;3wDupk77BWZcj;Ae_TD z;he{DParU?G?9fI9ZO{rsSuUoC*=_klGVKEz=*?7;cyuF=}?A=v%Oq%<~nh)l~*fz zG-ia;m2oQE76;)%-*B=cJREJ%^=ZvTK`2|C+Gxa6XINo@1?hRPG>>o8n#TtIgB0oF z_&iwL0xBGggy4F9lnaF0s^qj?y7!Klm2EiO>N;bhO@FrK2ROecv=RKHj3 zx|j(RwwW9gDJGv;lE#%o`ZzW5i29IVVu}1fiZ$vAQ=OG(eK9%#(xB#)yl&c! z*tuXrEXZGE*F>p-MRmeuT$X&>3=moAL$B{ModHDD>>o*|RZT0WAR;oDW=<+JX z!A6_NIphp%;D@#}bP~B?YeOetkhkdHxsA{D7lTv8BFvK@o#L3<$h7+|a(r2E{fEJI zggQ_gX4f2|M_(0x6^dN5D))Qm!1V;Is`uToEBgZ-`PFmCd(VO6`bcX! zYHNhN z)g{QVYP1Xj!q0_HuKVmdxmy5Grm8TiM;DGR^pdx*I+x+-Rv_OLV03^@SIjpBjxKa^ z7km>dV~q`rmT4yA*O{_kuX5hfA78oS7vMBBod=GF9%U32?T|%W|E@Re+fg$>#2}yX`pwRY=9?u#ri6+vy z0^TDDyen^?av*61NfH&?WzM1IbI!(;12G%|!{(GjKreYGsIx}JRb*7QiHwu0g(@DA z6`QePJnxe2bghg+KeyDHX~o>6$8nqjS-wuan(b;9HlMIJ=WCQ8wmjVB zTm=I9Ya2C0N@mZ@6a=y%q-PUPsf@}oK10Y2tR#e*`H9`;&8a@Lkip;xW-;t4HE*dw>g0dHm+WMPD2 zXjLq>v01t(hqOUSGD}h1M;IV3XvrwkJ5iMKc^1@wqSMas!^2(*;dR6iuEWh%FAp^g;*1Fxs0LA$j4M zfffH~2rNe86lPLb2W2zKa0f+8<8~|3($lRNi$c=oite$)bNlZ0E@PS zLc?;VQ#x!rbS&I}sh(mzTUwVdJc&PW4V9 z+i8{(tm5YA*0AT#tkCx%{`tG&-v%>r5&Xl7#Mn-kC^nD!%3#K1C`O%$nPikgt2Nuo zhx(};o->4KHtBH&sO95iHWm$=oZ91UN~UKrJCqW2yhth0xXkuthb`GfE-7}dHvS!0 zTtMLNTPCxG{k;VK9a!9o<-HP*^ZU!<5CmMCh(vnsNpQ=dGuPhr+Sk4otO(SXfal>V z6ttDhnU36yTz~wZkDP=BuDu2RSn;;&r@?jeQnK08?ePe?0XYf|qwex5XV0$K;9HOz zjvqlFRl8t(Paa;CIR|dUySCOTt6j6H288dty(7r;z_AVfc~$o8CXXHTXcFohX*v zO(pTcJuNI3WMP`j77H_{g=%MHtBGdJ&q8I$IN7JX3-8PO0kW`pM(Ju=Sdqu(bPh#K zd8UR!{cR-?;idE<%>lJqBwoksOmxub;1ehv)^;#0P}zG?NyS!0g-yDm+YIZ#&|QWw z(s*T9@!L6ZHp&!+SynD4uo&GPio(pVI;@|!g?L}UwMpM%X}{uF@qAwlhXkPxy6MCK zO>~E$OnKPL?JlXmTw3FA&5ZBM$RK_1VJT28SND#Dj}q3*m1wK`WateaQ_}-%z-B2*k$49mBJLjw`dP96Q)`LZ#qw;LYS&7brzQkRbVCPBkM6S z5%Ox2Y$-8IYpG$WMu=iO+6oJN)(}$)D%SHt3{CapZ6ZoiV>2`JloS}repeXQYBQ%- z>o$BB4fU&a#*4Ldnm~K%o=^qYeF*w?gDSvo2>M2Hu|`;vM26u|dE6QacC>(cv6`b} zo!P8t3MsSdRJf2_*zPpJXTYrlee9I0XL=%3l~zrjPeuGFiB5a@W`bmrD4!^z1A5pV z^3y3p5gZwJD$_az@M3_Hx73^{UVVg(tBr6q*+F-Ks`{T@4_(K9 zSOW)6;ek_l;1qrrokCzaChwElMo#&!^a9YkQ?)d&nZI?#1z#jQj(`IkEpxJnB$ zHJduZ69HqhL7Z%@v1DWRStGjSh>-t)+yxr)go7Nz@y3N-nTjy*gx5d*}eKfb$Wk$)reB3_ON5$2BK4lP4K} zXUO_&a6UVX=TfZdj)IqEWzRk5vm@8BAI`_5oh&|)8o)_rjI3buy2U$g$?Yh10(Zx$ zabsBSc1LnMp|I&tA>yW~sFF$bb!|Gynd6QscUm4_Cp$pOGHoTwXOy%Q=@0*%oX?dQ z%uddSbI5w8)*BHCaZ0ngR#f7GnsvH%l@KNZkrL1t6-t_n5a*!5cmS>;6AYgyWfNnO zV@4@5(<`RsUVTtuTlGSvL*=DGBic0D-+j&}+w0c&Nj=^0JuVHGyH_*ed}zny;5{3h z&knnovX|z3b`;*15j~5X&kh8lcHw+>6uvZEZE`-C(VXcikFAynII$1gjM8jYEZWR= zu~H#atkz?YRCFe&EQ>iERZSBnz)A!?Y}Bloiw|2^H(YcSRp?ri+K7yc*kTdq zZt01u$NBWIzGMssBb8N>Gt9~nO|Jt@h-~>`Nh&)-*%}K2)K2Bw+BOz)8|QLo%@c7M$8fPiZn0V#TnWx?O>I1< zj^T>;dGf&EzE^mk1B2UjdxGzCgWJLV?9Jo^Jjsgt*$ zUq23xVnp6WzH%J-i{s!txHaIr!f+9)+1Ko*4j17q|BIXkKNOq@HX#ac5eyE#= zF;Z{A9p2_5wY`P|Y<+o$8xNON-S(dM2;a%_(QdY?j?_IXX28wM_GCxxyXt)LH12cc zo>g~tRi5snS{xwTpKmbq_G~N(ZkpfV>h7qi>5lduF*JC|g|9_Wd%8PNHGT87?0ub= zf$QcrUUck%?OwXS8=k9zqF67y!-B5T+O*Z3{D1?VD=5HYuIpyfp!l;kmF!u8;~V@tltA} zof{4bNB>5J(#RQWqp_nSC*k%5&%m!6SH)j@2%Oy5)Cy}h9k^p0+#jHeh~Ub~^_y2Pu+d(4A!=Pe2SBjtfbERTaSv{NfPj;w`K|(+M_1k5 z=S~LudLdWoeQpgrwzf*gAXmWK<_@%am$Sp! z#ni9|TD{8@w(jI@pChdva?9J|*Z!a1f9470S3dpm%w2EzU)SoB^NG`M%vX_*o&s;b z4(u?v^T^%X%iYXegb*ViS5;Y_5`G_HWR8BUg5wu zKJbk<7DlXMoCDt&_YZvI@N?}O?`K`nm3gVpjoZESyw=Zdo3(GcmZ#+Ev@~7xey!i>k zVt)Gbf0B6QtHy(Id-xlF|E52~gMThSA%;$dR@wJaV`8Vg^|FwJcPo6)L`Qzh{9eU!K|NU<4*86^` zmOXqX{_1a>{^K7%`lWk+gka(t=yAys>Va1cRn`5PTq4w{m89<_xe+Z&%E$=pT|z0xcl=@-+StdUwGpuKm63| zPk;19e<}Qy|J>J}%(7(t(ChzX zjE3#!H$HRoM`m}=K2SUVnn&)n$FDhj=E$p`Prcyg5Bwb3_|X6OPfxw`*yP*Ib02@R Y^^+fcig^5gg4X-NHSph7iv-vFKkC}$`~Uy| literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..0074f613 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1117 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRYVpzUDR2ZXdOYWZsQ0QvYWdmZ0NHakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURRd01UQTRNVFF3TUZvWERUSTVNRE15T1RBNE1UUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFVDV5VEhSVE1FQzhJWDFmTDNVUzRwVzFuenc3c1J5eHRibFZUSmpVb1dETW0KSWJqeVV2QVpSMlJQSzlpWUNwZ1F5K3ZEQ3djcE9od2dtTUhnZlJGQzhLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnSGdXc1VUMlRvQzlyS1krV3dDSlFkM3E0THNEaDhZVjIrM29TZnpjUEt2a3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSURSaW1pOU9ORGJOOHp2d1VXdFYzTTlDVGJBU04rZEwramtKUTNkSjlYY1VBaUF4CkpmUzVJeGRuVVp5K0xBQU1qU1cyMmxOM2FheGlsNkZ6d01KV3RRN3ltdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQUlxMkFvaStnSWZzci8wODZVNWtweU13Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQk11Y0h5UUgvY0toODRFVGpKZHlNbS8zbllZUDVvKzdGMHVvbzkrSEx3dzIKZnNEOG5WdmRyUlFKTlBXMEFBdUpqYXhla09Ka2RTNUhVc0tGZnFteXpqK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUI0RnJGRTlrNkF2YXltUGxzQWlVSGQ2dUM3QTRmR0ZkdnQ2RW44M0R5cjUKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBUEN1bzhTRUhMMnlVcHpHOUVHYXpROTYxRTJYWW9qTCtuN0tCS2dOMUo2d0lnCllMNERKMzEvaUlhbU1vRVRGelRIcVI1WkJQRVUxNFRIblRySFNvUEk2UWs9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIC/MMJoHTIklZhcMoVSvtl4NW9GBKPCUH/OJXiADo58EAiBB4bRyQvO4Rt+BG+8SLPi+H4u2pxgdmZLa0rZS4GyClA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "hjf2KmMCSZ+WA1b1YaL5zux5szcGSDWu" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:39Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org1MSP" + }, + "nonce": "lzQF1cP/2FWrz8c5KIvLBWV2OzUejUxY" + } + } + }, + "signature": "MEUCIQDn8rN64s1GyZPYZ2pHjNnTNbXrZ4k0b3Gx6ZLFDPf2RAIgc0iftKgylRDlm/d5hP8Rnks2MSXcruwyonjiz53djFQ=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:39Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "cw62PXxBWqQqGtF9ncrwh4p5WT3geItG" + } + } + }, + "signature": "MEQCICPR17vBBsLs5Tuj7S1lyjsDOdAIugHY/9SfQRl8p1lKAiA0e/Ie0H4E4TqxLKFmNrm4LkKgwbVmQjJimG/KHXx5mQ==" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-07-20T02:39:39Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "ij+E9iGukkFLl38pusIU92xh7D6GobVf" + } + } + }, + "signature": "MEUCIQCg2Qre2disHnRVeFctS3JYZ4ormrp6QRAtA2G9GeiIEwIgFrwJSHjYKdn2OhPg3o3KtPWIHsAbzE4tlcHeJZGyH7M=" + } + ] + }, + "header": { + "data_hash": "GeaXQIdhZ83SrXQ7fH2qXAd+VcmZs1VkZvWU3jsEfLU=", + "number": "1", + "previous_hash": "g3zsCPtkaR7rQHEWIP8HtyFafJOkJY4pOhoAXgDWrSU=" + }, + "metadata": { + "metadata": [ + "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", + "", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json-flat.json b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json-flat.json new file mode 100644 index 00000000..6a181f0b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_1.block.json-flat.json @@ -0,0 +1,405 @@ +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nN0qzbu085qQXfAXf7yy4VoSHr1A6\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nBXY1FqLj00CMBOj8vWdsSdvUwZtAuXb/X6k2\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nJL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nuSkveUPr0Z4CCPWAjrKdxsjn6spBAjkcDASq\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nRpYrSwl8s0o=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nH2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nYL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.version=0 +.data.data[0].payload.data.payload.data.config.sequence=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature=MEQCIC/MMJoHTIklZhcMoVSvtl4NW9GBKPCUH/OJXiADo58EAiBB4bRyQvO4Rt+BG+8SLPi+H4u2pxgdmZLa0rZS4GyClA== +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.nonce=hjf2KmMCSZ+WA1b1YaL5zux5szcGSDWu +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.timestamp=2019-07-20T02:39:39Z +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.nonce=lzQF1cP/2FWrz8c5KIvLBWV2OzUejUxY +.data.data[0].payload.data.payload.data.last_update.signature=MEUCIQDn8rN64s1GyZPYZ2pHjNnTNbXrZ4k0b3Gx6ZLFDPf2RAIgc0iftKgylRDlm/d5hP8Rnks2MSXcruwyonjiz53djFQ= +.data.data[0].payload.data.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.header.channel_header.timestamp=2019-07-20T02:39:39Z +.data.data[0].payload.data.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.header.channel_header.type=1 +.data.data[0].payload.data.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.data.payload.header.signature_header.nonce=cw62PXxBWqQqGtF9ncrwh4p5WT3geItG +.data.data[0].payload.data.signature=MEQCICPR17vBBsLs5Tuj7S1lyjsDOdAIugHY/9SfQRl8p1lKAiA0e/Ie0H4E4TqxLKFmNrm4LkKgwbVmQjJimG/KHXx5mQ== +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-07-20T02:39:39Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=4 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=ij+E9iGukkFLl38pusIU92xh7D6GobVf +.data.data[0].signature=MEUCIQCg2Qre2disHnRVeFctS3JYZ4ormrp6QRAtA2G9GeiIEwIgFrwJSHjYKdn2OhPg3o3KtPWIHsAbzE4tlcHeJZGyH7M= +.header.data_hash=GeaXQIdhZ83SrXQ7fH2qXAd+VcmZs1VkZvWU3jsEfLU= +.header.number=1 +.header.previous_hash=g3zsCPtkaR7rQHEWIP8HtyFafJOkJY4pOhoAXgDWrSU= +.metadata.metadata[0]=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 +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.2/raft/channel-artifacts/testchainid_config.block new file mode 100644 index 0000000000000000000000000000000000000000..e96f10ffee182292dc106e0736a14eb9a0bffe5e GIT binary patch literal 18426 zcmeHPTdeEYS?=k~oH_MedgN*8bOY^l50vUeZ4&3^R8;En-AU}kjvdEFP}#BL*oouB zcH-C)(v*i*RJ6PR;t7d|iU%rQt5zza2-J!S@s5yC;em1~2o)iUgvxTVZ)fj0`&@cv zdePond*>W``KtB(-?zT?t&JQXz4mKg{P^d}zx=h&e_ed#rT+8Z{=KpO#dm-0v+Zwa zzuro!cmLok=r@1+7V;PH=g;6zhWyH%TX%0A-M;ht|N6~;e(v~%#EFy1%=DI?eeaWI zb81>9hB?h@&9qGuuU0U-Il)>s)~wg?+SG2=@QPJ$OzbM&tW59;-fFgLEpuA6rnUA2 zJwjjot?zHY_52@y@73?zYyH(HzVw;!KR@`%U;XNPo8Lme{)Jn}*S>HI{R;f~41qk~ zk8CG$BJ_U&`q}p)$jN{Ek&FJ%dyfA4733LVI6(jM74)mGpkIFFY=5!w&u@RU_#$YQ z7hfZ3S>YL;1PZ<1iU>SU4k(fYPTvJ7PXL#fM)-E_bP`4$)|qT$TUevho=~7mxbAv3 z_xl4$qJU4V1Sw7tQqrlBB(Zeb8L2s~2=GFns?sDObR~?5P0iR&g2qZ$XiXrb{XSwR zh$_Zxc-qJiU2FK}SoE!&Rt17T96S?x#&|Zf#zbrk8@`2Ac1#XNge#5+AShHI&U(S9 zu4~m4u~>DZW9>vB>SIcw8v-Szf&%J-0za7$ZsXxLA?u%SOHGCD31Ggz7(&bhax@Zl zbPnXh6?(+zC5-{+>iyYB0e8*5=cxVtRBzCy9 zvpbU~DRX#F6rDDFeb`tyER#&w-J%zWTf|ZbLm&i}$kyyosJDSjvm|-)@08|1g$D#{ zan*W_9&|V`x40Hw)p`pRn4b`QIZY0uu4;KY&-EqFjw(i^ zL;=yk{hq?-)xN5X@^Gj5@Zu37fO_#VY$~ORaw^e9Us(CTE*^;+s`TOc-H32$hLB)y zaCN?$>I5OF97yRDp;Fin|T|{u~yG;O0`hl zd4ATEoq?gu5Ub^CiOSD=?TmEvdP){o2n{~>E5+SVGCZXWcvrN@?#^Os>(WBY_{z|Y z71c;Lb0n#38F#~L<*v!<{o%@Y|KG<2f-|rQ?iC?J20H zlqUz6itG_Vi_}$=9Dn+uAR>JTB8xl+k(uM9j+e;#w3`s6sMio#y8Ja>10cWiuObUVrZQ zqO9At?KVe`wOUm$a?-@>!|s$5lVGS;l_k<~>v&KuOR9!xq{j5uJk8R*C<&PMwBk$h zyeWzT9jBDL@9Kj?SBJIGb$|d;7AXKk9{@xO0HhEg1txrglu|wf*Y^LS`yelLbLn(|VIq}fNo%`7)90(*vO$x;Bg|<}6Q^G6j~63c zszj^Fnkh4#O_T2fuE(2vb-}NfbuLcbPkiDU3=l6P&ki|&p|^|Qjb`U>9*PNhPb}+G zOvpfJZ#bFN!`XIV*KL~?U%k#slbC|MV&teoT^c9N} z_Z1qsSfVWjI80jEK@zD5u!#358h#Qc+*S}vF8K4aZ33I_$Q*Q#Ls!-nuox+VETr^- z19&=JQM$HU89_U0Y|4*Mc3-CyzIc57>KJ0CT;~;O6j84Nm7?ill#cS zQfN~k+&z_nogmxnF4r-7Q}8Epfk0DD0Se(xPAHrw&gonrh*Ts27;Y7@%hX!!Myo`( zgzYFn#OAmsMYyhJEdq9<3@^3WIu~^9JdWzpv}bBgwdR&_ZPO~xq*b}UbfZo}l&cnF z?DQBzN}a(j#44$ogZ_aFZ~{zm8qzokOg-g_cOq971hIby7f6MN6c|HLNh(96kR1WO zXQ&f^F#-^Z6Q$k53Hk&q_B>H%B8G0yn_z2Z!C(;s4^cV0xglGiK4lqun>6VqUZb+8 zA%O6VWcPPdaRID4Brj15&Lxy;N5tl{Y>EU7hg)j68rQ;z;&$GkC(K8dsO*5TsX|7Y z@S~EmX>C)|Sd(n6(Obzi%TU>IKFXI;b&JR=JsPG9Jg$V-A?)Zjumf)yAJ>rQWygeq zFGfFte&Eh6s1)y@x8dhI@4VyaW%R|1`tIUETI3~RTrj&FO-q%BDMYNl0RsrE>iC zO63bQs?cLOh9zV#m!a0Kre~t`G32s#B9{w>qo1@O7xfrQNP6b;9%t!?rVn z9c9LtPfu0-*Z~2+J1%`~tgKpc?$(1W*r7cCKlU09~x`DvCQ<)+0Zl4G!l2|DB7cQiz6@&?{ zsa%D4kJ*#L1(g7#mkY`OGTT*Yz`0tiDwqwt(%f^Yeu4pPEDdHL#|KJj zvKq?XP_FcLGt!~6fxljrox$374L5ZS^}Z1=L}M}J)m(w7?0KytNqcAS0_PQDi*u{U zhf2M$k>tH#rxD;o#wZ99k|Li&evAZlFTz7W< za+QNJL(W`GSL6Ui(7>a?9OK%}@*Km4o7uE7b?|A8!z#2jnRTgTPzL^Hj#FdNEU#%2 z;jpRLxBO_gW6EK~)XG*rEDemZw(JTjCH!Mwr_IxE=r}!U%|85XhSiVnX41I&R z8^m4YKkO;+AHT*x=#^Z48b{>{-c%d&RVLi<-@_fP2cXfre`@5>_)pkOxC~A_Ou93? zPAh)L&V-;`Tk86t5tdp^WfO+&64y&p44K9hz8r1sNR~R{K&t?->GdhNN7K&KWtHBgU_&)ncw(UiMb)9P>`SQ_oih-7O1hB3}UlGia=t?YK>jgR8Sxll*DVVzCMsA57Cw zp$lIxKTPwS`+b!iM*;KHSf!!wi}c_m)0;F*x!FV%lzA#raMp-&cknaSifwQvOUR4J z#96E0BxqkQua0}^i9m$=HVC{yrI^xs^M((P zP9OwPF8M-#wQU&^Uv7-$4b!EEb#@cEm4@Wh2MsgdSUqPe4uZ83DV4sNTO@C_jI6`C zWgRh%QEx0)6|KjPXFRK5-H8>CvVC^qQKA!YD)7R9_)>P_QKA!w*-Cl?%FyB+8EyNa zGhdK7J8&0eGisSqL(DRw+?XU}Npvr(&wX?PDY6sRc8K|&*e0sckRvwLc!Xk-+CGcR?9B5t2NUEUi_kp^U>dV=XX5tgLfuQ^6Z+X*>nvX)DX>qj1PYRnWX< z-uU=W9*VGTF{@&;7ZB#{`r~;Lnhm>_bzoj((_GT&<>yL&iV(J+A$pn!8wg-;&(P#f zV08>mHfxQFAmfK=3+Osggh3c=b!E+oEu1T#Tyai>OH(gzHuDlvu@u{72XUR4C0(4* z)><~}N_o=muREMFXn-2CSW9A_jUz7Wg<^dv5|i!H=a@{3{CaOGl}n;%APc;)!WxTp zsXbZ;-RpxE1&v?MSs)jK7Ec0}B0sVZ8l43#Izg54+dPrP4ouLSujY|$J^~$Iqn8LJ;Jv2or24Gb0U-{jYgT1dz2fk{F#`H9y4h1 zPY(sqr~uHkc@7|PGhbq}?IKzAh)yz%23lzVQ!|$`RjCaVJWn@h@kkVvA97`I21;R; za*Q12C!d_AkUe+#1oosfg$5gFL#LfQASN_lu~`$ z88&i!(pnF7Qj+S`X;~CHuGCU7$>@nSthKDq$SOr|ymp?dEhJI0g}B!BJPP!MmBm`>i5OP>EAD!;5#^v`EfhmXa^F^nvOj|XjQT*h3$f#-JsYeCNu`vidoOr!fwaXaQdRuKL~l>O`WwgS4-S6Me&;_vR7|TylK-OLBM$LgRcJq1&b)w7cw@mv z_>~0;Z_8+uzm)HKpx<+);g6f&b7h|AL4MDbhL7a;U~y^P%*36u8U}-E3BxvFJZ3AD zF_Kj~6U8>Yw)k2t?~pvq=kHh#Y!$2GR4IXI)ca7*lXFleL5(Wcx_;_N&Dc%5>_bKL zsfPaH{hleY>`oYyf(uxzUYGIg#Z-4mQE>F#Ft2lEu1@J*V6N-Vm9!02j9`)dT7iKO zRtY8;*kf*!h~!jLc(OHLm8v~!EMs$8bKCf&Mo0a24-R4bA`6BUJDEi0c8hd+rHvd` z6{(CfV$yCH7SmGtT*n!&xzVSL&5QdC?3XhHEa;^rnRxwqs1aoW(}3Y zOZ`fW(^a+IS~`>6w(D)?rZS(Vf!Xs?b((xw2gUke<(z0OqRa!$*|S)`Ns> zNIQmeCIhuDnw@A7j!AJVk}VOd(WR!xigg|WCPm=NGSSV*VW+W?cs6NK?O=c_fw9uK zsnOTwbWdJcRok7t^`1{BSm?smz^yFh@tzir+vQ&AN^y8wJfADL*l`c`e6BQpBoMug zp3fBqqOb9Mt~7oyU7dSAz_oLym2%@D2@Csr#;Ufh`Ha_DfMLHh7#lTcDn?sOk)$kN z)HInMn>gtqU`R4+OZW4bSWm&CJcv|NT=-i(q3RMiEbY8*dgAGMJ^@(D?s}D&oZ8HR z-zDvI4k1KMv$8CYqP600#1$5{db7!WF64cl4@h>prVfKfiR~~U#tGZyay^pTbhar8 z9m}lL2x&Od2vUZg57#0LbwnVW;e6|;1Gv1kPLcx+_)*v1#s0DxuL$7J;ZoJ%`Z~|& z9}3Us-)|!~!tlq#^SJ_`8)3Ll&z_j8$dmBg#i@-SsW3eAeg5qRa6c}-&kf+N{i6jx z;edO5@29Xyp2Yhpj(a@s=kgH`_kJ!Oaq9gXeG+-^$pTU`a`us=LAdZH8T7YagrTE5 zr+(Mb`^qQn$|rw6rF^oW^+7w1KYDsB`Z{_C>V#*}cftjy4{CnzK|78)mI~-?)X` zJ$V#h+mRE;aCz(km5}$p*%H@}wx#7_K*lT1ps<2ZKw zNNgvLJ*s8^Y90e57%^hh5<*NEAR)m3i6JmY2qYLZAOuJ}gh0^zPIhwk-Z^Jy-*eBs z_0T?pz0bD)<@dMN`oI5M>)DqpfAt@|SNYc&_yAw8eb+KlHwr8NJbU(Ds4*ZF|H-fcq|HO)d=YOU1 z;(dG`xMA|*_g{i9mk0U1mzDqdgUWyV!K=gmoA-ZQ{v&9X7r#%^vdS|&iL3NsD-d{| z)Krqh7p{Y6Jb^pBjQ4je-Vpg3E-<6khS^QJ?LfX|jG`HhNn_r}vD9YsY<-N{!(@mtcVvFxx5W7gH45 zvnoD04v18m?dG$B-p(e=r8yyznbPu1w6^Cc+&GRAR2mhRU=X}^V8$&iQBYTzNa1^d za`y0drkC5iRVEaC>$DB%9#IHVl9AGs8cPyOXT7mj(5e8RS$S(DA@n7bNeq3qvx3%o zs?xeZNXOgW3nI`^X3NvFe5$uRV zCga>QRU#JfW_g)&Dx(P`lgf8btUY{Qz6DOv=<>A!!f|54p&3H5D7^eovME7G8i!|e zMrH89$~6_2IE28p3~nQk0$(2vAT?>;ksM%j(!q$D>B*jqcf-hD`DDS493L^_jv=+g zJSUKrm6BD_x&I|nGCU-Zao#a^3hKFHm#D`IM{Mg!Xj4ME?6#BMQkv(96Gf6=D4X zB5cmyLYTWBPF87TwC0VxhoPNqJEXJw_w}oUu;g7MY$V{dBf|CqJ4N^Fnck`iGL~^i z7*iB6BW7%UZLWwN^fK0d5R98sy`Gt@20czU6_^$LIH%l=Pa|>Z?B6IHe#Vl6(-DV1&NW^JQNu((Z86mriv1gXC1=!Tx7D>ZKV~i^)Mo}TF|kkE!-s- zQ1`HIcZnqZfTzdkuDMq+xoBGgVzpWbCl4qmUVBS19Xr4KyAJ?{_y~MO;c&F_e)+T2 z?)~9a0F6rkE!wXDByLwBy4?BcdO-BjMLg20Blt4!hp4&ta|uz!(K!;hpfaJH01L*c z&l0AQ5i40Cf6?SVd5?hSaKN(_K$# z6`0l8C{t3Bn)L-D3Oz^aXs9$Bhz+z8HkV|bqPK3h$g~bf)!Y|1(`gY0Q{T)Jv>Hxk zY}Q!V42cHD)ldaavFdF@72s}SRjQ7rq_=BzSsqoli&Tv2Lo{nlV;f%;#mE&q?j+Xv zsye)zG{I-UA7WJ*s<=Hr>ju(Dk|wSobZU8>LifR7-lEtxDzrxEn%OKj!hX-vBu_PC zeLtfCF`3qx&A_YGNP!r7*iN4(%6z9~vlQP>Ok~ntp${N$_Aft#N#}ojA3P<6Pf6iZ zQusM0g_ZX$-?hW^#lL?7+tUo}X$JPW&cG^PDG8Dj7xJJC$dZ_u=m^ zJ^Qs6A67m%QzOscJDW7Y2Xr`(;=~RhXe)oB@>_8Hw{F>eQ2C9s-Px)JeqFYWc}dhf z-a?Pv^zjy-oNndsADJSwBzgXzWQzXg4de6IURM6X%gP@e8K1-Me|I&V*1UU+kEmdU zrqW&-F5Q4o`I*ngSo0#C{vsG3{;`bD#lT-Q#>agu<8v|aQH&3oR5$Hh+}mp<7}cvN zx{Z`-KJr8ZBk*x2nr zZ&2OJQC*b~j1kjrYi2SXb;$MX$%gA>4^Cp=hV>EY-EKtc4$(m8+iBb>)Ll2foV5N5 zq3q|+`s8oJ`nXKoBX+V0;&#{RiIHG?LYyecN{d=Vvh8fm&Di%-b=lH5tU9bE7+u%8 zozS-SyS}?!8R}}02{UR1Oxn;8{lL1x4L?*;?lov!TAC2lCpi z&zjXV1Nv^|=`Qs8ICmK9wd|Vk;N0V6t(u(m8RV67e{Dv;m69Xe% zfGZ@kF{fUU5Ss<=BcoU|MBm#@Q>rQ9`qgmt?pU7y4`pYwP7O|L7r56a=h+HEh+5=` zERW-j>TSg}8g&Ls>rS}3!}{RqeyVFq(5kXMCPF!37lxa$)TQ%nRp^;UtwBi2SSLss zvOZjgm}z4IY?al{)<$t{)+EW1j(c%`zE8ZcovaDmTfqevW%Cg0^KVPm=Rdy>o)W`f z4A$oYKyO+Kycqaqq@CzhxD@!582&sH!!z^qpPm5si^BX|;OGf(ch=tDCb7J|n)q{_ ziQQ#?t|@5HHz;UcKAHk5IhIdH0o}K_P66GqcnqIa8oc7O&aBb@_~C)IYLu+efB4~x zzkb6R{r=0!|NBAZ{~S4^!_K!z4fulAri<}%(p+a&r1bY}EjF<`sm~Xs5)vNE8C?u~ zR3cukzJ5U}q5QF&(Z#^Wqy{)Pa<=lYXDQt%lA6uQZc8!jYT>QsBi2o)E>_?xZ|RTt z=CUmyy3$=U4O`FjT{Iae1ZcC4T8tFd9Qxh;stfgBjj-mTSCjB}#~Hb)v=4=|Bxx z6kg$s{?1iqwqI)T=HyA}AhFTTjpS_7+@?DV5xJ_f4Wa_?!!_*9a^(%-@-c;pxAX5cRcd73f!LAS@zSzU#<&~)Umw=@HB z4P_TQLBcZXXgr{^nFsZVz8OllXX{W0#H>u+-%3z&2xi5llh9RMB^>MKiSxv(r!Nph zCXzTVcgMRV8@XN#im})nhbb1%`&ix)M-H{X_c^9!tvVL>cDX>O0@qP!)z?{)ThHdM zs$`AU3RxRDi>z|6#rV0@##y2>w4+)rQwn@|4A&TeFEAR)N=TxKXH%f zc;XmNc?G&h;jTlHJCPSOeHhZ_az5@5Q^qld;mqtey9leO)e+uCoo0V%dHY)*6*zoV zj>zE@K|=uOtBEq#7c=M@+H}mVkWjQN)JO@?H7Y?2S!E#$w1J1IVw*(L5p)3{d6hAxfK!tC^qznUSgW|; zRBvQ=01l$){j6qkqBm7quOIw?><*lCce`LM*Lh(;Hx?^If{IS7X)Cq8zd-6WT@P%C z@1=zleH&{c?eS=nxwUq6jbxzO3RGl*m>U6#?>J`1bnVdfDb9e44UQqE0{c4I9UGJ) zC-^qzpeIQObuURKEG}sbkwLWG7PqSS=zvC9IHFO7xP!u0fjkJI=YVn~mmn!_fY#hR zDtgs%wYeBAMkz5{+5BFQH%fJ9@yWC{FbBRt%idjg4)8Pb@OBYK>#W^LaU7eZd`&Rx zddBO${nF9Hy3W^UZr~7_-%=dj8FM|)^z{W$G~1sp=3x_?bcnd8VyZb~sRkQ2Lnvbm zb`6z&2zj&5z!yCwg`b0T{K6l+ioAEF;}-*;lEPp3r0_HHMNfcx0^HLq?9KS0bkACXA3){*q z-$uwN2;7uh8g6JsbDOdkZs;Cr(!K|N8-d%y(DspAwQ9)CRR9|N@YZpptsUo|<}f#6 zse6}mIE-incCt3CTUV1*-gG&qIvnHtAHB)2TzH0U7 zz;_Q;iW_WwBejobEKRlb9R7Xv06zvF*gL2$LmqdP@aB%g8P|t`F?;?vvo`pKUp|xb zd!hGkl3st79q^k6yYg9{zYHTauHF^~zIigF?6n`|rGidb+tyXfKM%flvgE@gHNw<| z&vAY}{q>9fv*0_W^6%Bns?pi{>gj(1zIHGk#nC!S-u(VfA3uB{o13rg@G6L$Gm_=i z)4&IN&rI9~rX623ygZ+}=c%h^4e-ZK=Q}(LK3qgsjk@4lCnGgB!o;vje?a8d&v$Zf zFa9L>8fmNz)AgY*v6IR-D_;Wuyg#o0wE0uC@@uDYFI(UngOe+|t-1Ve<>O~xu6+HD z5cBz$&So!PX)V81`4EnTddwR?aC^+jU!KR@Y`8V%q^SIMe|% z?w98>1wKBKcY;aicS?2vEQY;Wic7F2S8q1x zQIEq{CfC90`oP!FMVhxUFk#}P#)kN8s;LaNu&8)n(4-RgHPfB)+)(1?P~;J-aX|Di zZ=mu;eWnk_q%LF@&l<|CLiSrOJco8(+JU*PqOa^(Qk9uT^`{JpCnB1?+Ue8sPi zjRGU5Se0xp`YBP32Sb6}{%V0}3~M0YEr?hTpWa|xptTcseh*AtZN^>hd z^qFcNw(~LP4p-hF&imc@yvxxOy-^ot1!-VSrN7|BG*Gm<8iJnF!~z77G#%ARof&R; znxzME8Zg~O&6DI+`(c@7S;{!SUtN222Hm5a$NG!Pk9$ z6E?Xd`;;=ve{mHP@*%KnPJuRlJtKJ1+% zSQvfap&`Z0oG4}=-0iCH__e0fQWF%im+dM({aVwBDF^4ZCRxhpvZTAD%Cq!N@PPdu z41sVCaT6|=$)`HnGJb+v{VlTVYfZ{d75hx1(`|LCbVt~YQy{h{11ZL)THYbxXOv^r zF5BdS{=7)yrnDFsx?OKL2&Qj4$WmG(!_bL)DS^~YX11RuD5&;E`v|RN#%tD^aASHb zs+Vg%K^)fGZnbydVK<5d)(0P{azend1CM?KFh;-+GqO5hAKgCDE1Kezm_9Z$fAPn`$8g3_PX1*(Nn`gg2S_T1j%jf1j@ITccV7ILtG-At z3;mt`$rnk+EEzR-b|xANpQI4OSvVvNKlhW|L!H4Fm*n0GfGRzalVg4VxCvLEZ?%{B z6p5~Wljt7G>_1DQ3zOVqD;-Y7%~KxEl&y5waXy>y*(o1Cr{nkHGz9Wx7YwzPtDLL~ zG>P$(`eM+~l;&Emheg&&rTnFBjwc{MP}A| zxXheD;GBibkXV061Qbd5>fPmSa9H0q@CSTO*#YO(>fHT~88Ayew#>L4)Hz2_G!=ye zK{xJCt9nNEq< z$y*Qi1Wr|p_%QQV5H-s*!nz$lX=Yy)Z>Pd}xuRF0c z+{O2xw@_OAejaMGygI;f!Bcb;^~Hu^>|MXj6q(S|Q>l{&R}?2thQs&~$ndE`FIM0sJxm?@AS@TXr-L7OcdzU3ozwEg%{D;VdOec0}DI#7La*&+l>rlfK#nFj0TH*yZQmfWlkzGZu4fadYrt^`vStIsn<2f@Y zb7tC|Moc`(N=d$HXpQULD3h*1VeIML-ZX(f<-{B=3^ zn^JCY(z4K!TM@-hjr7TBygwKVfTeITSfs{Uz3=8%5nJH^?#+ED{O} z$GdqfOFeO<*KmB>^NhW{8unImrNwDUpIK~zyzr{Ogz@j9pTM2?cf(A)CjQ|gavNa^ z4P~LZwl3H%%^HQ&ZP#gZGL5`JHSF|>z9ZIqZ78A!(?OH!HR_1V8-WnfDpRQ3MsCfB z5v|pmDi^9Tr$i&ZEv?>l{Ch%NN#I_sG=>uv!8)8f%+rx8-$TsOT{g0*k0F*oy0q;J>e*Zs*bT^d|t6yP{D!2*=kwT35~y79D-!t5>nQ9$)2X#;=UsPZ_jh;QNqi2wUVQ5; Xth+fMa+ICGw|QNV@{Zp4=?(pV{-cXE literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/raft/configtx.yaml b/hyperledger_fabric/v1.4.2/raft/configtx.yaml new file mode 100644 index 00000000..5b21cca2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/configtx.yaml @@ -0,0 +1,833 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_2: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log new file mode 100644 index 00000000..2381e88a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_all.log @@ -0,0 +1,34344 @@ +Attaching to peer0.org2.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org1.example.com, orderer2.example.com, fabric-cli, orderer1.example.com, orderer0.example.com +peer0.org2.example.com | "2019-07-20 02:39:32.354 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 1.4.2 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.12.7 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.15 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-07-20 02:39:32.355 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer0.org2.example.com | "2019-07-20 02:39:32.355 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer0.org2.example.com | "2019-07-20 02:39:32.422 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer0.org2.example.com | "2019-07-20 02:39:32.485 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.8:7051" +peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 007 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.8:7051" +peer0.org2.example.com | "2019-07-20 02:39:32.486 UTC [peer] func1 -> INFO 009 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-07-20 02:39:32.510 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer0.org2.example.com | "2019-07-20 02:39:32.525 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-07-20 02:39:32.526 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-07-20 02:39:32.547 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-07-20 02:39:32.547 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-07-20 02:39:32.548 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-07-20 02:39:32.548 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer0.org2.example.com | "2019-07-20 02:39:32.562 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-07-20 02:39:32.570 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-07-20 02:39:32.571 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-07-20 02:39:32.579 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:32.583 UTC [cscc] Init -> INFO 015 Init CSCC" +peer0.org2.example.com | "2019-07-20 02:39:32.583 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:32.584 UTC [qscc] Init -> INFO 017 Init QSCC" +peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-07-20 02:39:32.585 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer0.org2.example.com | "2019-07-20 02:39:32.586 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-07-20 02:39:32.587 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org2.example.com | "2019-07-20 02:39:32.588 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org1.example.com | "2019-07-20 02:39:31.971 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 1.4.2 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.12.7 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.15 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-07-20 02:39:31.973 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org1.example.com | "2019-07-20 02:39:31.973 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org1.example.com | "2019-07-20 02:39:32.082 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org1.example.com | "2019-07-20 02:39:32.253 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org1.example.com | "2019-07-20 02:39:32.254 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.6:7051" +peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 007 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.6:7051" +peer1.org1.example.com | "2019-07-20 02:39:32.255 UTC [peer] func1 -> INFO 009 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-07-20 02:39:32.303 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org1.example.com | "2019-07-20 02:39:32.322 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-07-20 02:39:32.325 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-07-20 02:39:32.347 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-07-20 02:39:32.348 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-07-20 02:39:32.350 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-07-20 02:39:32.350 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org1.example.com | "2019-07-20 02:39:32.377 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-07-20 02:39:32.387 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-07-20 02:39:32.388 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-07-20 02:39:32.388 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:32.389 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org1.example.com | "2019-07-20 02:39:32.389 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:32.405 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org1.example.com | "2019-07-20 02:39:32.406 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:32.408 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-07-20 02:39:32.410 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org1.example.com | "2019-07-20 02:39:32.414 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-07-20 02:39:32.419 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org1.example.com | "2019-07-20 02:39:32.424 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-07-20 02:39:32.425 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org1.example.com | "2019-07-20 02:39:32.426 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org1.example.com | "2019-07-20 02:39:32.427 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org1.example.com | "2019-07-20 02:39:40.889 UTC [endorser] callChaincode -> INFO 023 [][73543c9d] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-07-20 02:39:40.890 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-07-20 02:39:40.893 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org1.example.com | "2019-07-20 02:39:40.906 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=4ms state_commit=1ms) commitHash=[]" +peer1.org1.example.com | "2019-07-20 02:39:40.908 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-07-20 02:39:40.911 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-07-20 02:39:40.933 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [endorser] callChaincode -> INFO 032 [][73543c9d] Exit chaincode: name:"cscc" (45ms)" +peer1.org1.example.com | "2019-07-20 02:39:40.934 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45700 grpc.code=OK grpc.call_duration=46.187ms +peer1.org1.example.com | "2019-07-20 02:39:41.691 UTC [endorser] callChaincode -> INFO 034 [][389896d6] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-07-20 02:39:41.693 UTC [endorser] callChaincode -> INFO 035 [][389896d6] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-07-20 02:39:41.694 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45708 grpc.code=OK grpc.call_duration=3.1992ms +peer1.org1.example.com | "2019-07-20 02:39:42.398 UTC [endorser] callChaincode -> INFO 037 [][5eef1526] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-07-20 02:39:42.400 UTC [endorser] callChaincode -> INFO 038 [][5eef1526] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-07-20 02:39:42.400 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45716 grpc.code=OK grpc.call_duration=2.8672ms +peer1.org1.example.com | "2019-07-20 02:39:45.912 UTC [gossip.channel] reportMembershipChanges -> INFO 03a Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-07-20 02:39:46.790 UTC [gossip.election] leaderElection -> INFO 03b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org2.example.com | "2019-07-20 02:39:31.646 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 1.4.2 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.12.7 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.15 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-07-20 02:39:31.647 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org2.example.com | "2019-07-20 02:39:31.647 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org2.example.com | "2019-07-20 02:39:31.708 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.7:7051" +peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 007 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-07-20 02:39:31.786 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.7:7051" +peer1.org2.example.com | "2019-07-20 02:39:31.790 UTC [peer] func1 -> INFO 009 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-07-20 02:39:31.807 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org2.example.com | "2019-07-20 02:39:31.820 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-07-20 02:39:31.821 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-07-20 02:39:31.839 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-07-20 02:39:31.840 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org2.example.com | "2019-07-20 02:39:31.918 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-07-20 02:39:31.939 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-07-20 02:39:31.941 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-07-20 02:39:31.943 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:31.945 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org2.example.com | "2019-07-20 02:39:31.947 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:31.951 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org2.example.com | "2019-07-20 02:39:31.952 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:31.953 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org2.example.com | "2019-07-20 02:39:31.953 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org2.example.com | "2019-07-20 02:39:31.961 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-07-20 02:39:31.962 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-07-20 02:39:31.963 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org2.example.com | "2019-07-20 02:39:31.965 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org2.example.com | "2019-07-20 02:39:31.966 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org2.example.com | "2019-07-20 02:39:31.967 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org2.example.com | "2019-07-20 02:39:41.194 UTC [endorser] callChaincode -> INFO 023 [][83b20271] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-07-20 02:39:41.195 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-07-20 02:39:41.198 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org2.example.com | "2019-07-20 02:39:41.211 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 8ms (state_validation=0ms block_and_pvtdata_commit=4ms state_commit=2ms) commitHash=[]" +peer1.org2.example.com | "2019-07-20 02:39:41.212 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-07-20 02:39:41.215 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-07-20 02:39:41.230 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-07-20 02:39:41.231 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org2.example.com | "2019-07-20 02:39:41.232 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-07-20 02:39:41.059 UTC [endorser] callChaincode -> INFO 023 [][2935a52e] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-07-20 02:39:41.061 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-07-20 02:39:41.062 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer0.org2.example.com | "2019-07-20 02:39:41.071 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 6ms (state_validation=0ms block_and_pvtdata_commit=3ms state_commit=1ms) commitHash=[]" +peer0.org2.example.com | "2019-07-20 02:39:41.073 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-07-20 02:39:41.076 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-07-20 02:39:41.091 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-07-20 02:39:41.093 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [cscc] Init -> INFO 02d Init CSCC" +peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:41.094 UTC [qscc] Init -> INFO 02f Init QSCC" +peer0.org2.example.com | "2019-07-20 02:39:41.095 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-07-20 02:39:41.095 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-07-20 02:39:41.096 UTC [endorser] callChaincode -> INFO 032 [][2935a52e] Exit chaincode: name:"cscc" (36ms)" +peer0.org2.example.com | "2019-07-20 02:39:41.096 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44620 grpc.code=OK grpc.call_duration=39.0359ms +peer0.org2.example.com | "2019-07-20 02:39:41.805 UTC [endorser] callChaincode -> INFO 034 [][3aa93181] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-07-20 02:39:41.806 UTC [endorser] callChaincode -> INFO 035 [][3aa93181] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-07-20 02:39:41.810 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44628 grpc.code=OK grpc.call_duration=7.0027ms +peer0.org2.example.com | "2019-07-20 02:39:42.539 UTC [endorser] callChaincode -> INFO 037 [][90c2c168] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-07-20 02:39:42.540 UTC [endorser] callChaincode -> INFO 038 [][90c2c168] Exit chaincode: name:"qscc" (1ms)" +peer0.org2.example.com | "2019-07-20 02:39:42.540 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44636 grpc.code=OK grpc.call_duration=2.8163ms +peer0.org2.example.com | "2019-07-20 02:39:46.891 UTC [comm.grpc.server] 1 -> INFO 03a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.89Z grpc.peer_address=172.18.0.6:46818 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.6µs +peer0.org2.example.com | "2019-07-20 02:39:46.903 UTC [comm.grpc.server] 1 -> INFO 03b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.893Z grpc.peer_address=172.18.0.6:46818 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.8011ms +peer0.org2.example.com | "2019-07-20 02:39:46.911 UTC [comm.grpc.server] 1 -> INFO 03c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.911Z grpc.peer_address=172.18.0.6:46820 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301.7µs +peer0.org2.example.com | "2019-07-20 02:39:47.040 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.04Z grpc.peer_address=172.18.0.5:41870 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=102.1µs +peer0.org2.example.com | "2019-07-20 02:39:47.055 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.042Z grpc.peer_address=172.18.0.5:41870 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.561ms +peer0.org2.example.com | "2019-07-20 02:39:47.067 UTC [comm.grpc.server] 1 -> INFO 03f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.066Z grpc.peer_address=172.18.0.5:41872 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=273.4µs +peer0.org2.example.com | "2019-07-20 02:39:47.094 UTC [gossip.election] beLeader -> INFO 040 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-07-20 02:39:47.094 UTC [gossip.service] func1 -> INFO 041 Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-07-20 02:39:47.125 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-07-20 02:39:47.131 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-07-20 02:39:47.131 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-07-20 02:39:47.132 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-07-20 02:39:47.165 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [1] in 40ms" +peer0.org2.example.com | "2019-07-20 02:39:47.172 UTC [comm.grpc.server] 1 -> INFO 047 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41872 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=102.6321ms +peer0.org2.example.com | "2019-07-20 02:39:47.188 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [1] with 1 transaction(s) in 20ms (state_validation=2ms block_and_pvtdata_commit=15ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org2.example.com | "2019-07-20 02:39:47.189 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.187Z grpc.peer_address=172.18.0.5:41878 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=846µs +peer0.org2.example.com | "2019-07-20 02:39:47.190 UTC [gossip.privdata] StoreBlock -> INFO 04a [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-07-20 02:39:47.195 UTC [gossip.gossip] JoinChan -> INFO 04b Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-07-20 02:39:47.203 UTC [gossip.gossip] learnAnchorPeers -> INFO 04c Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-07-20 02:39:47.204 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-07-20 02:39:47.204 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-07-20 02:39:47.222 UTC [committer.txvalidator] Validate -> INFO 04f [businesschannel] Validated block [2] in 31ms" +peer0.org2.example.com | "2019-07-20 02:39:47.232 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41878 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=35.1766ms +peer0.org2.example.com | "2019-07-20 02:39:47.244 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=1ms block_and_pvtdata_commit=6ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org2.example.com | "2019-07-20 02:39:47.276 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.275Z grpc.peer_address=172.18.0.5:41884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.3µs +peer0.org2.example.com | "2019-07-20 02:39:47.385 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.384Z grpc.peer_address=172.18.0.7:59192 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=205.6µs +peer0.org2.example.com | "2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41884 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=109.354ms +peer0.org2.example.com | "2019-07-20 02:39:47.400 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.396Z grpc.peer_address=172.18.0.7:59192 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=4.065ms +peer0.org2.example.com | "2019-07-20 02:39:47.419 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.419Z grpc.peer_address=172.18.0.7:59198 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120µs +peer0.org2.example.com | "2019-07-20 02:39:47.430 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.428Z grpc.peer_address=172.18.0.5:41900 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=437.2µs +peer0.org2.example.com | "2019-07-20 02:39:49.808 UTC [endorser] callChaincode -> INFO 058 [][2093db94] Entry chaincode: name:"lscc" " +peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [lscc] executeInstall -> INFO 059 Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [endorser] callChaincode -> INFO 05a [][2093db94] Exit chaincode: name:"lscc" (1ms)" +peer0.org2.example.com | "2019-07-20 02:39:49.809 UTC [comm.grpc.server] 1 -> INFO 05b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44702 grpc.code=OK grpc.call_duration=1.3837ms +peer0.org2.example.com | "2019-07-20 02:39:51.076 UTC [gossip.channel] reportMembershipChanges -> INFO 05c Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-07-20 02:40:22.845 UTC [gossip.privdata] StoreBlock -> INFO 05d [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-07-20 02:40:22.847 UTC [committer.txvalidator] Validate -> INFO 05e [businesschannel] Validated block [3] in 1ms" +peer0.org2.example.com | "2019-07-20 02:40:22.848 UTC [cceventmgmt] HandleStateUpdates -> INFO 05f Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-07-20 02:40:22.875 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [3] with 1 transaction(s) in 27ms (state_validation=5ms block_and_pvtdata_commit=15ms state_commit=5ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org2.example.com | "2019-07-20 02:40:26.873 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-07-20 02:40:26.874 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [4] in 0ms" +peer0.org2.example.com | "2019-07-20 02:40:26.904 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [4] with 1 transaction(s) in 28ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=11ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org2.example.com | "2019-07-20 02:40:29.915 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-07-20 02:40:29.916 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [5] in 0ms" +peer0.org2.example.com | "2019-07-20 02:40:29.938 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [5] with 1 transaction(s) in 19ms (state_validation=0ms block_and_pvtdata_commit=13ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org2.example.com | "2019-07-20 02:40:45.297 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.291Z grpc.peer_address=172.18.0.6:46984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=249.1µs +peer0.org2.example.com | "2019-07-20 02:40:45.300 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:46820 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=58.4550758s +peer0.org2.example.com | "2019-07-20 02:40:45.301 UTC [comm.grpc.server] 1 -> INFO 069 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.299Z grpc.peer_address=172.18.0.6:46984 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.7575ms +peer0.org1.example.com | "2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +peer0.org1.example.com | "2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" +peer0.org1.example.com | "2019-07-20 02:39:31.746 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-07-20 02:39:31.746 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" +peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" +peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +peer0.org1.example.com | "2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Library setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Label setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Pin setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Hash setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Security setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" +peer0.org1.example.com | "2019-07-20 02:39:31.750 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +peer0.org1.example.com | "2019-07-20 02:39:31.770 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +peer0.org1.example.com | "2019-07-20 02:39:31.784 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-07-20 02:39:31.791 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +peer0.org1.example.com | "2019-07-20 02:39:31.807 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-07-20 02:39:31.811 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +peer0.org1.example.com | "2019-07-20 02:39:31.815 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +peer0.org1.example.com | "2019-07-20 02:39:31.823 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-07-20 02:39:31.826 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +peer0.org1.example.com | "2019-07-20 02:39:31.828 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-07-20 02:39:31.828 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +peer0.org1.example.com | "2019-07-20 02:39:31.830 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +peer0.org1.example.com | "2019-07-20 02:39:31.834 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +peer0.org1.example.com | "2019-07-20 02:39:31.840 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [endorser] callChaincode -> INFO 032 [][83b20271] Exit chaincode: name:"cscc" (39ms)" +peer1.org2.example.com | "2019-07-20 02:39:41.233 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49876 grpc.code=OK grpc.call_duration=40.6461ms +peer1.org2.example.com | "2019-07-20 02:39:41.923 UTC [endorser] callChaincode -> INFO 034 [][be628b61] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-07-20 02:39:41.924 UTC [endorser] callChaincode -> INFO 035 [][be628b61] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-07-20 02:39:46.830 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-07-20 02:39:46.835 UTC [gossip.service] updateEndpoints -> WARN 040 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-07-20 02:39:46.850 UTC [committer.txvalidator] Validate -> INFO 041 [businesschannel] Validated block [1] in 19ms" +peer1.org1.example.com | "2019-07-20 02:39:46.862 UTC [kvledger] CommitWithPvtData -> INFO 042 [businesschannel] Committed block [1] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org1.example.com | "2019-07-20 02:39:46.863 UTC [gossip.privdata] StoreBlock -> INFO 043 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] JoinChan -> INFO 044 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-07-20 02:39:46.875 UTC [gossip.service] updateEndpoints -> WARN 047 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-07-20 02:39:46.901 UTC [committer.txvalidator] Validate -> INFO 048 [businesschannel] Validated block [2] in 37ms" +peer1.org1.example.com | "2019-07-20 02:39:46.926 UTC [kvledger] CommitWithPvtData -> INFO 049 [businesschannel] Committed block [2] with 1 transaction(s) in 24ms (state_validation=0ms block_and_pvtdata_commit=17ms state_commit=4ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org1.example.com | "2019-07-20 02:39:46.950 UTC [gossip.comm] func1 -> WARN 04a peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04c Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-07-20 02:39:46.951 UTC [gossip.discovery] expireDeadMembers -> WARN 04d Exiting" +peer1.org1.example.com | "2019-07-20 02:39:46.956 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.954Z grpc.peer_address=172.18.0.5:59648 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=92µs +peer1.org1.example.com | "2019-07-20 02:39:49.032 UTC [endorser] callChaincode -> INFO 04f [][73c4622e] Entry chaincode: name:"lscc" " +peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [lscc] executeInstall -> INFO 050 Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [endorser] callChaincode -> INFO 051 [][73c4622e] Exit chaincode: name:"lscc" (1ms)" +peer1.org1.example.com | "2019-07-20 02:39:49.033 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45780 grpc.code=OK grpc.call_duration=1.7228ms +peer1.org1.example.com | "2019-07-20 02:39:50.911 UTC [gossip.channel] reportMembershipChanges -> INFO 053 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-07-20 02:40:00.877 UTC [gossip.channel] reportMembershipChanges -> INFO 054 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-07-20 02:40:22.866 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-07-20 02:40:22.869 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [3] in 2ms" +peer1.org1.example.com | "2019-07-20 02:40:22.869 UTC [cceventmgmt] HandleStateUpdates -> INFO 057 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-07-20 02:40:22.887 UTC [kvledger] CommitWithPvtData -> INFO 058 [businesschannel] Committed block [3] with 1 transaction(s) in 18ms (state_validation=6ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org1.example.com | "2019-07-20 02:40:26.898 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-07-20 02:40:26.900 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [4] in 1ms" +peer1.org1.example.com | "2019-07-20 02:40:26.930 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [4] with 1 transaction(s) in 29ms (state_validation=0ms block_and_pvtdata_commit=24ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org1.example.com | "2019-07-20 02:40:29.921 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-07-20 02:40:29.923 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [5] in 1ms" +peer1.org1.example.com | "2019-07-20 02:40:29.934 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [5] with 1 transaction(s) in 10ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org1.example.com | "2019-07-20 02:40:45.208 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-07-20 02:40:45.211 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-07-20 02:40:45.211 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] JoinChan -> INFO 062 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 063 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 064 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-07-20 02:40:45.253 UTC [gossip.gossip] learnAnchorPeers -> INFO 065 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-07-20 02:40:45.254 UTC [gossip.service] updateEndpoints -> WARN 066 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-07-20 02:40:45.274 UTC [committer.txvalidator] Validate -> INFO 067 [businesschannel] Validated block [6] in 65ms" +peer1.org1.example.com | "2019-07-20 02:40:45.288 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [6] with 1 transaction(s) in 13ms (state_validation=0ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.comm] func1 -> WARN 069 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06a Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06b Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-07-20 02:40:45.308 UTC [gossip.discovery] expireDeadMembers -> WARN 06c Exiting" +peer1.org1.example.com | "2019-07-20 02:40:45.318 UTC [comm.grpc.server] 1 -> INFO 06d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:59648 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.4294128s +peer1.org1.example.com | "2019-07-20 02:40:45.843 UTC [gossip.channel] reportMembershipChanges -> INFO 06e Membership view has changed. peers went offline: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-07-20 02:40:47.026 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:49.026Z grpc.peer_address=172.18.0.8:36574 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=168.6µs +peer1.org1.example.com | "2019-07-20 02:40:50.842 UTC [gossip.channel] reportMembershipChanges -> INFO 070 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-07-20 02:40:59.646 UTC [endorser] callChaincode -> INFO 071 [][35b44e42] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-07-20 02:40:59.646 UTC [endorser] callChaincode -> INFO 072 [][35b44e42] Exit chaincode: name:"cscc" (0ms)" +peer1.org1.example.com | "2019-07-20 02:40:59.647 UTC [comm.grpc.server] 1 -> INFO 073 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45962 grpc.code=OK grpc.call_duration=1.0107ms +peer1.org1.example.com | "2019-07-20 02:41:00.613 UTC [endorser] callChaincode -> INFO 074 [][3e975194] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-07-20 02:41:00.618 UTC [endorser] callChaincode -> INFO 075 [][3e975194] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-07-20 02:41:00.624 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:45970 grpc.code=OK grpc.call_duration=12.8903ms +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | "2019-07-20 02:39:41.924 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49884 grpc.code=OK grpc.call_duration=1.4851ms +peer1.org2.example.com | "2019-07-20 02:39:42.683 UTC [endorser] callChaincode -> INFO 037 [][88363cc9] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-07-20 02:39:42.685 UTC [endorser] callChaincode -> INFO 038 [][88363cc9] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-07-20 02:39:42.686 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49892 grpc.code=OK grpc.call_duration=3.8474ms +peer1.org2.example.com | "2019-07-20 02:39:47.233 UTC [gossip.election] beLeader -> INFO 03a 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer1.org2.example.com | "2019-07-20 02:39:47.233 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-07-20 02:39:47.262 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-07-20 02:39:47.282 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-07-20 02:39:47.282 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-07-20 02:39:47.283 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-07-20 02:39:47.308 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" +peer1.org2.example.com | "2019-07-20 02:39:47.342 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 12ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=2ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org2.example.com | "2019-07-20 02:39:47.342 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-07-20 02:39:47.353 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-07-20 02:39:47.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-07-20 02:39:47.354 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-07-20 02:39:47.373 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [2] in 30ms" +peer1.org2.example.com | "2019-07-20 02:39:47.395 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=1ms block_and_pvtdata_commit=14ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.comm] func1 -> WARN 048 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 049 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 04a Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-07-20 02:39:47.587 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Exiting" +peer1.org2.example.com | "2019-07-20 02:39:47.614 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.613Z grpc.peer_address=172.18.0.5:41004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=112.8µs +peer1.org2.example.com | "2019-07-20 02:39:48.937 UTC [gossip.gossip] validateMsg -> WARN 04d StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-07-20 02:39:48.938 UTC [gossip.gossip] handleMessage -> WARN 04e Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid" +peer1.org2.example.com | "2019-07-20 02:39:50.346 UTC [endorser] callChaincode -> INFO 04f [][c315d392] Entry chaincode: name:"lscc" " +peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [lscc] executeInstall -> INFO 050 Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [endorser] callChaincode -> INFO 051 [][c315d392] Exit chaincode: name:"lscc" (1ms)" +peer1.org2.example.com | "2019-07-20 02:39:50.347 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49960 grpc.code=OK grpc.call_duration=1.698ms +peer1.org2.example.com | "2019-07-20 02:39:51.215 UTC [gossip.channel] reportMembershipChanges -> INFO 053 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-07-20 02:39:52.106 UTC [gossip.election] stopBeingLeader -> INFO 054 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [gossip.service] func1 -> INFO 055 Renounced leadership, stopping delivery service for channel businesschannel" +peer0.org2.example.com | "2019-07-20 02:40:45.317 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-07-20 02:40:45.318 UTC [cauthdsl] deduplicate -> WARN 06b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-07-20 02:40:45.319 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [deliveryClient] try -> WARN 056 Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-07-20 02:39:52.107 UTC [blocksProvider] DeliverBlocks -> WARN 057 [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-07-20 02:39:56.920 UTC [comm.grpc.server] 1 -> INFO 058 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:58.919Z grpc.peer_address=172.18.0.6:39470 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=187.3µs +peer1.org2.example.com | "2019-07-20 02:40:01.181 UTC [gossip.channel] reportMembershipChanges -> INFO 059 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-07-20 02:40:22.876 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-07-20 02:40:22.883 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [3] in 5ms" +peer1.org2.example.com | "2019-07-20 02:40:22.885 UTC [cceventmgmt] HandleStateUpdates -> INFO 05c Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-07-20 02:40:22.900 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [3] with 1 transaction(s) in 15ms (state_validation=2ms block_and_pvtdata_commit=10ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org2.example.com | "2019-07-20 02:40:26.878 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-07-20 02:40:26.879 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [4] in 0ms" +peer1.org2.example.com | "2019-07-20 02:40:26.915 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [4] with 1 transaction(s) in 36ms (state_validation=0ms block_and_pvtdata_commit=22ms state_commit=8ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org2.example.com | "2019-07-20 02:40:29.928 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-07-20 02:40:29.931 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [5] in 2ms" +peer1.org2.example.com | "2019-07-20 02:40:29.941 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [5] with 1 transaction(s) in 8ms (state_validation=0ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org2.example.com | "2019-07-20 02:40:45.327 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-07-20 02:40:45.329 UTC [cauthdsl] deduplicate -> WARN 065 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-07-20 02:40:45.329 UTC [cauthdsl] deduplicate -> WARN 066 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-07-20 02:40:45.334 UTC [gossip.gossip] JoinChan -> INFO 067 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-07-20 02:40:45.335 UTC [gossip.gossip] learnAnchorPeers -> INFO 068 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 069 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 06a No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-07-20 02:40:45.337 UTC [gossip.service] updateEndpoints -> WARN 06b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-07-20 02:40:45.356 UTC [committer.txvalidator] Validate -> INFO 06c [businesschannel] Validated block [6] in 28ms" +peer1.org2.example.com | "2019-07-20 02:40:45.381 UTC [kvledger] CommitWithPvtData -> INFO 06d [businesschannel] Committed block [6] with 1 transaction(s) in 21ms (state_validation=1ms block_and_pvtdata_commit=7ms state_commit=3ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org2.example.com | "2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=57.8775441s +peer1.org2.example.com | "2019-07-20 02:40:45.466 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.465Z grpc.peer_address=172.18.0.5:41144 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.4µs +peer1.org2.example.com | "2019-07-20 02:40:45.989 UTC [gossip.comm] func1 -> WARN 070 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-07-20 02:40:45.990 UTC [gossip.discovery] expireDeadMembers -> WARN 071 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-07-20 02:40:45.991 UTC [gossip.discovery] expireDeadMembers -> WARN 072 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-07-20 02:40:45.991 UTC [gossip.discovery] expireDeadMembers -> WARN 073 Exiting" +peer1.org2.example.com | "2019-07-20 02:40:45.993 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.993Z grpc.peer_address=172.18.0.8:59088 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=185.8µs +peer1.org2.example.com | "2019-07-20 02:40:46.146 UTC [gossip.channel] reportMembershipChanges -> INFO 075 Membership view has changed. peers went offline: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-07-20 02:40:51.145 UTC [gossip.channel] reportMembershipChanges -> INFO 076 Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-07-20 02:40:59.979 UTC [endorser] callChaincode -> INFO 077 [][155de4c2] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-07-20 02:40:59.983 UTC [endorser] callChaincode -> INFO 078 [][155de4c2] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-07-20 02:40:59.983 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50138 grpc.code=OK grpc.call_duration=4.5022ms +peer1.org2.example.com | "2019-07-20 02:41:01.051 UTC [endorser] callChaincode -> INFO 07a [][d685e3ac] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-07-20 02:41:01.052 UTC [endorser] callChaincode -> INFO 07b [][d685e3ac] Exit chaincode: name:"qscc" (1ms)" +peer1.org2.example.com | "2019-07-20 02:41:01.053 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:50146 grpc.code=OK grpc.call_duration=1.7483ms +peer0.org2.example.com | "2019-07-20 02:40:45.334 UTC [gossip.gossip] JoinChan -> INFO 06d Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-07-20 02:40:45.335 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-07-20 02:40:45.336 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-07-20 02:40:45.359 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-07-20 02:40:45.359 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-07-20 02:40:45.368 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.368Z grpc.peer_address=172.18.0.7:59338 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9µs +peer0.org2.example.com | "2019-07-20 02:40:45.382 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [6] in 65ms" +peer0.org2.example.com | "2019-07-20 02:40:45.383 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:59198 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=58.0302337s +peer0.org2.example.com | "2019-07-20 02:40:45.384 UTC [comm.grpc.server] 1 -> INFO 075 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.372Z grpc.peer_address=172.18.0.7:59338 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.1845ms +peer0.org2.example.com | "2019-07-20 02:40:45.395 UTC [kvledger] CommitWithPvtData -> INFO 076 [businesschannel] Committed block [6] with 1 transaction(s) in 11ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org2.example.com | "2019-07-20 02:40:45.425 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:41900 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=58.061562s +peer0.org2.example.com | "2019-07-20 02:40:45.489 UTC [comm.grpc.server] 1 -> INFO 078 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.489Z grpc.peer_address=172.18.0.5:42046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=97.5µs +peer0.org2.example.com | "2019-07-20 02:40:45.530 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.49Z grpc.peer_address=172.18.0.5:42046 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2124ms +peer0.org2.example.com | "2019-07-20 02:40:45.543 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.543Z grpc.peer_address=172.18.0.5:42048 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.4µs +peer0.org2.example.com | "2019-07-20 02:40:46.973 UTC [comm.grpc.server] 1 -> INFO 07b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:48.972Z grpc.peer_address=172.18.0.7:59352 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=112.2µs +peer0.org2.example.com | "2019-07-20 02:40:47.327 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:49.326Z grpc.peer_address=172.18.0.6:47010 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=120.1µs +peer0.org2.example.com | "2019-07-20 02:40:59.789 UTC [endorser] callChaincode -> INFO 07d [][e9f0f596] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-07-20 02:40:59.789 UTC [endorser] callChaincode -> INFO 07e [][e9f0f596] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-07-20 02:40:59.790 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44882 grpc.code=OK grpc.call_duration=2.6198ms +peer0.org2.example.com | "2019-07-20 02:41:00.883 UTC [endorser] callChaincode -> INFO 080 [][d33f7db2] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-07-20 02:41:00.885 UTC [endorser] callChaincode -> INFO 081 [][d33f7db2] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-07-20 02:41:00.885 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:44890 grpc.code=OK grpc.call_duration=2.512ms +orderer1.example.com | 2019-07-20 02:39:29.412 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-07-20 02:39:29.589 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-07-20 02:39:29.650 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2019-07-20 02:39:29.736 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2019-07-20 02:39:29.739 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-07-20 02:39:29.749 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer1.example.com | "2019-07-20 02:39:29.836 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-07-20 02:39:29.837 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-07-20 02:39:29.845 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-07-20 02:39:29.846 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.847 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.849 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer1.example.com | Version: 1.4.2 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.12.7 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-07-20 02:39:29.849 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:29.853 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:39.141 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-07-20 02:39:39.144 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +orderer1.example.com | "2019-07-20 02:39:39.156 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-07-20 02:39:39.156 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" +orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.166 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-07-20 02:39:39.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-07-20 02:39:39.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-07-20 02:39:39.175 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-07-20 02:39:39.176 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-07-20 02:39:39.177 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" +orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.183 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.221 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.222 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:39.222 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.266 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.279 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.286 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:40.287 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:39:45.507 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:40:22.840 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:40:26.829 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:40:29.905 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:40:45.145 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-07-20 02:40:45.157 UTC [cauthdsl] deduplicate -> WARN 043 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-07-20 02:40:45.158 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer2.example.com | 2019-07-20 02:39:29.666 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2019-07-20 02:39:29.838 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2019-07-20 02:39:29.872 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2019-07-20 02:39:29.937 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2019-07-20 02:39:29.937 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-07-20 02:39:29.947 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer2.example.com | "2019-07-20 02:39:29.990 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-07-20 02:39:29.990 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-07-20 02:39:30.014 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-07-20 02:39:30.015 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.037 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for fileledger +orderer2.example.com | Version: 1.4.2 +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer2.example.com | Commit SHA: development build +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer2.example.com | Go version: go1.12.7 +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer2.example.com | OS/Arch: linux/amd64" +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for ramledger +orderer2.example.com | "2019-07-20 02:39:30.038 UTC [orderer.consensus.etcdraft] run -> INFO 019 This node is picked to start campaign" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 1000 +orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for ramledger.HistorySize setting to int 1000 +orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for kafka.Topic +orderer2.example.com | "2019-07-20 02:39:30.041 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: false +orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for kafka.Verbose setting to bool false +orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for kafka.TLS +orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.379 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:31.007 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.398 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.Certificate setting to +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for kafka.TLS.RootCAs setting to +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for kafka.TLS.ClientAuthRequired setting to +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:31.009 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for kafka.TLS.ClientRootCAs setting to +orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: false +orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for kafka.TLS.Enabled setting to bool false +orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:31.012 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for kafka.TLS.PrivateKey setting to +orderer2.example.com | "2019-07-20 02:39:31.013 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.SASLPlain +orderer2.example.com | "2019-07-20 02:39:31.013 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value is not a string: false +orderer2.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer2.example.com | "2019-07-20 02:39:39.130 UTC [orderer.consensus.etcdraft] propose -> INFO 02f Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:39.130 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.SASLPlain.User setting to +orderer2.example.com | "2019-07-20 02:39:39.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 031 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:39.139 UTC [fsblkstorage] newBlockfileMgr -> INFO 032 Getting block information from block storage" +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.SASLPlain.Password setting to +orderer2.example.com | "2019-07-20 02:39:39.146 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 033 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value is not a string: +orderer2.example.com | "2019-07-20 02:39:39.147 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 034 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Version setting to +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.commmon.multichannel] newChain -> INFO 035 Created and starting new chain businesschannel" +orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for kafka.Retry +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] Start -> INFO 036 Starting Raft node" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] Configure -> INFO 037 Entering, channel: businesschannel, nodes: [ID: 1, +orderer0.example.com | 2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer0.example.com | 2019-07-20 02:39:29.404 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.LongInterval setting to string 5m +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.LongTotal setting to string 12h +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | 2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer0.example.com | 2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Metadata +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 +orderer2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Retry.Producer +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +peer0.org1.example.com | -----END CERTIFICATE-----" +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: 3 +peer0.org1.example.com | "2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for kafka.Retry.Consumer +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer0.example.com | 2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for kafka.Retry.ShortInterval setting to string 5s +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for debug +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for debug.BroadcastTraceDir setting to +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +orderer2.example.com | -----END CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +orderer2.example.com | ID: 2, +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for debug.DeliverTraceDir setting to +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[interface{}]interface{} value for operations +peer0.org1.example.com | -----END CERTIFICATE-----" +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +peer0.org1.example.com | "2019-07-20 02:39:31.845 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04a Found map[string]interface{} value for operations.TLS +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: false +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for operations.TLS.ClientAuthRequired setting to bool false +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | 2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: [] +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: false +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | 2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for operations.TLS.Enabled setting to bool false +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | 2019-07-20 02:39:29.412 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for operations.TLS.Certificate setting to +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for operations.TLS.PrivateKey setting to +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +peer0.org1.example.com | -----END CERTIFICATE-----" +orderer2.example.com | -----END CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for operations.TLS.RootCAs setting to +peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 057 Found map[interface{}]interface{} value for metrics +peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 058 Found map[string]interface{} value for metrics.Statsd +peer0.org1.example.com | "2019-07-20 02:39:31.850 UTC [nodeCmd] serve -> INFO 037 Starting peer: +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +peer0.org1.example.com | Version: 1.4.2 +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | 2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +peer0.org1.example.com | Commit SHA: development build +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | 2019-07-20 02:39:29.415 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +peer0.org1.example.com | Go version: go1.12.7 +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for metrics.Statsd.WriteInterval setting to string 30s +peer0.org1.example.com | OS/Arch: linux/amd64 +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: +peer0.org1.example.com | Chaincode: +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | 2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for metrics.Statsd.Prefix setting to +peer0.org1.example.com | Base Image Version: 0.4.15 +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +peer0.org1.example.com | Base Docker Namespace: hyperledger +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for metrics.Statsd.Network setting to string udp +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +peer0.org1.example.com | Docker Namespace: hyperledger" +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for metrics.Provider setting to string prometheus +peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | 2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for consensus +peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +orderer2.example.com | -----END CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" +peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" +orderer2.example.com | ]" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 038 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[interface{}]interface{} value for general +peer0.org1.example.com | "2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.ConnectionTimeout setting to +peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03c 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +peer0.org1.example.com | "2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.common.cluster] Configure -> INFO 03e Exiting" +orderer0.example.com | 2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:31.921 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] start -> INFO 03f Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.LocalMSPID setting to string OrdererMSP +peer0.org1.example.com | "2019-07-20 02:39:31.922 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 040 3 became follower at term 0" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06f Found map[string]interface{} value for general.Authentication +peer0.org1.example.com | "2019-07-20 02:39:31.923 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] newRaft -> INFO 041 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.419 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +peer0.org1.example.com | "2019-07-20 02:39:31.983 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" +orderer2.example.com | "2019-07-20 02:39:39.162 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 1" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.420 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Authentication.TimeWindow setting to string 15m +peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +orderer2.example.com | "2019-07-20 02:39:39.168 UTC [orderer.consensus.etcdraft] apply -> INFO 043 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.420 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +orderer2.example.com | "2019-07-20 02:39:39.173 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.433 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.LedgerType setting to string file +peer0.org1.example.com | "2019-07-20 02:39:31.984 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +orderer2.example.com | "2019-07-20 02:39:39.173 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.434 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:31.985 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +orderer2.example.com | "2019-07-20 02:39:40.266 UTC [orderer.consensus.etcdraft] Step -> INFO 046 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +peer0.org1.example.com | "2019-07-20 02:39:32.009 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +orderer2.example.com | "2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +peer0.org1.example.com | "2019-07-20 02:39:32.009 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +orderer2.example.com | "2019-07-20 02:39:40.277 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 048 3 became follower at term 2" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.ListenPort setting to string 7050 +peer0.org1.example.com | "2019-07-20 02:39:32.010 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +orderer2.example.com | "2019-07-20 02:39:40.280 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +orderer2.example.com | "2019-07-20 02:39:40.288 UTC [orderer.consensus.etcdraft] run -> INFO 04a raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.GenesisMethod setting to string file +peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +orderer2.example.com | "2019-07-20 02:39:40.289 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04b Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.436 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +orderer2.example.com | "2019-07-20 02:39:43.254 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04c Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.444 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.SystemChannel setting to +peer0.org1.example.com | "2019-07-20 02:39:32.055 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +orderer2.example.com | "2019-07-20 02:39:45.481 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.447 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for general.Keepalive +peer0.org1.example.com | "2019-07-20 02:39:32.055 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +orderer2.example.com | "2019-07-20 02:40:22.843 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer0.example.com | 2019-07-20 02:39:29.448 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | "2019-07-20 02:40:26.830 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | "2019-07-20 02:39:32.057 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +orderer0.example.com | 2019-07-20 02:39:29.448 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer2.example.com | "2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | "2019-07-20 02:40:45.139 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer2.example.com | "2019-07-20 02:40:45.140 UTC [cauthdsl] deduplicate -> WARN 052 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-07-20 02:39:32.080 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer2.example.com | "2019-07-20 02:40:45.140 UTC [cauthdsl] deduplicate -> WARN 053 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-07-20 02:39:32.081 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.Keepalive.ServerTimeout setting to string 20s +peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" +orderer0.example.com | 2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-07-20 02:39:29.450 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" +orderer0.example.com | 2019-07-20 02:39:29.457 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for general.TLS +peer0.org1.example.com | "2019-07-20 02:39:32.093 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" +orderer0.example.com | 2019-07-20 02:39:29.458 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.5:7051" +orderer0.example.com | 2019-07-20 02:39:29.459 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" +orderer0.example.com | 2019-07-20 02:39:29.460 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: false +peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.5:7051" +orderer0.example.com | 2019-07-20 02:39:29.461 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.TLS.ClientAuthRequired setting to bool false +peer0.org1.example.com | "2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" +orderer0.example.com | 2019-07-20 02:39:29.461 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-07-20 02:39:29.462 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.TLS.ClientRootCAs setting to +peer0.org1.example.com | "2019-07-20 02:39:32.117 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" +orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +peer0.org1.example.com | "2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.TLS.Enabled setting to string true +peer0.org1.example.com | "2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" +orderer0.example.com | 2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.200 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" +orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" +orderer0.example.com | 2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +orderer0.example.com | 2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for general.BCCSP +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" +orderer0.example.com | 2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for general.BCCSP.SW +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.201 UTC [nodeCmd] serve -> DEBU 06a Running peer" +orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" +orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: 256 +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" +orderer0.example.com | 2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for general.BCCSP.SW.Security setting to int 256 +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06d Found map[string]interface{} value for peer.handlers.validators" +orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for peer.handlers.validators.vscc" +orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: " +orderer0.example.com | 2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.BCCSP.Default setting to string SW +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for peer.handlers.validators.vscc.library setting to " +orderer0.example.com | 2019-07-20 02:39:29.468 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for general.Cluster +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +orderer0.example.com | 2019-07-20 02:39:29.470 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +orderer0.example.com | 2019-07-20 02:39:29.471 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for general.Cluster.ListenPort setting to +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +orderer0.example.com | 2019-07-20 02:39:29.472 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-07-20 02:39:29.472 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +orderer0.example.com | 2019-07-20 02:39:29.473 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.endorsers" +orderer0.example.com | 2019-07-20 02:39:29.474 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Cluster.DialTimeout setting to +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.endorsers.escc" +orderer0.example.com | 2019-07-20 02:39:29.474 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +orderer0.example.com | 2019-07-20 02:39:29.475 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Cluster.ReplicationRetryTimeout setting to +peer0.org1.example.com | "2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +orderer0.example.com | 2019-07-20 02:39:29.476 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " +orderer0.example.com | 2019-07-20 02:39:29.476 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.Cluster.ListenAddress setting to +peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.endorsers.escc.library setting to " +orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +peer0.org1.example.com | "2019-07-20 02:39:32.204 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +peer0.org1.example.com | "2019-07-20 02:39:32.218 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +orderer0.example.com | 2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.257 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" +orderer0.example.com | 2019-07-20 02:39:29.478 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.Cluster.ReplicationBufferSize setting to +peer0.org1.example.com | "2019-07-20 02:39:32.258 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-07-20 02:39:29.479 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | 2019-07-20 02:39:29.480 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.Cluster.ReplicationPullTimeout setting to +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 2019-07-20 02:39:29.480 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | 2019-07-20 02:39:29.482 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for general.Cluster.ServerPrivateKey setting to +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | 2019-07-20 02:39:29.482 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | 2019-07-20 02:39:29.483 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for general.Cluster.ReplicationMaxRetries setting to +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | 2019-07-20 02:39:29.483 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +orderer0.example.com | 2019-07-20 02:39:29.485 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +orderer0.example.com | 2019-07-20 02:39:29.485 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | 2019-07-20 02:39:29.486 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for general.Cluster.ServerCertificate setting to +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: 10 +peer0.org1.example.com | -----END CERTIFICATE-----" +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for general.Cluster.SendBufferSize setting to int 10 +peer0.org1.example.com | "2019-07-20 02:39:32.258 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +orderer0.example.com | 2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for general.Cluster.RPCTimeout setting to +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0be Found map[string]interface{} value for general.Profile +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [gossip.pull] Add -> DEBU 086 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] LaunchConfig -> DEBU 087 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 088 start container: lscc:1.4.2" +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: false +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 089 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for general.Profile.Enabled setting to bool false +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 08a start container with env: +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for general.ListenAddress setting to string 0.0.0.0 +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08b waiting for container(lscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08c got container (lscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.259 UTC [inproccontroller] getInstance -> DEBU 08d chaincode instance created for lscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 08e container lock deleted(lscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 08f waiting for container(lscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 090 got container (lscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU 092 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 093 Sleeping 25s" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.gossip] start -> INFO 094 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.discovery] Connect -> DEBU 095 Skipping connecting to myself" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [inproccontroller] func2 -> DEBU 096 chaincode-support started for lscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [gossip.gossip] syncDiscovery -> DEBU 097 Entering discovery sync with interval 4s" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 098 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 099 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 09a Sign: digest: 7E3C77047CA93B8C7F731924D75623F5C661C7730339FC5CC4407511CEC80F44 " +peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 09b Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.261 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Launch -> DEBU 0a6 launch complete" +peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0a7 Entry" +peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] handleMessage -> DEBU 0a8 [dbe52f5c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Notify -> DEBU 0a9 [dbe52f5c] notifying Txid:dbe52f5c-537d-44e1-816c-4dfa64df5df7, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0aa Exit" +peer0.org1.example.com | "2019-07-20 02:39:32.267 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0af start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.269 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Launch -> DEBU 0c0 launch complete" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c1 Entry" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [cscc] Init -> INFO 0c2 Init CSCC" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0c3 [dd4774bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Notify -> DEBU 0c4 [dd4774bb] notifying Txid:dd4774bb-4464-4743-9294-61e3823b8baa, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c5 Exit" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0ca start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.2 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-07-20 02:39:32.271 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.272 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:39:32.274 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" +peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " +peer0.org1.example.com | "2019-07-20 02:39:32.276 UTC [chaincode] Launch -> DEBU 0db launch complete" +peer0.org1.example.com | "2019-07-20 02:39:32.276 UTC [chaincode] Execute -> DEBU 0dc Entry" +peer0.org1.example.com | "2019-07-20 02:39:32.278 UTC [qscc] Init -> INFO 0dd Init QSCC" +peer0.org1.example.com | "2019-07-20 02:39:32.280 UTC [chaincode] handleMessage -> DEBU 0de [e80edd21] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [chaincode] Notify -> DEBU 0df [e80edd21] notifying Txid:e80edd21-ca6d-4ff6-8876-1ec3a73be04a, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [chaincode] Execute -> DEBU 0e0 Exit" +peer0.org1.example.com | "2019-07-20 02:39:32.282 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" +peer0.org1.example.com | "2019-07-20 02:39:32.285 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" +peer0.org1.example.com | "2019-07-20 02:39:32.287 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-07-20 02:39:32.288 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" +peer0.org1.example.com | "2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-07-20 02:39:32.297 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org1.example.com | "2019-07-20 02:39:32.298 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" +peer0.org1.example.com | "2019-07-20 02:39:32.299 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org1.example.com | "2019-07-20 02:39:32.299 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" +peer0.org1.example.com | "2019-07-20 02:39:32.402 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.398Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5235ms +peer0.org1.example.com | "2019-07-20 02:39:32.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:32.411 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33926" +peer0.org1.example.com | "2019-07-20 02:39:32.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33926" +peer0.org1.example.com | "2019-07-20 02:39:32.413 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:32.414 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:32.416 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:32.419 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:39:32.420 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 62 50 27 ef fd ff 99 f3 fa 9f fb 25 |0D. bP'........%| +peer0.org1.example.com | 00000010 a5 b6 dd 69 14 43 54 dd 2a 89 a8 f7 84 a5 5b 13 |...i.CT.*.....[.| +peer0.org1.example.com | 00000020 cf 71 2b e4 02 20 4f fc b5 89 f4 24 86 29 6b 28 |.q+.. O....$.)k(| +peer0.org1.example.com | 00000030 3a 35 21 ab 22 9e b5 b1 74 3d 09 a4 e6 f7 fc f5 |:5!."...t=......| +peer0.org1.example.com | 00000040 6f 49 7a 82 89 a8 |oIz...|" +peer0.org1.example.com | "2019-07-20 02:39:32.421 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:33926" +peer0.org1.example.com | "2019-07-20 02:39:32.422 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:33926" +peer0.org1.example.com | "2019-07-20 02:39:32.430 UTC [grpc] infof -> DEBU 0fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:32.430 UTC [gossip.comm] readFromStream -> DEBU 0fb Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [gossip.comm] func2 -> DEBU 0fc Client 172.18.0.6:33926 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [comm.grpc.server] 1 -> INFO 0fd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:42.407Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.192ms +peer0.org1.example.com | "2019-07-20 02:39:32.431 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:32.454 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.454Z grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197.1µs +peer0.org1.example.com | "2019-07-20 02:39:32.459 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.459 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2019-07-20 02:39:29.489 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-07-20 02:39:29.495 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer0.example.com | "2019-07-20 02:39:29.496 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" +orderer0.example.com | "2019-07-20 02:39:29.496 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-07-20 02:39:29.504 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-07-20 02:39:29.508 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-07-20 02:39:29.514 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-07-20 02:39:29.519 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-07-20 02:39:29.544 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-07-20 02:39:29.565 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-07-20 02:39:29.567 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-07-20 02:39:29.567 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-07-20 02:39:29.578 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-07-20 02:39:29.587 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-07-20 02:39:29.589 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-07-20 02:39:29.589 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-07-20 02:39:29.590 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.611 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:32.460 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:32.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:33928" +peer0.org1.example.com | "2019-07-20 02:39:32.461 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33928" +peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 85 eb 32 2b fe ea 70 97 13 df 66 |0E.!...2+..p...f| +peer0.org1.example.com | 00000010 e9 5c c6 70 13 8f 58 3f 4f 20 49 5a e1 e0 e1 ee |.\.p..X?O IZ....| +peer0.org1.example.com | 00000020 a7 8f cf 97 9f 02 20 4f ba b9 6e f9 d5 5f 68 74 |...... O..n.._ht| +peer0.org1.example.com | 00000030 7e cb 7c 45 6e 42 34 68 ad c6 02 40 62 d9 26 fc |~.|EnB4h...@b.&.| +peer0.org1.example.com | 00000040 b6 09 5f 11 9d 76 7b |.._..v{|" +peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.6:33928" +peer0.org1.example.com | "2019-07-20 02:39:32.462 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.6:33928" +peer0.org1.example.com | "2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:32.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 36 0d 2b a0 4d e4 ea 95 4f ef f9 af c3 09 b0 27 |6.+.M...O......'| +peer0.org1.example.com | 00000010 b8 80 33 7f 2b 77 a6 c9 a2 75 9a f0 4e fc 58 d7 |..3.+w...u..N.X.|" +peer0.org1.example.com | "2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 25 dd d1 a7 26 c2 43 34 f9 e9 31 43 |0D. %...&.C4..1C| +peer0.org1.example.com | 00000010 4f 3b eb 07 56 1b 0a 3f 54 e2 5c 23 68 4d 40 9c |O;..V..?T.\#hM@.| +peer0.org1.example.com | 00000020 41 1a 2d 55 02 20 37 4c b4 f5 a0 c2 d7 29 1f 75 |A.-U. 7L.....).u| +peer0.org1.example.com | 00000030 0c 56 24 ca a0 d1 b4 fe 97 3e 81 41 d5 c0 75 e5 |.V$......>.A..u.| +peer0.org1.example.com | 00000040 f7 38 75 74 19 67 |.8ut.g|" +orderer0.example.com | "2019-07-20 02:39:29.624 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +orderer0.example.com | "2019-07-20 02:39:29.630 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.631 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +orderer0.example.com | "2019-07-20 02:39:29.632 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.633 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +peer0.org1.example.com | "2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 44 02 20 34 36 e8 01 7a 14 85 df a0 47 d9 b9 |0D. 46..z....G..| +peer0.org1.example.com | 00000010 2e 59 03 c5 a1 0a 2c 4c b5 0f f1 1b ca 87 d9 8e |.Y....,L........| +peer0.org1.example.com | 00000020 79 0b c5 47 02 20 3c 8e 2d e4 2f 26 7c 34 f6 8a |y..G. <.-./&|4..| +peer0.org1.example.com | 00000030 0d f0 9e ca d7 64 cd cb f6 6e c3 e5 da df b4 6b |.....d...n.....k| +peer0.org1.example.com | 00000040 e2 10 6f b9 5e 1c |..o.^.|" +peer0.org1.example.com | "2019-07-20 02:39:32.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: EEDAC9CD7ACBCFE46971DB564C2E5AA365F0897976382B04176023690F93A5FB " +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > alive:>R\277\2201\255\033\r\002 \005D\200h\362\266?i\207\217q\025\313\330ZC\267\352kq\311\211\343\2617\235\025\000\344\226\210\\" > > " +peer0.org1.example.com | "2019-07-20 02:39:32.492 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:32.493 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 121 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 123 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 124 Sign: digest: 211019455ECE33402BE8AD1B57D6700DECF3ACD4ED804612AC12B9E9313E91EB " +peer0.org1.example.com | "2019-07-20 02:39:36.263 UTC [gossip.pull] Hello -> DEBU 122 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:36.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 125 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.267 UTC [msp.identity] Sign -> DEBU 129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:36.268 UTC [msp.identity] Sign -> DEBU 12b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:36.268 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.pull] HandleMessage -> DEBU 12c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.gossip] handleMessage -> DEBU 12d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.269 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 12f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 130 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 131 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 132 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.274 UTC [msp.identity] Verify -> DEBU 134 Verify: digest = 00000000 21 10 19 45 5e ce 33 40 2b e8 ad 1b 57 d6 70 0d |!..E^.3@+...W.p.| +peer0.org1.example.com | 00000010 ec f3 ac d4 ed 80 46 12 ac 12 b9 e9 31 3e 91 eb |......F.....1>..|" +peer0.org1.example.com | "2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 135 Verify: sig = 00000000 30 44 02 20 75 92 f8 13 f9 05 80 6b a6 5a dd 11 |0D. u......k.Z..| +peer0.org1.example.com | 00000010 04 4a 13 44 8c 31 b6 27 0b 7e 7e 52 24 27 16 30 |.J.D.1.'.~~R$'.0| +peer0.org1.example.com | 00000020 78 8c e4 f8 02 20 41 3a 4e a0 89 47 69 8e eb 59 |x.... A:N..Gi..Y| +peer0.org1.example.com | 00000030 02 fd 65 7e bd 0c bb f6 cc 94 6b cb 62 34 e3 66 |..e~......k.b4.f| +peer0.org1.example.com | 00000040 c5 49 92 a5 1b 52 |.I...R|" +peer0.org1.example.com | "2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 136 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [msp.identity] Verify -> DEBU 137 Verify: sig = 00000000 30 44 02 20 6b bc 72 89 6c 1d 1d 1b 36 c1 15 b6 |0D. k.r.l...6...| +peer0.org1.example.com | 00000010 39 dd 83 03 86 77 d8 5a 85 54 25 1b ec c7 43 5d |9....w.Z.T%...C]| +peer0.org1.example.com | 00000020 4a 43 70 ae 02 20 68 98 18 0a 06 aa 57 4c 06 4e |JCp.. h.....WL.N| +peer0.org1.example.com | 00000030 f3 68 07 f4 17 45 97 ba 0b 05 b1 8e 1e 90 1b 32 |.h...E.........2| +peer0.org1.example.com | 00000040 d8 78 a6 6c 8a a2 |.x.l..|" +peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 138 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.276 UTC [gossip.discovery] isSentByMe -> DEBU 139 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.277 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 4f 90 a0 9f b8 cf 4a 75 20 35 a7 40 01 2b f7 da |O.....Ju 5.@.+..| +peer0.org1.example.com | 00000010 51 a2 5b cf 01 b4 45 67 d4 ec 36 3b 03 e3 bd 45 |Q.[...Eg..6;...E|" +peer0.org1.example.com | "2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 44 02 20 1d 01 0c 87 a1 38 7c 87 13 7f fd 4b |0D. .....8|....K| +peer0.org1.example.com | 00000010 8c 72 9b 09 e7 23 ad b2 88 dc 88 6c fc 18 64 06 |.r...#.....l..d.| +peer0.org1.example.com | 00000020 af 43 39 ff 02 20 43 8a c1 20 ed 57 fc 47 32 d8 |.C9.. C.. .W.G2.| +peer0.org1.example.com | 00000030 a8 40 a5 66 3d 51 73 45 c6 08 be 29 fe 34 9b f6 |.@.f=QsE...).4..| +peer0.org1.example.com | 00000040 79 bb 9c 1a e1 1e |y.....|" +peer0.org1.example.com | "2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:36.279 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 16 3c 72 12 9c 25 47 ad 46 87 84 11 |0D. . DEBU 13f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 140 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 141 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 142 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 143 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 144 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 145 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.389 UTC [gossip.gossip] handleMessage -> DEBU 147 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.pull] HandleMessage -> DEBU 148 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.pull] SendDigest -> DEBU 149 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:36.390 UTC [gossip.gossip] handleMessage -> DEBU 14a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14b Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.392 UTC [msp.identity] Verify -> DEBU 14e Verify: digest = 00000000 d7 41 d0 00 0d a5 df 97 b5 63 d9 35 cc b1 55 f4 |.A.......c.5..U.| +peer0.org1.example.com | 00000010 50 2f ac 24 ca 99 16 8a 79 65 7c 17 76 7e 64 f6 |P/.$....ye|.v~d.|" +peer0.org1.example.com | "2019-07-20 02:39:36.393 UTC [msp.identity] Verify -> DEBU 14f Verify: sig = 00000000 30 45 02 21 00 f7 66 84 2f 80 96 e4 11 e9 98 77 |0E.!..f./......w| +peer0.org1.example.com | 00000010 8e dc 64 69 e2 4b be 65 e2 0d 24 39 a7 5b 1d ec |..di.K.e..$9.[..| +peer0.org1.example.com | 00000020 04 5f aa df a0 02 20 6e 2d f4 71 eb e3 2a 02 f4 |._.... n-.q..*..| +peer0.org1.example.com | 00000030 7a 4f b8 24 68 12 75 49 20 31 26 67 e2 28 a8 d3 |zO.$h.uI 1&g.(..| +peer0.org1.example.com | 00000040 b8 d2 40 56 20 e4 8c |..@V ..|" +peer0.org1.example.com | "2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 150 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 151 Verify: sig = 00000000 30 45 02 21 00 ff ee 1f 07 ad 2c d2 29 08 25 84 |0E.!......,.).%.| +peer0.org1.example.com | 00000010 6b f2 d5 03 e7 45 a6 c6 5a cb e9 ce c2 9d 9b ac |k....E..Z.......| +peer0.org1.example.com | 00000020 7d ef b8 ab 56 02 20 38 dc 65 7f 35 54 a9 03 6f |}...V. 8.e.5T..o| +peer0.org1.example.com | 00000030 e4 7c 93 22 6f a6 0d 11 70 db 3c f4 86 5a f0 18 |.|."o...p.<..Z..| +peer0.org1.example.com | 00000040 bd d4 8f 94 b4 c0 2e |.......|" +peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] handleAliveMessage -> DEBU 152 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 153 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 154 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 155 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 156 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 157 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 158 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.397 UTC [gossip.discovery] sendMemResponse -> DEBU 15a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15d Sign: digest: 9E663365013BAC851079C3A861364AACC5702496BD7AFEF63FF43118C2632810 " +peer0.org1.example.com | "2019-07-20 02:39:36.399 UTC [msp] GetDefaultSigningIdentity -> DEBU 15e Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:36.399 UTC [msp.identity] Sign -> DEBU 15f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [msp.identity] Sign -> DEBU 160 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] Send -> DEBU 161 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 162 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 163 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:36.400 UTC [gossip.discovery] sendMemResponse -> DEBU 164 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-07-20 02:39:37.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 165 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: 6D019AA9062B5A0ABE1771EDAEB34763445AAA0B5583E7B6A2EE3FD1C6026BF9 " +peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 168 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 169 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 16a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:37.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16b Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:37.268 UTC [gossip.pull] SendReq -> DEBU 16c Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:37.268 UTC [gossip.comm] Send -> DEBU 16d Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.270 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:37.271 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.272 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.273 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +peer0.org1.example.com | "2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 45 02 21 00 88 ae 14 68 e2 c9 46 e7 0e 04 37 |0E.!....h..F...7| +peer0.org1.example.com | 00000010 7a cf 20 f4 48 de 51 c5 26 81 c9 7d bf d2 e1 22 |z. .H.Q.&..}..."| +peer0.org1.example.com | 00000020 92 5c db 53 bb 02 20 64 3b 35 98 f1 7a 45 c6 c3 |.\.S.. d;5..zE..| +peer0.org1.example.com | 00000030 6a 90 0c 7a 65 13 3a f8 b1 79 89 ea 5d 3f 80 01 |j..ze.:..y..]?..| +peer0.org1.example.com | 00000040 0f 10 7f 24 b3 f0 1a |...$...|" +peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +peer0.org1.example.com | "2019-07-20 02:39:37.275 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.391 UTC [gossip.pull] SendRes -> DEBU 17d Sending 1 IDENTITY_MSG items to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 17e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 180 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.399 UTC [msp.identity] Verify -> DEBU 181 Verify: digest = 00000000 53 76 f4 8a 78 bb 68 76 6e e7 aa 10 ec 24 f1 3c |Sv..x.hvn....$.<| +peer0.org1.example.com | 00000010 9a dc fc 94 b2 ae 95 73 f5 89 48 e3 4f 0b 30 d5 |.......s..H.O.0.|" +peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 182 Verify: sig = 00000000 30 44 02 20 02 38 29 0a 50 83 ea 0f e0 ac 37 54 |0D. .8).P.....7T| +peer0.org1.example.com | 00000010 fd 34 dd e6 05 20 ca 03 23 b9 06 37 c1 3f 25 88 |.4... ..#..7.?%.| +peer0.org1.example.com | 00000020 f9 5b b2 99 02 20 70 f1 47 d7 b2 fa f0 27 e6 b9 |.[... p.G....'..| +peer0.org1.example.com | 00000030 81 12 b5 bf 5a 74 bd fa dc 25 d5 10 30 76 cd cc |....Zt...%..0v..| +peer0.org1.example.com | 00000040 3f 22 7e 41 c5 f8 |?"~A..|" +peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 6a f1 88 46 44 1b 12 fc ee 2d 8c d8 |0D. j..FD....-..| +peer0.org1.example.com | 00000010 a3 00 77 67 93 6e 30 31 a1 89 f5 af e4 d6 0e e5 |..wg.n01........| +peer0.org1.example.com | 00000020 45 95 d3 52 02 20 57 6b a7 19 b6 18 a7 0b 40 0a |E..R. Wk......@.| +peer0.org1.example.com | 00000030 b0 03 22 5f f8 a4 c1 06 1f 8b 7f 6b a9 2f 41 07 |.."_.......k./A.| +peer0.org1.example.com | 00000040 29 0d 5c c2 6c a9 |).\.l.|" +peer0.org1.example.com | "2019-07-20 02:39:37.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 185 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:37.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 186 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 187 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 188 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:37.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.267 UTC [gossip.pull] Hello -> DEBU 18d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:40.267 UTC [gossip.comm] Send -> DEBU 18e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 18f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 190 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 191 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.pull] HandleMessage -> DEBU 192 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 193 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 194 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 195 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 196 Sign: digest: 52A61F90DF58B1B9C98008BF88E86A627536A127FBD4B46A3D7CECBA9D5FD2B8 " +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 197 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 198 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 199 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] Send -> DEBU 19a Entering, sending GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a0 Verify: digest = 00000000 52 a6 1f 90 df 58 b1 b9 c9 80 08 bf 88 e8 6a 62 |R....X........jb| +peer0.org1.example.com | 00000010 75 36 a1 27 fb d4 b4 6a 3d 7c ec ba 9d 5f d2 b8 |u6.'...j=|..._..|" +peer0.org1.example.com | "2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a1 Verify: sig = 00000000 30 44 02 20 30 c0 15 87 82 16 43 c9 b5 fa 81 b1 |0D. 0.....C.....| +peer0.org1.example.com | 00000010 19 3f 83 60 62 19 16 3e d0 6a 90 1a 2f c5 88 fb |.?.`b..>.j../...| +peer0.org1.example.com | 00000020 08 9a a2 8d 02 20 16 c7 c3 7c a5 b7 ea f0 1c 1c |..... ...|......| +peer0.org1.example.com | 00000030 15 bb d3 c7 f3 a1 84 cc 99 cc 33 98 4a 32 7d 5b |..........3.J2}[| +peer0.org1.example.com | 00000040 01 e1 67 d4 47 51 |..g.GQ|" +peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a3 Verify: sig = 00000000 30 44 02 20 37 37 ec 58 8e 0c a5 9c 84 6d 5c c4 |0D. 77.X.....m\.| +peer0.org1.example.com | 00000010 7b b6 6a 3b 20 7e b9 9d 6f 73 ec 59 d8 36 24 35 |{.j; ~..os.Y.6$5| +peer0.org1.example.com | 00000020 51 91 0a ec 02 20 33 e2 52 de 65 b2 82 95 4a f2 |Q.... 3.R.e...J.| +peer0.org1.example.com | 00000030 da 7d 1d 4d a4 17 07 53 17 83 06 a2 9e 0b 9c 46 |.}.M...S.......F| +peer0.org1.example.com | 00000040 3a 17 38 8b ae 47 |:.8..G|" +peer0.org1.example.com | "2019-07-20 02:39:40.300 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] isSentByMe -> DEBU 1a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.301 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.390 UTC [gossip.gossip] handleMessage -> DEBU 1a8 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.390 UTC [gossip.pull] HandleMessage -> DEBU 1a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.pull] SendDigest -> DEBU 1aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-07-20 02:39:29.645 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:29.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ac Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ad Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 fd 61 48 d7 45 b9 37 7f 14 de 1f 2a a3 e8 c0 99 |.aH.E.7....*....| +peer0.org1.example.com | 00000010 e1 3a 5f de 9a 96 10 77 5a af bf 56 25 69 d3 5b |.:_....wZ..V%i.[|" +peer0.org1.example.com | "2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 0f af e6 c7 e6 cd 9b 2b 4c 67 0c 40 |0D. .......+Lg.@| +peer0.org1.example.com | 00000010 4b aa 62 2d 17 f9 28 58 19 d2 67 be 8d 86 76 36 |K.b-..(X..g...v6| +peer0.org1.example.com | 00000020 7d 97 ea 33 02 20 12 49 b2 6b 4e 2d a1 03 0b 37 |}..3. .I.kN-...7| +peer0.org1.example.com | 00000030 c7 79 b4 74 7a 52 ef 57 d3 73 de 34 9a d8 6d 1f |.y.tzR.W.s.4..m.| +peer0.org1.example.com | 00000040 df c9 93 62 15 d9 |...b..|" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b2 Verify: sig = 00000000 30 44 02 20 09 83 c1 ba c8 24 75 c5 4e aa a0 a1 |0D. .....$u.N...| +peer0.org1.example.com | 00000010 7c ba 37 37 fe d4 ba a0 d9 3d 03 59 9e 65 a9 42 ||.77.....=.Y.e.B| +peer0.org1.example.com | 00000020 e0 13 d7 25 02 20 2a d8 d1 41 dc cc a7 61 ad 91 |...%. *..A...a..| +peer0.org1.example.com | 00000030 86 72 03 bf a1 5d 43 ef 2c 8e be 3c 6f d4 3d 08 |.r...]C.,.. DEBU 1b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.646 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-07-20 02:39:29.647 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.649 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.655 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.393 UTC [gossip.discovery] sendMemResponse -> DEBU 1bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] Send -> DEBU 1bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.discovery] sendMemResponse -> DEBU 1bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > alive: > " +peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf Exiting" +peer0.org1.example.com | "2019-07-20 02:39:40.708 UTC [endorser] ProcessProposal -> DEBU 1c0 Entering: request from 172.18.0.9:58248" +peer0.org1.example.com | "2019-07-20 02:39:40.709 UTC [protoutils] ValidateProposalMessage -> DEBU 1c1 ValidateProposalMessage starts for signed proposal 0xc000597b30" +peer0.org1.example.com | "2019-07-20 02:39:40.709 UTC [protoutils] validateChannelHeader -> DEBU 1c2 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-07-20 02:39:40.710 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c3 begin" +peer0.org1.example.com | "2019-07-20 02:39:40.710 UTC [msp] DeserializeIdentity -> DEBU 1c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:40.711 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.711 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:39:40.712 UTC [msp] Validate -> DEBU 1c7 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:40.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c8 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1c9 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| +peer0.org1.example.com | 00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" +peer0.org1.example.com | "2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1ca Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| +peer0.org1.example.com | 00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| +peer0.org1.example.com | 00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| +peer0.org1.example.com | 00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| +peer0.org1.example.com | 00000040 5c a5 59 88 ad 64 |\.Y..d|" +peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cc validateChaincodeProposalMessage starts for proposal 0xc0007a8380, header 0xc0007aa460" +peer0.org1.example.com | "2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cd validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] preProcess -> DEBU 1ce [][67d06ae1] processing txid: 67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7" +peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] SimulateProposal -> DEBU 1cf [][67d06ae1] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [endorser] callChaincode -> INFO 1d0 [][67d06ae1] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:40.715 UTC [chaincode] Execute -> DEBU 1d1 Entry" +peer0.org1.example.com | "2019-07-20 02:39:40.716 UTC [cscc] Invoke -> DEBU 1d2 Invoke function: JoinChain" +peer0.org1.example.com | "2019-07-20 02:39:40.716 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d3 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d4 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| +peer0.org1.example.com | 00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" +peer0.org1.example.com | "2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d5 Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| +peer0.org1.example.com | 00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| +peer0.org1.example.com | 00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| +peer0.org1.example.com | 00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| +peer0.org1.example.com | 00000040 5c a5 59 88 ad 64 |\.Y..d|" +peer0.org1.example.com | "2019-07-20 02:39:40.718 UTC [ledgermgmt] CreateLedger -> INFO 1d6 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-07-20 02:39:40.719 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d7 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | "2019-07-20 02:39:40.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d8 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +peer0.org1.example.com | "2019-07-20 02:39:40.720 UTC [kvledger.util] logDirStatus -> DEBU 1d9 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +peer0.org1.example.com | "2019-07-20 02:39:40.721 UTC [kvledger.util] logDirStatus -> DEBU 1da After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +peer0.org1.example.com | "2019-07-20 02:39:40.721 UTC [fsblkstorage] newBlockfileMgr -> INFO 1db Getting block information from block storage" +peer0.org1.example.com | "2019-07-20 02:39:40.722 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1dc Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-07-20 02:39:40.722 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1dd retrieveLastFileSuffix()" +peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1de retrieveLastFileSuffix() - biggestFileNum = -1" +peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1df Last file number found = -1" +peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1e0 No block file found" +peer0.org1.example.com | "2019-07-20 02:39:40.723 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e1 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0005efc40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [fsblkstorage] newBlockIndex -> DEBU 1e2 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [pvtdatastorage] OpenStore -> DEBU 1e3 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [leveldbhelper] GetIterator -> DEBU 1e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e5 Creating KVLedger ledgerID=businesschannel: " +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] lastPersistedCommitHash -> DEBU 1e6 Chain is empty" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e7 Register state db for chaincode lifecycle events: false" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] recoverDBs -> DEBU 1e8 Entering recoverDB()" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1e9 Block storage is empty." +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ea [businesschannel:] Filtering pvtData of invalidation transactions" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1eb [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ec Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ed lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ee Constructing unique pvtData by removing duplicate entries" +peer0.org1.example.com | "2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ef [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f0 Starting to process collection eligibility events" +peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [leveldbhelper] GetIterator -> DEBU 1f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f2 Converted [0] inelligible mising data entries to elligible" +peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [pvtdatastorage] func1 -> DEBU 1f3 Waiting for collection eligibility event" +peer0.org1.example.com | "2019-07-20 02:39:40.726 UTC [kvledger] CommitWithPvtData -> DEBU 1f4 [businesschannel] Validating state for block [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f6 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f7 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f8 ValidateAndPrepareBatch() for block number = [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f9 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] preprocessProtoBlock -> DEBU 1fa txType=CONFIG" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fb Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fc Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1fd constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1fe constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-07-20 02:39:40.727 UTC [peer] GenerateSimulationResults -> DEBU 1ff Processing CONFIG" +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [peer] processChannelConfigTx -> DEBU 200 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 201 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] Done -> DEBU 202 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 203 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valinternal] ApplyWriteSet -> DEBU 204 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc000695b00)}" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 205 validating rwset..." +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 208 [businesschannel] Adding CommitHash to the block [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 209 [businesschannel] Committing block [0] to storage" +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.728 UTC [ledgerstorage] CommitWithPvtData -> DEBU 20a Writing block [0] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:39:40.729 UTC [pvtdatastorage] Prepare -> DEBU 20b Saved 0 private data write sets for block [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20c Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= +peer0.org1.example.com | txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to txid-index" +peer0.org1.example.com | "2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx number:[0] ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:39:40.733 UTC [fsblkstorage] updateCheckpoint -> DEBU 20f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" +peer0.org1.example.com | "2019-07-20 02:39:40.733 UTC [pvtdatastorage] Commit -> DEBU 210 Committing private data for block [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] Commit -> DEBU 211 Committed private data for block [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [kvledger] CommitWithPvtData -> DEBU 212 [businesschannel] Committing block [0] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [lockbasedtxmgr] Commit -> DEBU 213 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 214 Purger started: Purging expired private data till block number [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 215 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 216 Preparing potential purge list working-set for expiringAtBlk [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 217 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 218 Purger finished" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 219 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 21a No expiry entry found for expiringAtBlk [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21b Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 21c Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21d Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:40.735 UTC [stateleveldb] ApplyUpdates -> DEBU 21e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] Commit -> DEBU 21f Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] func1 -> DEBU 220 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 221 Preparing potential purge list working-set for expiringAtBlk [1]" +peer0.org1.example.com | "2019-07-20 02:39:40.736 UTC [leveldbhelper] GetIterator -> DEBU 222 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 223 No expiry entry found for expiringAtBlk [1]" +peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [kvledger] CommitWithPvtData -> DEBU 224 [businesschannel] Committing block [0] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 225 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 226 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-07-20 02:39:40.738 UTC [historyleveldb] Commit -> DEBU 227 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +peer0.org1.example.com | "2019-07-20 02:39:40.738 UTC [kvledger] CommitWithPvtData -> INFO 228 [businesschannel] Committed block [0] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=5ms state_commit=2ms) commitHash=[]" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [ledgermgmt] CreateLedger -> INFO 229 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22a constructing new query executor txid = [0bf7b741-2304-4dbf-9a53-198b20e85df5]" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [stateleveldb] GetState -> DEBU 22b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] Done -> DEBU 22c Done with transaction simulation / query execution [0bf7b741-2304-4dbf-9a53-198b20e85df5]" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 22d Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22e Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22f Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 230 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 231 Processing field: Consortium" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 232 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 233 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 234 Processing field: ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 235 Processing field: BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 236 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 237 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Endpoints" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] validateMSP -> DEBU 23e Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] newBccspMsp -> DEBU 23f Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] New -> DEBU 240 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] Setup -> DEBU 241 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 242 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 243 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [msp] Validate -> DEBU 244 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 245 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ACLs" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] Validate -> DEBU 24c Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp] Setup -> DEBU 250 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2019-07-20 02:39:29.705 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" +orderer0.example.com | "2019-07-20 02:39:29.705 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 169 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 16b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [common.channelconfig] validateMSP -> DEBU 16d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] newBccspMsp -> DEBU 16e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] New -> DEBU 16f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp] Setup -> DEBU 170 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:29.707 UTC [msp.identity] newIdentity -> DEBU 171 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.708 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 253 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] Validate -> DEBU 254 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:40.743 UTC [msp] getCertificationChain -> DEBU 255 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] hasOURole -> DEBU 256 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] getCertificationChain -> DEBU 257 MSP Org1MSP getting certification chain" +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.708 UTC [msp] Validate -> DEBU 173 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 176 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.711 UTC [common.channelconfig] validateMSP -> DEBU 178 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] newBccspMsp -> DEBU 179 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] New -> DEBU 17a Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.712 UTC [msp] Setup -> DEBU 17b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] Validate -> DEBU 17f MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 180 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] hasOURole -> DEBU 181 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 182 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.716 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp] Setup -> DEBU 188 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.718 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] Validate -> DEBU 25c Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [common.channelconfig] validateMSP -> DEBU 25d Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] newBccspMsp -> DEBU 25e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] New -> DEBU 25f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:40.744 UTC [msp] Setup -> DEBU 260 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 263 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] Validate -> DEBU 264 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 265 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] hasOURole -> DEBU 266 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 267 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:40.746 UTC [msp] Setup -> DEBU 268 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [msp] Setup -> DEBU 269 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.722 UTC [msp.identity] newIdentity -> DEBU 18a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18b Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] Validate -> DEBU 18c MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.740 UTC [msp] getCertificationChain -> DEBU 18d MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.743 UTC [msp] hasOURole -> DEBU 18e MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] getCertificationChain -> DEBU 18f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ad Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ae Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:40.750 UTC [policies] Manager -> DEBU 2b1 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b2 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b4 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b5 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b6 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b7 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b8 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b9 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2ba Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bb Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bc Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bd Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2be Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c0 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c1 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c2 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c3 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c4 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c5 Org1MSP anchor peers: []" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c6 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c7 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.gossip] JoinChan -> INFO 2c8 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-07-20 02:39:40.751 UTC [gossip.gossip] learnAnchorPeers -> INFO 2c9 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-07-20 02:39:40.752 UTC [gossip.gossip] learnAnchorPeers -> INFO 2ca No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-07-20 02:39:40.752 UTC [peer] updateTrustedRoots -> DEBU 2cb Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cc updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cd adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2ce adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [peer] buildTrustedRootsForChain -> DEBU 2cf adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2d0 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d1 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +peer0.org1.example.com | "2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d2 After creating dir - [/var/hyperledger/production/transientStore/] exists" +peer0.org1.example.com | "2019-07-20 02:39:40.768 UTC [gossip.service] InitializeChannel -> DEBU 2d3 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d4 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d5 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d6 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-07-20 02:39:40.770 UTC [gossip.privdata] NewReconciler -> DEBU 2d7 Private data reconciliation is enabled" +peer0.org1.example.com | "2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> INFO 2d8 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> DEBU 2d9 Updating gossip ledger height to 1" +peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 2da Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2db Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2dc Sign: digest: F551A65D8BC362FE114BAD8311222B06D4E2289434A7C37C986E7EEDF1FC6EE9 " +peer0.org1.example.com | "2019-07-20 02:39:40.774 UTC [gossip.service] InitializeChannel -> DEBU 2dd Delivery uses dynamic leader election mechanism, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [peer] InitChain -> DEBU 2de Initializing channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2df c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [gossip.election] handleMessages -> DEBU 2e0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [nodeCmd] func6 -> DEBU 2e1 Deploying system CC, for channel " +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e3 constructing new tx simulator txid = [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e4 Entry" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] handleMessage -> DEBU 2e5 [abaa1667] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Notify -> DEBU 2e6 [abaa1667] notifying Txid:abaa1667-e7a4-43d3-835d-7b3659d3b26c, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e7 Exit" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [sccapi] deploySysCC -> INFO 2e8 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] Done -> DEBU 2e9 Done with transaction simulation / query execution [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" +peer0.org1.example.com | "2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2ec Entry" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [cscc] Init -> INFO 2ed Init CSCC" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2ee [d8dbf289] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2ef [d8dbf289] notifying Txid:d8dbf289-e043-4466-a93a-ddccfd1cdab0, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f0 Exit" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2f1 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2f2 Done with transaction simulation / query execution [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f3 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f4 constructing new tx simulator txid = [84e60c06-9d91-4b37-949a-5b212baac3e1]" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f5 Entry" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [qscc] Init -> INFO 2f6 Init QSCC" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:29.813 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-07-20 02:39:29.841 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" +orderer0.example.com | "2019-07-20 02:39:29.844 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-07-20 02:39:29.858 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-07-20 02:39:29.858 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-07-20 02:39:29.858 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" +orderer0.example.com | "2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" +orderer0.example.com | "2019-07-20 02:39:29.860 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000cd5a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-07-20 02:39:29.862 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-07-20 02:39:29.865 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= +orderer0.example.com | txId=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c locPointer=offset=39, bytesLength=18375 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:29.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-07-20 02:39:29.870 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:29.873 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e9 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1eb Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [common.channelconfig] validateMSP -> DEBU 1f0 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] newBccspMsp -> DEBU 1f1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] New -> DEBU 1f2 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.874 UTC [msp] Setup -> DEBU 1f3 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2f7 [84e60c06] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2f8 [84e60c06] notifying Txid:84e60c06-9d91-4b37-949a-5b212baac3e1, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f9 Exit" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2fa system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2fb Done with transaction simulation / query execution [84e60c06-9d91-4b37-949a-5b212baac3e1]" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [sccapi] deploySysCC -> INFO 2fc system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2fd constructing new query executor txid = [af545680-5b62-498c-8287-f67efc9651a5]" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2fe Returning []" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] Done -> DEBU 2ff Done with transaction simulation / query execution [af545680-5b62-498c-8287-f67efc9651a5]" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 300 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 301 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 302 Sign: digest: 3233FCE6D3C338F4FFECD94AEA4E2C6BC849ED2FC8E7A44AD209E1AC5F954AEE " +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 303 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] handleMessage -> DEBU 304 [67d06ae1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] Notify -> DEBU 305 [67d06ae1] notifying Txid:67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [chaincode] Execute -> DEBU 306 Exit" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] callChaincode -> INFO 307 [][67d06ae1] Exit chaincode: name:"cscc" (62ms)" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] SimulateProposal -> DEBU 308 [][67d06ae1] Exit" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [endorser] func1 -> DEBU 309 Exit: request from 172.18.0.9:58248" +peer0.org1.example.com | "2019-07-20 02:39:40.777 UTC [comm.grpc.server] 1 -> INFO 30a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58248 grpc.code=OK grpc.call_duration=69.3708ms +peer0.org1.example.com | "2019-07-20 02:39:40.783 UTC [grpc] infof -> DEBU 30b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [endorser] ProcessProposal -> DEBU 30c Entering: request from 172.18.0.9:58256" +peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [protoutils] ValidateProposalMessage -> DEBU 30d ValidateProposalMessage starts for signed proposal 0xc00080fea0" +peer0.org1.example.com | "2019-07-20 02:39:41.563 UTC [protoutils] validateChannelHeader -> DEBU 30e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 30f begin" +peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 310 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 311 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 312 Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| +peer0.org1.example.com | 00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" +peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 313 Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| +peer0.org1.example.com | 00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| +peer0.org1.example.com | 00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| +peer0.org1.example.com | 00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| +peer0.org1.example.com | 00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" +peer0.org1.example.com | "2019-07-20 02:39:41.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 314 exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 315 validateChaincodeProposalMessage starts for proposal 0xc0007f5730, header 0xc002fdc2d0" +peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 316 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [endorser] preProcess -> DEBU 317 [][9eb44deb] processing txid: 9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93" +peer0.org1.example.com | "2019-07-20 02:39:41.566 UTC [endorser] SimulateProposal -> DEBU 318 [][9eb44deb] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [endorser] callChaincode -> INFO 319 [][9eb44deb] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [chaincode] Execute -> DEBU 31a Entry" +peer0.org1.example.com | "2019-07-20 02:39:41.567 UTC [cscc] Invoke -> DEBU 31b Invoke function: GetChannels" +peer0.org1.example.com | "2019-07-20 02:39:41.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 31c Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:41.568 UTC [msp] Validate -> DEBU 31d MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31e Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| +peer0.org1.example.com | 00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" +peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31f Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| +peer0.org1.example.com | 00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| +peer0.org1.example.com | 00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| +peer0.org1.example.com | 00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| +peer0.org1.example.com | 00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" +peer0.org1.example.com | "2019-07-20 02:39:41.569 UTC [chaincode] handleMessage -> DEBU 320 [9eb44deb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [chaincode] Notify -> DEBU 321 [9eb44deb] notifying Txid:9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [chaincode] Execute -> DEBU 322 Exit" +peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [endorser] callChaincode -> INFO 323 [][9eb44deb] Exit chaincode: name:"cscc" (3ms)" +peer0.org1.example.com | "2019-07-20 02:39:41.570 UTC [endorser] SimulateProposal -> DEBU 324 [][9eb44deb] Exit" +peer0.org1.example.com | "2019-07-20 02:39:41.571 UTC [endorser] func1 -> DEBU 325 Exit: request from 172.18.0.9:58256" +peer0.org1.example.com | "2019-07-20 02:39:41.571 UTC [comm.grpc.server] 1 -> INFO 326 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58256 grpc.code=OK grpc.call_duration=8.7801ms +peer0.org1.example.com | "2019-07-20 02:39:41.574 UTC [grpc] warningf -> DEBU 327 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58256: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:39:41.574 UTC [grpc] infof -> DEBU 328 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] Validate -> DEBU 1f6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f7 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f8 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1fa Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [common.channelconfig] validateMSP -> DEBU 1fb Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] newBccspMsp -> DEBU 1fc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] New -> DEBU 1fd Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.875 UTC [msp] Setup -> DEBU 1fe Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.877 UTC [msp.identity] newIdentity -> DEBU 1ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.881 UTC [msp.identity] newIdentity -> DEBU 200 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 201 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.882 UTC [msp] Validate -> DEBU 202 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 203 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] hasOURole -> DEBU 204 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 205 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] NewStandardValues -> DEBU 206 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [common.channelconfig] validateMSP -> DEBU 208 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] newBccspMsp -> DEBU 209 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] New -> DEBU 20a Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp] Setup -> DEBU 20b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.885 UTC [msp.identity] newIdentity -> DEBU 20c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp.identity] newIdentity -> DEBU 20d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | "2019-07-20 02:39:41.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 329 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +peer0.org1.example.com | "2019-07-20 02:39:41.775 UTC [gossip.election] leaderElection -> DEBU 32a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:41.776 UTC [gossip.election] propose -> DEBU 32b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [gossip.election] propose -> DEBU 32c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 32d Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:41.777 UTC [msp.identity] Sign -> DEBU 32e Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08ECCFA2A2ACA5BFD9151001 " +peer0.org1.example.com | "2019-07-20 02:39:41.778 UTC [msp.identity] Sign -> DEBU 32f Sign: digest: FFE9E552AE6C7A4F25D53AB3CEFBB19AA21287B4B9B72999460F48E10242ADC6 " +peer0.org1.example.com | "2019-07-20 02:39:41.778 UTC [gossip.election] waitForInterrupt -> DEBU 330 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [endorser] ProcessProposal -> DEBU 331 Entering: request from 172.18.0.9:58264" +peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [protoutils] ValidateProposalMessage -> DEBU 332 ValidateProposalMessage starts for signed proposal 0xc002fb4870" +peer0.org1.example.com | "2019-07-20 02:39:42.252 UTC [protoutils] validateChannelHeader -> DEBU 333 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 334 begin" +peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 335 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 336 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:42.253 UTC [msp.identity] Verify -> DEBU 337 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| +peer0.org1.example.com | 00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" +peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [msp.identity] Verify -> DEBU 338 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| +peer0.org1.example.com | 00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| +peer0.org1.example.com | 00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| +peer0.org1.example.com | 00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| +peer0.org1.example.com | 00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" +peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 339 exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33a validateChaincodeProposalMessage starts for proposal 0xc002a5b9d0, header 0xc002fb4c80" +peer0.org1.example.com | "2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33b validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] preProcess -> DEBU 33c [][56ee910c] processing txid: 56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885" +peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] SimulateProposal -> DEBU 33d [][56ee910c] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:39:42.255 UTC [endorser] callChaincode -> INFO 33e [][56ee910c] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [chaincode] Execute -> DEBU 33f Entry" +peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [qscc] Invoke -> DEBU 340 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:42.256 UTC [aclmgmt] CheckACL -> DEBU 341 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [aclmgmt] CheckACL -> DEBU 342 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 343 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:42.258 UTC [msp] DeserializeIdentity -> DEBU 346 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:42.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 347 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 348 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151008 " +peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 349 Sign: digest: B47A6DBF8403EA2183512FE112A860C1DDCAD57DAF43878D704F7766BFEE800D " +peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp] GetDefaultSigningIdentity -> DEBU 34a Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 34b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [msp.identity] Sign -> DEBU 34c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [gossip.discovery] periodicalSendAlive -> DEBU 34d Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:42.264 UTC [msp.identity] newIdentity -> DEBU 34e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.886 UTC [msp] Validate -> DEBU 20f MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 210 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] hasOURole -> DEBU 211 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 212 MSP Org2MSP getting certification chain" +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func1 -> DEBU 34f 0xc003023250 gate 1563590382265478300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 350 0xc003023250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 351 0xc003023250 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 352 0xc003023250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 353 0xc003023250 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [cauthdsl] func1 -> DEBU 355 0xc003023250 gate 1563590382265478300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 356 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 357 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 358 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:42.266 UTC [gossip.comm] Send -> DEBU 354 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func1 -> DEBU 359 0xc00303e3d0 gate 1563590382267987800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35a 0xc00303e3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35b 0xc00303e3d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35c Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [msp] Validate -> DEBU 35d MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [msp] getCertificationChain -> DEBU 35e MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:42.269 UTC [cauthdsl] func2 -> DEBU 35f 0xc00303e3d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 360 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| +peer0.org1.example.com | 00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" +peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 361 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| +peer0.org1.example.com | 00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| +peer0.org1.example.com | 00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| +peer0.org1.example.com | 00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| +peer0.org1.example.com | 00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" +peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [cauthdsl] func2 -> DEBU 362 0xc00303e3d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [cauthdsl] func1 -> DEBU 363 0xc00303e3d0 gate 1563590382267987800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:42.270 UTC [policies] Evaluate -> DEBU 364 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 225 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 226 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 227 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 228 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 366 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] handleMessage -> DEBU 368 [56ee910c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] Notify -> DEBU 369 [56ee910c] notifying Txid:56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [chaincode] Execute -> DEBU 36a Exit" +peer0.org1.example.com | "2019-07-20 02:39:42.272 UTC [endorser] callChaincode -> INFO 36b [][56ee910c] Exit chaincode: name:"qscc" (17ms)" +peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [endorser] SimulateProposal -> DEBU 36c [][56ee910c] Exit" +peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [endorser] func1 -> DEBU 36d Exit: request from 172.18.0.9:58264" +peer0.org1.example.com | "2019-07-20 02:39:42.273 UTC [comm.grpc.server] 1 -> INFO 36e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58264 grpc.code=OK grpc.call_duration=21.8975ms +peer0.org1.example.com | "2019-07-20 02:39:42.268 UTC [gossip.comm] sendToEndpoint -> DEBU 36f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:42.274 UTC [gossip.comm] sendToEndpoint -> DEBU 370 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:42.277 UTC [grpc] infof -> DEBU 371 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:42.394 UTC [gossip.gossip] handleMessage -> DEBU 372 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:42.395 UTC [gossip.gossip] handleMessage -> DEBU 373 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:42.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:42.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 375 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:42.397 UTC [msp.identity] Verify -> DEBU 376 Verify: digest = 00000000 a5 1b 09 b7 08 b7 9c 03 2f a6 f0 6b 53 c6 c5 9c |......../..kS...| +peer0.org1.example.com | 00000010 41 51 dd 5c e7 c0 ad 26 1c 06 3b 81 de 3d 0e a0 |AQ.\...&..;..=..|" +peer0.org1.example.com | "2019-07-20 02:39:42.398 UTC [msp.identity] Verify -> DEBU 377 Verify: sig = 00000000 30 44 02 20 5d 74 cf 2c 50 bf 53 12 05 9d ee c8 |0D. ]t.,P.S.....| +peer0.org1.example.com | 00000010 ef 87 fd 42 b6 dc 2b 60 e1 5f 7e 88 57 7f c5 11 |...B..+`._~.W...| +peer0.org1.example.com | 00000020 9a b1 05 dd 02 20 23 59 85 7e e0 d1 cd 6a e1 0f |..... #Y.~...j..| +peer0.org1.example.com | 00000030 be 9a 3b 26 28 cc 60 b1 ec 74 3e ef ae 9b 1f 8e |..;&(.`..t>.....| +peer0.org1.example.com | 00000040 5b ba d6 c3 03 a6 |[.....|" +peer0.org1.example.com | "2019-07-20 02:39:42.400 UTC [msp.identity] Verify -> DEBU 378 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:42.401 UTC [msp.identity] Verify -> DEBU 379 Verify: sig = 00000000 30 45 02 21 00 9e d3 4f 5e 97 be b4 1c 21 7f bc |0E.!...O^....!..| +peer0.org1.example.com | 00000010 f1 e3 02 81 c6 d8 12 53 79 d2 6f ae e8 19 b5 8b |.......Sy.o.....| +peer0.org1.example.com | 00000020 2c ce e9 54 0e 02 20 2e ff 04 83 19 c1 c8 2e c8 |,..T.. .........| +peer0.org1.example.com | 00000030 fd ea e6 14 09 64 bc 58 44 e4 e4 b1 28 69 a9 80 |.....d.XD...(i..| +peer0.org1.example.com | 00000040 83 24 e6 0b b6 c8 ce |.$.....|" +peer0.org1.example.com | "2019-07-20 02:39:42.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 37f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 380 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:42.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.pull] Hello -> DEBU 382 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.comm] Send -> DEBU 383 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:44.269 UTC [gossip.comm] sendToEndpoint -> DEBU 384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.270 UTC [gossip.comm] sendToEndpoint -> DEBU 385 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.271 UTC [gossip.gossip] handleMessage -> DEBU 386 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.272 UTC [gossip.pull] HandleMessage -> DEBU 387 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.272 UTC [gossip.gossip] handleMessage -> DEBU 388 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 389 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:44.297 UTC [msp.identity] Sign -> DEBU 38a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151009 " +peer0.org1.example.com | "2019-07-20 02:39:44.298 UTC [msp.identity] Sign -> DEBU 38b Sign: digest: 038845EEB47CE4E506D2E41DBA8A6D4A6F17B929678EF07AE731EBED65C98BB5 " +peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:44.300 UTC [gossip.comm] Send -> DEBU 38f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 390 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 391 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 392 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 393 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.900 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.901 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.901 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 396 Verify: digest = 00000000 03 88 45 ee b4 7c e4 e5 06 d2 e4 1d ba 8a 6d 4a |..E..|........mJ| +peer0.org1.example.com | 00000010 6f 17 b9 29 67 8e f0 7a e7 31 eb ed 65 c9 8b b5 |o..)g..z.1..e...|" +peer0.org1.example.com | "2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 397 Verify: sig = 00000000 30 44 02 20 2c 5e 12 39 e4 8a 65 db db 52 be 9a |0D. ,^.9..e..R..| +peer0.org1.example.com | 00000010 85 a7 f2 10 0c 0b 84 81 f7 70 a1 5a 46 1d 97 f5 |.........p.ZF...| +peer0.org1.example.com | 00000020 ba c0 06 eb 02 20 4b 56 d0 df 22 55 7b 8e ba ce |..... KV.."U{...| +peer0.org1.example.com | 00000030 05 41 7d 81 85 ac bf 95 33 a8 cd f7 1c 59 64 bc |.A}.....3....Yd.| +peer0.org1.example.com | 00000040 75 1b 07 a1 6b 5b |u...k[|" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 398 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 399 Verify: sig = 00000000 30 45 02 21 00 a9 d3 a4 08 85 bc cb 81 46 84 81 |0E.!.........F..| +peer0.org1.example.com | 00000010 f2 19 50 05 7a 32 f2 b5 b1 e1 82 b4 73 ed b9 43 |..P.z2......s..C| +peer0.org1.example.com | 00000020 6f d3 06 17 d3 02 20 6f 74 bc e8 59 b2 6b f6 f5 |o..... ot..Y.k..| +peer0.org1.example.com | 00000030 ec a8 c5 7c 79 43 bc 3a 19 8a cf 87 77 ac 54 5d |...|yC.:....w.T]| +peer0.org1.example.com | 00000040 48 83 4d 89 38 91 45 |H.M.8.E|" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] isSentByMe -> DEBU 39b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.391 UTC [gossip.gossip] handleMessage -> DEBU 39e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.392 UTC [gossip.pull] HandleMessage -> DEBU 39f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.392 UTC [gossip.pull] SendDigest -> DEBU 3a0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:44.393 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.394 UTC [gossip.gossip] handleMessage -> DEBU 3a2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.395 UTC [gossip.gossip] handleMessage -> DEBU 3a3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:44.397 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 29 00 b3 ff 3d 83 b9 68 9c 7f 8a 4f 6b 81 ac ef |)...=..h...Ok...| +peer0.org1.example.com | 00000010 0b cf 38 fc 45 3f 6a e7 04 f6 75 cb 3a 55 56 ad |..8.E?j...u.:UV.|" +peer0.org1.example.com | "2019-07-20 02:39:44.398 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 4d 2a 70 d2 c2 ad 05 12 2e 74 b9 a0 |0D. M*p......t..| +peer0.org1.example.com | 00000010 3c 86 a2 b5 e1 fa c9 69 23 de 37 cb 7e 2d ee 54 |<......i#.7.~-.T| +peer0.org1.example.com | 00000020 00 9b bd 8d 02 20 7f ae cb 63 88 97 ae 11 9d 19 |..... ...c......| +peer0.org1.example.com | 00000030 d6 9b cc 28 8c e5 35 00 e8 1b b1 81 4b 9e 22 e8 |...(..5.....K.".| +peer0.org1.example.com | 00000040 96 17 a6 dd bb e4 |......|" +peer0.org1.example.com | "2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a9 Verify: sig = 00000000 30 45 02 21 00 bb 9f 6b 01 a7 03 0f 80 54 b5 50 |0E.!...k.....T.P| +peer0.org1.example.com | 00000010 b8 b3 2e 2b 38 36 7a 6b fa 0c b9 64 5c b6 47 78 |...+86zk...d\.Gx| +peer0.org1.example.com | 00000020 1a 84 a1 ce a3 02 20 36 e1 01 70 16 0f e5 3d 60 |...... 6..p...=`| +peer0.org1.example.com | 00000030 81 a2 55 df 4e 77 4c b1 a8 cc 73 72 b6 d1 22 6d |..U.NwL...sr.."m| +peer0.org1.example.com | 00000040 e6 25 93 37 29 c5 3d |.%.7).=|" +peer0.org1.example.com | "2019-07-20 02:39:44.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.914 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.915 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | "2019-07-20 02:39:44.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] Send -> DEBU 3b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] Send -> DEBU 3ba Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3bd Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3be Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +peer0.org1.example.com | "2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3bf Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +peer0.org1.example.com | "2019-07-20 02:39:44.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:44.764 UTC [policies] Evaluate -> DEBU 3c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:44.764 UTC [msp] DeserializeIdentity -> DEBU 3c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:44.765 UTC [msp.identity] newIdentity -> DEBU 3c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:29.920 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a3 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a4 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:44.766 UTC [cauthdsl] func1 -> DEBU 3c7 0xc003081da0 gate 1563590384766279600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:44.766 UTC [cauthdsl] func2 -> DEBU 3c8 0xc003081da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3c9 0xc003081da0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3ca 0xc003081da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3cb 0xc003081da0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:44.768 UTC [cauthdsl] func1 -> DEBU 3cc 0xc003081da0 gate 1563590384766279600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0030c2f20 gate 1563590384770142000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d1 0xc0030c2f20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d2 0xc0030c2f20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] Validate -> DEBU 3d4 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:44.771 UTC [msp] getCertificationChain -> DEBU 3d5 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:44.772 UTC [cauthdsl] func2 -> DEBU 3d6 0xc0030c2f20 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:44.772 UTC [msp.identity] Verify -> DEBU 3d7 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [msp.identity] Verify -> DEBU 3d8 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [cauthdsl] func2 -> DEBU 3d9 0xc0030c2f20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [cauthdsl] func1 -> DEBU 3da 0xc0030c2f20 gate 1563590384770142000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:44.773 UTC [policies] Evaluate -> DEBU 3db Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:44.775 UTC [gossip.gossip] handleMessage -> DEBU 3df Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e0 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.914 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.914 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.915 UTC [gossip.gossip] handleMessage -> DEBU 3e4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e6 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +peer0.org1.example.com | "2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e7 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +peer0.org1.example.com | "2019-07-20 02:39:44.917 UTC [gossip.gossip] handleMessage -> DEBU 3e8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:45.756 UTC [gossip.channel] reportMembershipChanges -> INFO 3e9 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-07-20 02:39:46.780 UTC [gossip.election] waitForInterrupt -> DEBU 3ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.781 UTC [gossip.election] beLeader -> INFO 3eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-07-20 02:39:46.781 UTC [gossip.service] func1 -> INFO 3ec Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3ed This peer will pass blocks from orderer service to other peers for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:39:29.924 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:29.925 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" +orderer0.example.com | "2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-07-20 02:39:29.928 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-07-20 02:39:29.930 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.939 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.940 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [gossip.election] leaderElection -> DEBU 3ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [gossip.election] IsLeader -> DEBU 3ef c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [ConnProducer] NewConnection -> DEBU 3f0 Creating a new connection" +peer0.org1.example.com | "2019-07-20 02:39:46.782 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510021801 " +peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f3 Sign: digest: 1432909845E8D004A1C68176560DDCFBA5B49F384912BA88B279E39B18E3C1AA " +peer0.org1.example.com | "2019-07-20 02:39:46.783 UTC [gossip.election] waitForInterrupt -> DEBU 3f4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f5 parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f6 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] watcher -> DEBU 3f7 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] switchBalancer -> DEBU 3f8 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:46.785 UTC [grpc] HandleSubConnStateChange -> DEBU 3f9 pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] Send -> DEBU 3fa Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.793 UTC [grpc] HandleSubConnStateChange -> DEBU 3fd pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, READY" +peer0.org1.example.com | "2019-07-20 02:39:46.793 UTC [ConnProducer] NewConnection -> DEBU 3fe Connected to {orderer2.example.com:7050 [OrdererMSP]}" +peer0.org1.example.com | "2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 3ff Connected to orderer2.example.com:7050" +peer0.org1.example.com | "2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 400 Establishing gRPC stream with orderer2.example.com:7050 ..." +peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [deliveryClient] afterConnect -> DEBU 401 Entering" +peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [deliveryClient] RequestBlocks -> DEBU 402 Starting deliver with block [1] for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.795 UTC [msp] GetDefaultSigningIdentity -> DEBU 403 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp] GetDefaultSigningIdentity -> DEBU 404 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 405 Sign: plaintext: 0A91070A3D08051A0608F2FDC9E90522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +peer0.org1.example.com | "2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 406 Sign: digest: 953E55B39D6C84B1B8FAB1F76B5216C49716B7C4798A7B67FEFC0A262BE8C43D " +peer0.org1.example.com | "2019-07-20 02:39:46.797 UTC [deliveryClient] afterConnect -> DEBU 407 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 408 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 409 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:39:46.799 UTC [msp] DeserializeIdentity -> DEBU 40d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:46.800 UTC [msp.identity] newIdentity -> DEBU 40e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS +peer0.org1.example.com | hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg +peer0.org1.example.com | rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC +peer0.org1.example.com | dg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func1 -> DEBU 40f 0xc0031ba1c0 gate 1563590386800569000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 410 0xc0031ba1c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 411 0xc0031ba1c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 412 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [msp] Validate -> DEBU 413 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 414 0xc0031ba1c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 415 Verify: digest = 00000000 2a 51 2b 81 9b 58 5f 83 5d 96 56 e0 0c 32 21 62 |*Q+..X_.].V..2!b| +peer0.org1.example.com | 00000010 51 5a 0e 98 23 59 6f 1b 20 3f 1e 94 dd bf e4 00 |QZ..#Yo. ?......|" +peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 416 Verify: sig = 00000000 30 45 02 21 00 d6 1f 11 02 a7 d0 fb c5 bd 4f 88 |0E.!..........O.| +peer0.org1.example.com | 00000010 bd ba 48 48 a1 d7 47 1e c2 f0 aa b8 2b b7 60 6b |..HH..G.....+.`k| +peer0.org1.example.com | 00000020 4f 91 ce 17 f8 02 20 03 5d 63 03 23 45 9d dd f2 |O..... .]c.#E...| +peer0.org1.example.com | 00000030 bc 8e ca bd 37 2f 00 73 99 d4 41 bd f1 dd ac 4d |....7/.s..A....M| +peer0.org1.example.com | 00000040 73 6a 36 c3 77 b4 7e |sj6.w.~|" +peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [cauthdsl] func2 -> DEBU 417 0xc0031ba1c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [cauthdsl] func1 -> DEBU 418 0xc0031ba1c0 gate 1563590386800569000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:46.802 UTC [policies] Evaluate -> DEBU 419 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41b Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [blocksProvider] DeliverBlocks -> DEBU 41d [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 41e [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 41f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 420 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> INFO 421 [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> DEBU 422 [businesschannel] Validating block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [committer.txvalidator] Validate -> DEBU 423 [businesschannel] START Block Validation for block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [committer.txvalidator] Validate -> DEBU 424 expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [committer.txvalidator] validateTx -> DEBU 425 [businesschannel] validateTx starts for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" +peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 426 ValidateTransactionEnvelope starts for envelope 0xc0030ee6e0" +peer0.org1.example.com | "2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 427 Header is channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " +peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [protoutils] validateChannelHeader -> DEBU 428 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [protoutils] checkSignatureFromCreator -> DEBU 429 begin" +peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp] GetManagerForChain -> DEBU 42a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp] DeserializeIdentity -> DEBU 42b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:46.806 UTC [msp.identity] newIdentity -> DEBU 42c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42d creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp] Validate -> DEBU 42e MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42f creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 430 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:29.941 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-07-20 02:39:29.943 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-07-20 02:39:29.944 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +peer0.org1.example.com | 00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" +peer0.org1.example.com | "2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 431 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| +peer0.org1.example.com | 00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| +peer0.org1.example.com | 00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| +peer0.org1.example.com | 00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| +peer0.org1.example.com | 00000040 dd aa 68 72 78 34 |..hrx4|" +peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 432 exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [protoutils] validateConfigTransaction -> DEBU 433 validateConfigTransaction starts for data 0xc0031de000, header channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " +peer0.org1.example.com | "2019-07-20 02:39:46.808 UTC [committer.txvalidator] validateTx -> DEBU 434 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43d Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43e Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 440 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 441 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 442 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 443 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 444 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 445 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [common.configtx] verifyDeltaSet -> DEBU 446 Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [common.configtx] policyForItem -> DEBU 447 Getting policy for item Org1MSP with mod_policy Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 448 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 449 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44a Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44b Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44c Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44d Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44e Manager Channel/Application looking up path [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44f Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 450 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 451 Manager Channel/Application/Org1MSP looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [policies] Evaluate -> DEBU 452 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func1 -> DEBU 453 0xc00320f870 gate 1563590386812191300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 454 0xc00320f870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 455 0xc00320f870 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 456 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 457 0xc00320f870 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.812 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +peer0.org1.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +peer0.org1.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +peer0.org1.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +peer0.org1.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +peer0.org1.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [cauthdsl] func2 -> DEBU 45a 0xc00320f870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [cauthdsl] func1 -> DEBU 45b 0xc00320f870 gate 1563590386812191300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.813 UTC [common.configtx] verifyDeltaSet -> DEBU 45e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 465 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [blocksProvider] DeliverBlocks -> DEBU 466 [businesschannel] Gossiping block [1], peers number [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.815 UTC [gossip.channel] AddToMsgStore -> DEBU 467 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:39:46.815 UTC [gossip.pull] Add -> DEBU 468 Added 1, total items: 1" +peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 469 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 46a Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.816 UTC [policies] Evaluate -> DEBU 46b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func1 -> DEBU 46e 0xc003223060 gate 1563590386817258300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 46f 0xc003223060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 470 0xc003223060 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 471 0xc003223060 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Readers to " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Writers to " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" +peer0.org1.example.com | "2019-07-20 02:39:46.817 UTC [msp.identity] Verify -> DEBU 48b Verify: digest = 00000000 ec 21 1e f7 b6 5d f6 9d 41 b5 b2 a5 30 d2 80 0c |.!...]..A...0...| +peer0.org1.example.com | 00000010 19 82 c6 dc a3 34 8b 5b ca 65 18 81 5a 92 65 b6 |.....4.[.e..Z.e.|" +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ +orderer0.example.com | "2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] watcher -> DEBU 302 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] switchBalancer -> DEBU 303 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-07-20 02:39:29.945 UTC [grpc] HandleSubConnStateChange -> DEBU 304 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, CONNECTING" +orderer0.example.com | "2019-07-20 02:39:29.945 UTC [orderer.common.cluster] updateStubInMapping -> INFO 305 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-07-20 02:39:29.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 306 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-07-20 02:39:29.952 UTC [orderer.common.cluster] func1 -> DEBU 307 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [msp.identity] Verify -> DEBU 48c Verify: sig = 00000000 30 44 02 20 68 ec 42 5d 5b 55 ae b4 32 48 79 cd |0D. h.B][U..2Hy.| +peer0.org1.example.com | 00000010 90 85 a8 26 03 4b d1 24 88 ba a3 5a 56 1c bb d5 |...&.K.$...ZV...| +peer0.org1.example.com | 00000020 bc ec 81 46 02 20 35 65 1b 5e 90 17 74 6e 3d 5e |...F. 5e.^..tn=^| +peer0.org1.example.com | 00000030 14 9b c7 91 dd b6 7f 47 59 b9 98 de 50 3a 29 32 |.......GY...P:)2| +peer0.org1.example.com | 00000040 1d bc 73 d9 73 c0 |..s.s.|" +peer0.org1.example.com | "2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 490 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [cauthdsl] func2 -> DEBU 48f 0xc003223060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [cauthdsl] func1 -> DEBU 491 0xc003223060 gate 1563590386817258300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 492 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.821 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [blocksProvider] DeliverBlocks -> DEBU 498 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49a [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.822 UTC [common.channelconfig] Validate -> DEBU 499 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [common.channelconfig] validateMSP -> DEBU 49b Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [msp] newBccspMsp -> DEBU 49d Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [msp] New -> DEBU 49e Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.823 UTC [blocksProvider] DeliverBlocks -> DEBU 49f [businesschannel] Gossiping block [2], peers number [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [gossip.channel] AddToMsgStore -> DEBU 4a0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [gossip.pull] Add -> DEBU 4a1 Added 2, total items: 2" +peer0.org1.example.com | "2019-07-20 02:39:46.824 UTC [msp] Setup -> DEBU 4a2 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a5 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4aa Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ab Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] Validate -> DEBU 4ac MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.828 UTC [msp] getCertificationChain -> DEBU 4ad MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] hasOURole -> DEBU 4ae MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] getCertificationChain -> DEBU 4af MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b0 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b2 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] Validate -> DEBU 4b4 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [common.channelconfig] validateMSP -> DEBU 4b5 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] newBccspMsp -> DEBU 4b6 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] New -> DEBU 4b7 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.830 UTC [msp] Setup -> DEBU 4b8 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 308 parsed scheme: """ +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 309 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30a 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30b 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.common.cluster] Configure -> INFO 30c Exiting" +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> DEBU 30d Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> INFO 30e Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30f 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] newRaft -> INFO 310 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 311 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 312 Starting orderer: +orderer0.example.com | Version: 1.4.2 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.12.7 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 313 Beginning to serve requests" +orderer0.example.com | "2019-07-20 02:39:29.970 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2019-07-20 02:39:29.971 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-07-20 02:39:29.971 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, CONNECTING" +orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 317 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 318 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:30.015 UTC [grpc] HandleSubConnStateChange -> DEBU 31a pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, READY" +orderer0.example.com | "2019-07-20 02:39:30.040 UTC [grpc] HandleSubConnStateChange -> DEBU 31b pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, READY" +orderer0.example.com | "2019-07-20 02:39:31.007 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.4:54782)" +orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 89µs" +orderer0.example.com | "2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 325 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +orderer0.example.com | "2019-07-20 02:39:31.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " +orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 329 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4bb Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] Validate -> DEBU 4bc MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bd MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] hasOURole -> DEBU 4be MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bf MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Validate -> DEBU 4d1 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d2 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d3 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e4 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e6 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32a Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32c Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " +orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +orderer0.example.com | "2019-07-20 02:39:32.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:32.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" +orderer0.example.com | "2019-07-20 02:39:32.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " +orderer0.example.com | "2019-07-20 02:39:32.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:32.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2019-07-20 02:39:32.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +orderer0.example.com | "2019-07-20 02:39:33.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:33.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +orderer0.example.com | "2019-07-20 02:39:33.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +orderer0.example.com | "2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " +orderer0.example.com | "2019-07-20 02:39:34.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:34.010 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +orderer0.example.com | "2019-07-20 02:39:34.011 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +orderer0.example.com | "2019-07-20 02:39:34.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:34.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-07-20 02:39:34.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.7µs " +orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 80.2µs" +orderer0.example.com | "2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-07-20 02:39:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:36.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2019-07-20 02:39:36.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +orderer0.example.com | "2019-07-20 02:39:36.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:36.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-07-20 02:39:36.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.1µs " +orderer0.example.com | "2019-07-20 02:39:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:37.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2019-07-20 02:39:37.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " +orderer0.example.com | "2019-07-20 02:39:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:37.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2019-07-20 02:39:37.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.8µs " +orderer0.example.com | "2019-07-20 02:39:38.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:38.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-07-20 02:39:38.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.1µs " +orderer0.example.com | "2019-07-20 02:39:38.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:38.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +orderer0.example.com | "2019-07-20 02:39:38.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " +orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +orderer0.example.com | "2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +orderer0.example.com | "2019-07-20 02:39:39.044 UTC [orderer.common.server] Deliver -> DEBU 360 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:39.044 UTC [common.deliver] Handle -> DEBU 361 Starting new deliver loop for 172.18.0.9:39028" +orderer0.example.com | "2019-07-20 02:39:39.045 UTC [common.deliver] Handle -> DEBU 362 Attempting to read seek info message from 172.18.0.9:39028" +orderer0.example.com | "2019-07-20 02:39:39.074 UTC [orderer.common.server] Broadcast -> DEBU 363 Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:39:39.074 UTC [orderer.common.broadcast] Handle -> DEBU 364 Starting new broadcast loop for 172.18.0.9:39030" +orderer0.example.com | "2019-07-20 02:39:39.076 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 365 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39030" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 366 Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 367 Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 368 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 369 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36b Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36d Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 36e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 374 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 375 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 376 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 377 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 378 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] validateMSP -> DEBU 379 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] newBccspMsp -> DEBU 37a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] New -> DEBU 37b Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] Setup -> DEBU 37c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [msp] Validate -> DEBU 37f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 382 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 383 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 384 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 385 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 386 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] Validate -> DEBU 387 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [common.channelconfig] validateMSP -> DEBU 388 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] newBccspMsp -> DEBU 389 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] New -> DEBU 38a Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.079 UTC [msp] Setup -> DEBU 38b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.080 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38e Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] Validate -> DEBU 38f MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 390 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] hasOURole -> DEBU 391 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 392 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 393 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 394 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 395 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 396 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] Validate -> DEBU 397 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [common.channelconfig] validateMSP -> DEBU 398 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] newBccspMsp -> DEBU 399 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] New -> DEBU 39a Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp] Setup -> DEBU 39b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.081 UTC [msp.identity] newIdentity -> DEBU 39c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp.identity] newIdentity -> DEBU 39d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 39e Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Validate -> DEBU 39f MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a0 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] hasOURole -> DEBU 3a1 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a2 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a3 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a4 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:39.082 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a8 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a9 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3aa Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ab Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ac Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ad Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ae Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3af Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b0 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b1 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b2 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b4 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b5 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b6 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b8 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3ba Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e8 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e9 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4ea Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.844 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:39:46.847 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.848 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:46.853 UTC [comm.grpc.server] 1 -> INFO 50b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.848Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=186.8µs +peer0.org1.example.com | "2019-07-20 02:39:46.853 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.857 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:46.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 512 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.859 UTC [msp.identity] Sign -> DEBU 515 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51c As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [msp.identity] Sign -> DEBU 51a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51d As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:46.862 UTC [policies] Manager -> DEBU 51f Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 520 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 521 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 522 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 523 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 524 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 525 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 526 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 527 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 528 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 529 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 52a Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52b Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52c Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52e As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52f As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.channelconfig] LogSanityChecks -> DEBU 530 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 531 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 532 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 533 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 534 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.866 UTC [gossip.service] updateAnchors -> DEBU 535 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-07-20 02:39:46.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 51e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33978" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 536 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 537 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 538 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 539 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33978" +orderer0.example.com | "2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3df Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e1 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e2 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e3 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e5 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e7 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ea Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3eb Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ec Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ed Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ee Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ef Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f1 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [common.configtx] policyForItem -> DEBU 3f7 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.089 UTC [policies] Manager -> DEBU 3f8 Manager Channel looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3f9 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fa Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fb Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fc Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fd Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fe Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3ff Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 400 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 401 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 402 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:39.090 UTC [msp] DeserializeIdentity -> DEBU 404 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] newIdentity -> DEBU 405 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 406 0xc000951ac0 gate 1563590379091253900 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 407 0xc000951ac0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 408 0xc000951ac0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 409 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40a 0xc000951ac0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40b Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| +orderer0.example.com | 00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40c Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| +orderer0.example.com | 00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | +orderer0.example.com | 00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| +orderer0.example.com | 00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| +orderer0.example.com | 00000040 b6 52 e0 6c 82 94 |.R.l..|" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40d 0xc000951ac0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 40e 0xc000951ac0 gate 1563590379091253900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 413 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 414 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 415 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 420 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 421 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 422 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 423 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 424 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 425 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 426 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 427 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 428 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 429 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53e Verify: sig = 00000000 30 45 02 21 00 e6 68 9d c5 63 b9 1c b9 e7 c5 c3 |0E.!..h..c......| +peer0.org1.example.com | 00000010 94 54 c8 7b 93 fd a5 57 66 d8 c1 b1 b3 4b 3a 64 |.T.{...Wf....K:d| +peer0.org1.example.com | 00000020 f8 81 bf 34 ff 02 20 0d 6a 26 1f c2 fd 8e 9d 27 |...4.. .j&.....'| +peer0.org1.example.com | 00000030 40 36 ac 2e f4 f5 49 b5 cd 2d 36 14 10 59 89 2a |@6....I..-6..Y.*| +peer0.org1.example.com | 00000040 a4 d4 d7 37 c6 5a 5b |...7.Z[|" +peer0.org1.example.com | "2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53f Authenticated 172.18.0.6:33978" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] GossipStream -> DEBU 542 Servicing 172.18.0.6:33978" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [grpc] infof -> DEBU 543 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [policies] Evaluate -> DEBU 540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [cauthdsl] func1 -> DEBU 544 0xc00333efd0 gate 1563590386870913500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 545 0xc00333efd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 547 0xc00333efd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 548 0xc00333efd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 549 0xc00333efd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 54a 0xc00333efd0 gate 1563590386870913500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [gossip.comm] func2 -> DEBU 54f Client 172.18.0.6:33978 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.comm] writeToStream -> DEBU 546 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] serviceConnection -> DEBU 552 Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] writeToStream -> DEBU 553 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [gossip.comm] readFromStream -> DEBU 54e Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [gossip.comm] func2 -> DEBU 554 Client 172.18.0.6:33928 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 555 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=14.4132261s +peer0.org1.example.com | "2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 550 0xc00333f810 gate 1563590386871972100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 556 0xc00333f810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 557 0xc00333f810 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 558 0xc00333f810 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 559 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 55a Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +peer0.org1.example.com | "2019-07-20 02:39:46.873 UTC [gossip.comm] readFromStream -> DEBU 55b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:39:46.874 UTC [cauthdsl] func2 -> DEBU 55c 0xc00333f810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.870 UTC [gossip.gossip] handleMessage -> DEBU 541 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 551 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.856Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9128ms +peer0.org1.example.com | "2019-07-20 02:39:46.874 UTC [cauthdsl] func1 -> DEBU 55d 0xc00333f810 gate 1563590386871972100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [gossip.gossip] handleMessage -> DEBU 55e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f Got message: GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42e Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:39.093 UTC [msp.identity] Sign -> DEBU 42f Sign: plaintext: 0AD2060A1B08011A0608EBFDC9E90522...4B363125DCAEEC32A278E2CF9DDD8C54 " +peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 561 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 562 Verify: digest = 00000000 cd 84 f2 4d a0 ca 90 19 dc e8 13 7f f3 2a 14 d1 |...M.........*..| +peer0.org1.example.com | 00000010 fa d8 d3 a2 37 42 49 99 12 d5 bb 16 8a ad 9a f7 |....7BI.........|" +peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 563 Verify: sig = 00000000 30 45 02 21 00 d0 bf f2 10 6b bf 25 cb 17 78 34 |0E.!.....k.%..x4| +peer0.org1.example.com | 00000010 82 53 3b 90 a3 64 b3 cb be e8 25 7e 7d c5 f6 3e |.S;..d....%~}..>| +peer0.org1.example.com | 00000020 75 1d 94 93 59 02 20 7a 61 9e af a7 1d 69 e2 9d |u...Y. za....i..| +peer0.org1.example.com | 00000030 00 8b ae 7b 47 4b 06 83 4b a4 d4 f5 6d be f6 75 |...{GK..K...m..u| +peer0.org1.example.com | 00000040 fd b2 62 23 5d 5b 7f |..b#][.|" +peer0.org1.example.com | "2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 564 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [msp.identity] Verify -> DEBU 565 Verify: sig = 00000000 30 44 02 20 04 d5 f4 aa 80 23 d0 2f e4 aa 11 08 |0D. .....#./....| +peer0.org1.example.com | 00000010 50 26 5d 31 5d c6 30 c8 f6 db 9a 50 4e ea a0 10 |P&]1].0....PN...| +peer0.org1.example.com | 00000020 b3 7d d2 0d 02 20 37 3c 15 1c fd 43 09 0d d5 b3 |.}... 7<...C....| +peer0.org1.example.com | 00000030 a7 17 a0 16 69 42 38 04 8c 72 96 9a f8 68 34 89 |....iB8..r...h4.| +peer0.org1.example.com | 00000040 19 01 83 a1 fa 15 |......|" +peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 566 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 567 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 568 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 569 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.876 UTC [policies] Evaluate -> DEBU 560 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.881 UTC [policies] Evaluate -> DEBU 56c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] JoinChan -> INFO 56f Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 570 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 571 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-07-20 02:39:46.887 UTC [gossip.gossip] learnAnchorPeers -> INFO 572 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-07-20 02:39:46.887 UTC [gossip.service] updateEndpoints -> DEBU 573 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-07-20 02:39:46.891 UTC [peer] updateTrustedRoots -> DEBU 574 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 575 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 576 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.892 UTC [gossip.discovery] sendMemResponse -> DEBU 577 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:46.896 UTC [gossip.comm] Send -> DEBU 578 Entering, sending GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.discovery] sendMemResponse -> DEBU 579 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " +peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.comm] sendToEndpoint -> DEBU 57a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:46.898 UTC [gossip.comm] createConnection -> DEBU 57b Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57c parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57d scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] watcher -> DEBU 57e ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] switchBalancer -> DEBU 57f ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:46.908 UTC [grpc] HandleSubConnStateChange -> DEBU 580 pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 581 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:39:46.924 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-07-20 02:39:46.925 UTC [peer] buildTrustedRootsForChain -> DEBU 584 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-07-20 02:39:46.927 UTC [committer.txvalidator] validateTx -> DEBU 585 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] validateTx -> DEBU 586 [businesschannel] validateTx completes for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" +peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> DEBU 587 got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> INFO 588 [businesschannel] Validated block [1] in 123ms" +peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [gossip.privdata] listMissingPrivateData -> DEBU 589 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [gossip.privdata] StoreBlock -> DEBU 58a [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:39:46.929 UTC [committer] preCommit -> DEBU 58b Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [kvledger] CommitWithPvtData -> DEBU 58c [businesschannel] Validating state for block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58f Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 ValidateAndPrepareBatch() for block number = [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 591 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:46.930 UTC [valimpl] preprocessProtoBlock -> DEBU 592 txType=CONFIG" +peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 593 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 594 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 595 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-07-20 02:39:46.935 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" +orderer0.example.com | "2019-07-20 02:39:39.094 UTC [msp.identity] Sign -> DEBU 430 Sign: digest: 45DB8F0181D8A44B3CF876A75B80ACD077EDCCFB3B1C9D17C0902192520E8F2D " +orderer0.example.com | "2019-07-20 02:39:39.094 UTC [msp] GetDefaultSigningIdentity -> DEBU 431 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp] GetDefaultSigningIdentity -> DEBU 432 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 433 Sign: plaintext: 0ACE060A1708041A0608EBFDC9E90522...2E42A0C1B566423262986FCA1D7C7999 " +orderer0.example.com | "2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 434 Sign: digest: 78B703761D325EE5D5CB13182625C158F15FA370E1078A12E65F558F0ACFA74A " +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 435 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 436 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 437 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 438 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 439 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [msp] DeserializeIdentity -> DEBU 43a Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:39.096 UTC [msp.identity] newIdentity -> DEBU 43b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func1 -> DEBU 43c 0xc000a9b050 gate 1563590379097124100 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43d 0xc000a9b050 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9b050 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:39.097 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:39.097 UTC [msp] Validate -> DEBU 440 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9b050 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 78 b7 03 76 1d 32 5e e5 d5 cb 13 18 26 25 c1 58 |x..v.2^.....&%.X| +orderer0.example.com | 00000010 f1 5f a3 70 e1 07 8a 12 e6 5f 55 8f 0a cf a7 4a |._.p....._U....J|" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a0 d9 0a de d9 d8 ac 1e 74 55 78 |0E.!.........tUx| +orderer0.example.com | 00000010 57 2d 4b 72 58 67 8a 2b 9a ba 7a 41 10 2d 03 61 |W-KrXg.+..zA.-.a| +orderer0.example.com | 00000020 bd 19 e8 88 13 02 20 16 bc 09 48 78 d8 29 d9 f6 |...... ...Hx.)..| +orderer0.example.com | 00000030 3a 13 e0 de 8d ca b4 f5 88 1e c0 1b cc 4e 2d 95 |:............N-.| +orderer0.example.com | 00000040 c1 de 25 91 b2 1f b3 |..%....|" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9b050 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9b050 gate 1563590379097124100 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44a Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 44c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 450 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 454 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 455 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 457 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 459 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45a Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 45b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45c Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.100 UTC [msp] Setup -> DEBU 460 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:39.101 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.102 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.103 UTC [msp] Validate -> DEBU 463 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.106 UTC [common.channelconfig] NewStandardValues -> DEBU 464 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 467 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 468 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 469 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] Validate -> DEBU 46b Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [common.channelconfig] validateMSP -> DEBU 46c Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] newBccspMsp -> DEBU 46d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] New -> DEBU 46e Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp] Setup -> DEBU 46f Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.107 UTC [msp.identity] newIdentity -> DEBU 470 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 472 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] Validate -> DEBU 473 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] getCertificationChain -> DEBU 474 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.108 UTC [msp] hasOURole -> DEBU 475 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] getCertificationChain -> DEBU 476 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 477 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 478 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 479 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47a Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] Validate -> DEBU 47b Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [common.channelconfig] validateMSP -> DEBU 47c Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] newBccspMsp -> DEBU 47d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] New -> DEBU 47e Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp] Setup -> DEBU 47f Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 480 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | "2019-07-20 02:39:46.936 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-07-20 02:39:46.936 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59b Block [1] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valinternal] ApplyWriteSet -> DEBU 59c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034a4340)}" +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d validating rwset..." +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59f ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a0 [businesschannel] Adding CommitHash to the block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Committing block [1] to storage" +peer0.org1.example.com | "2019-07-20 02:39:46.938 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a2 Writing block [1] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:39:46.940 UTC [pvtdatastorage] Prepare -> DEBU 5a3 Saved 0 private data write sets for block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a4 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= +peer0.org1.example.com | txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a5 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to txid-index" +peer0.org1.example.com | "2019-07-20 02:39:46.942 UTC [fsblkstorage] indexBlock -> DEBU 5a6 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx number:[0] ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:39:46.943 UTC [comm.grpc.server] 1 -> INFO 5a7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.941Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=633.9µs +peer0.org1.example.com | "2019-07-20 02:39:46.943 UTC [fsblkstorage] updateCheckpoint -> DEBU 5a8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org1.example.com | "2019-07-20 02:39:46.944 UTC [pvtdatastorage] Commit -> DEBU 5a9 Committing private data for block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 5aa Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 482 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Validate -> DEBU 483 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 484 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] hasOURole -> DEBU 485 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 486 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 487 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 488 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 489 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48f Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 490 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 491 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 492 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 493 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 494 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 495 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 499 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49b Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49d Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33980" +peer0.org1.example.com | "2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ae Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33980" +peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [pvtdatastorage] Commit -> DEBU 5af Committed private data for block [1]" +peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b1 Verify: sig = 00000000 30 45 02 21 00 c6 00 24 ca 9b 7c 79 5f aa f1 d8 |0E.!...$..|y_...| +peer0.org1.example.com | 00000010 49 b1 94 84 23 ca b1 74 68 be 9a 8a f2 af 9e 5b |I...#..th......[| +peer0.org1.example.com | 00000020 44 d8 d5 60 94 02 20 56 85 55 3c fc 1d e8 72 06 |D..`.. V.U<...r.| +peer0.org1.example.com | 00000030 3e a0 b9 ee 08 40 46 4e 05 6d 49 59 75 e1 2e 9d |>....@FN.mIYu...| +peer0.org1.example.com | 00000040 b2 2f ad 1b ae af 10 |./.....|" +peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b2 Authenticated 172.18.0.6:33980" +peer0.org1.example.com | "2019-07-20 02:39:46.947 UTC [gossip.comm] GossipStream -> DEBU 5b3 Servicing 172.18.0.6:33980" +peer0.org1.example.com | "2019-07-20 02:39:46.948 UTC [kvledger] CommitWithPvtData -> DEBU 5b4 [businesschannel] Committing block [1] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:39:46.948 UTC [lockbasedtxmgr] Commit -> DEBU 5b5 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b6 Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b7 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:46.951 UTC [stateleveldb] ApplyUpdates -> DEBU 5b9 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-07-20 02:39:46.952 UTC [grpc] HandleSubConnStateChange -> DEBU 5ba pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, READY" +peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [lockbasedtxmgr] Commit -> DEBU 5bb Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bc Preparing potential purge list working-set for expiringAtBlk [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [leveldbhelper] GetIterator -> DEBU 5bd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be No expiry entry found for expiringAtBlk [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [lockbasedtxmgr] func1 -> DEBU 5bf launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [kvledger] CommitWithPvtData -> DEBU 5c1 [businesschannel] Committing block [1] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [historyleveldb] Commit -> DEBU 5c3 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:39:46.956 UTC [historyleveldb] Commit -> DEBU 5c6 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [gossip.comm] func2 -> DEBU 5c4 Client 172.18.0.6:33980 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:46.955 UTC [gossip.comm] readFromStream -> DEBU 5c2 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp] GetDefaultSigningIdentity -> DEBU 5c7 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [comm.grpc.server] 1 -> INFO 5c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.945Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6697ms +peer0.org1.example.com | "2019-07-20 02:39:46.957 UTC [gossip.comm] writeToStream -> DEBU 5c9 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:46.958 UTC [historyleveldb] Commit -> DEBU 5cd Channel [businesschannel]: Updates committed to history database for blockNo [1]" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.958 UTC [kvledger] CommitWithPvtData -> INFO 5ce [businesschannel] Committed block [1] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=9ms state_commit=7ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org1.example.com | "2019-07-20 02:39:46.959 UTC [msp] GetDefaultSigningIdentity -> DEBU 5cf Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:46.960 UTC [msp.identity] Sign -> DEBU 5d0 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020802 " +peer0.org1.example.com | "2019-07-20 02:39:46.961 UTC [msp.identity] Sign -> DEBU 5d2 Sign: digest: 50DAFA02918444C69E8D5B3E6A35836CE1EA25019336CA398AFA5A43E6AE0493 " +peer0.org1.example.com | "2019-07-20 02:39:46.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.state] commitBlock -> DEBU 5d3 [businesschannel] Committed block [1] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.state] deliverPayloads -> DEBU 5d4 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> INFO 5d5 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [msp.identity] Verify -> DEBU 5d6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [msp.identity] Verify -> DEBU 5d8 Verify: sig = 00000000 30 44 02 20 0b f1 7c cc 6c b4 48 eb 91 f2 f1 19 |0D. ..|.l.H.....| +peer0.org1.example.com | 00000010 fc 62 08 0d 35 3f 49 b2 86 ae c9 a7 9c 71 8e 4c |.b..5?I......q.L| +peer0.org1.example.com | 00000020 96 eb 7a fc 02 20 55 90 38 56 a4 36 e3 ea 32 53 |..z.. U.8V.6..2S| +peer0.org1.example.com | 00000030 77 ab 19 e2 95 fa 1f b2 c3 d4 90 4d 74 5b 9b b5 |w..........Mt[..| +peer0.org1.example.com | 00000040 65 a8 15 be f4 15 |e.....|" +peer0.org1.example.com | "2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> DEBU 5d7 [businesschannel] Validating block [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d9 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] createConnection -> DEBU 5da Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [gossip.comm] sendToEndpoint -> DEBU 5db Exiting" +peer0.org1.example.com | "2019-07-20 02:39:46.963 UTC [committer.txvalidator] Validate -> DEBU 5dc [businesschannel] START Block Validation for block [2]" +peer0.org1.example.com | "2019-07-20 02:39:46.964 UTC [committer.txvalidator] Validate -> DEBU 5dd expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:39:46.964 UTC [committer.txvalidator] validateTx -> DEBU 5de [businesschannel] validateTx starts for block 0xc003516200 env 0xc00353d860 txn 0" +peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5df ValidateTransactionEnvelope starts for envelope 0xc00353d860" +peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5e0 Header is channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " +peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] validateChannelHeader -> DEBU 5e1 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-07-20 02:39:46.965 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e2 begin" +peer0.org1.example.com | "2019-07-20 02:39:46.966 UTC [msp] GetManagerForChain -> DEBU 5e3 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:39:46.966 UTC [msp] DeserializeIdentity -> DEBU 5e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-07-20 02:39:46.967 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5e9 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| +peer0.org1.example.com | 00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" +peer0.org1.example.com | "2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5ea Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| +peer0.org1.example.com | 00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| +peer0.org1.example.com | 00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| +peer0.org1.example.com | 00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| +peer0.org1.example.com | 00000040 cb 1b 9e a8 cb 43 |.....C|" +peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [protoutils] checkSignatureFromCreator -> DEBU 5eb exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [protoutils] validateConfigTransaction -> DEBU 5ec validateConfigTransaction starts for data 0xc0035d2000, header channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " +peer0.org1.example.com | "2019-07-20 02:39:46.969 UTC [committer.txvalidator] validateTx -> DEBU 5ed Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] verifyDeltaSet -> DEBU 5ff Processing change to key: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [common.configtx] policyForItem -> DEBU 600 Getting policy for item Org2MSP with mod_policy Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 601 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 602 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 603 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 604 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 605 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 606 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 607 Manager Channel/Application looking up path [Org2MSP]" +peer0.org1.example.com | "2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 608 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 609 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [policies] Manager -> DEBU 60a Manager Channel/Application/Org2MSP looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [policies] Evaluate -> DEBU 60b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [msp] DeserializeIdentity -> DEBU 60c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:46.976 UTC [msp.identity] newIdentity -> DEBU 60d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func1 -> DEBU 60e 0xc003603870 gate 1563590386977559500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 60f 0xc003603870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 610 0xc003603870 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 611 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [cauthdsl] func2 -> DEBU 612 0xc003603870 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 613 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +peer0.org1.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +peer0.org1.example.com | "2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 614 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +peer0.org1.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +peer0.org1.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +peer0.org1.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +peer0.org1.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" +peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [cauthdsl] func2 -> DEBU 615 0xc003603870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [cauthdsl] func1 -> DEBU 616 0xc003603870 gate 1563590386977559500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 617 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:46.979 UTC [common.configtx] verifyDeltaSet -> DEBU 619 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61a Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61e Setting policy for key Admins to " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 61f Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 620 Setting policy for key Readers to " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 631 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 632 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 633 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 634 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 635 Processing field: Consortium" +peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 636 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] NewStandardValues -> DEBU 637 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 638 Processing field: ACLs" +peer0.org1.example.com | "2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63a Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63c Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.987 UTC [common.channelconfig] Validate -> DEBU 63e Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [common.channelconfig] validateMSP -> DEBU 63f Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d6 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d7 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [common.configtx] policyForItem -> DEBU 4d9 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4da Manager Channel looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4db Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dc Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dd Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4df Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [msp] DeserializeIdentity -> DEBU 4e6 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] newBccspMsp -> DEBU 640 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] New -> DEBU 641 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp] Setup -> DEBU 642 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.988 UTC [msp.identity] newIdentity -> DEBU 643 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.989 UTC [msp.identity] newIdentity -> DEBU 644 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 645 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] Validate -> DEBU 646 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.990 UTC [msp] getCertificationChain -> DEBU 647 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [msp] hasOURole -> DEBU 648 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [msp] getCertificationChain -> DEBU 649 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64c Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64d Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] Validate -> DEBU 64e Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [common.channelconfig] validateMSP -> DEBU 64f Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.992 UTC [msp] newBccspMsp -> DEBU 650 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.993 UTC [msp] New -> DEBU 651 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.993 UTC [msp] Setup -> DEBU 652 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 653 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 654 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:46.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 655 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.995 UTC [msp] Validate -> DEBU 656 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:46.996 UTC [msp] getCertificationChain -> DEBU 657 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.996 UTC [msp] hasOURole -> DEBU 658 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [msp] getCertificationChain -> DEBU 659 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65c Processing field: BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65d Processing field: BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65e Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65f Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 660 Processing field: Capabilities" +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.114 UTC [cauthdsl] func1 -> DEBU 4e8 0xc000bb8980 gate 1563590379114969000 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4e9 0xc000bb8980 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ea 0xc000bb8980 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4eb 0xc000bb8980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ec 0xc000bb8980 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4ed 0xc000bb8980 gate 1563590379114969000 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f1 0xc000bb9b00 gate 1563590379115234200 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f2 0xc000bb9b00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f3 0xc000bb9b00 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f5 0xc000bb9b00 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| +orderer0.example.com | 00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| +orderer0.example.com | 00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | +orderer0.example.com | 00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| +orderer0.example.com | 00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| +orderer0.example.com | 00000040 b6 52 e0 6c 82 94 |.R.l..|" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f8 0xc000bb9b00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f9 0xc000bb9b00 gate 1563590379115234200 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4fe Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4ff Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 500 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 501 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 502 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.115 UTC [common.configtx] recurseConfigMap -> DEBU 503 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 504 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 505 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 506 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 507 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 508 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 509 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50f Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 661 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 662 Processing field: Endpoints" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [common.channelconfig] validateMSP -> DEBU 665 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] newBccspMsp -> DEBU 666 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] New -> DEBU 667 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:46.999 UTC [msp] Setup -> DEBU 668 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 669 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 66a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.001 UTC [msp] Validate -> DEBU 66b MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66c Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66d MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66e Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66f Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 670 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 671 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 672 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 673 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 674 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.004 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 685 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 686 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 687 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 688 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 689 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b3 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b4 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b5 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bc As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bd As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6be Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6bf Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c0 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c2 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 510 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 511 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 512 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 513 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 514 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 515 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 516 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 517 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 518 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 519 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 51a Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51b Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51c Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51d Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51f Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 520 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 521 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 529 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52a Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [common.channelconfig] validateMSP -> DEBU 52b Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] newBccspMsp -> DEBU 52c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] New -> DEBU 52d Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp] Setup -> DEBU 52e Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] Validate -> DEBU 531 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 532 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 533 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 534 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 535 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 536 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 537 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 538 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] Validate -> DEBU 539 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c5 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c6 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c7 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c8 Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6c9 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ca Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cb Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cc Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cd Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.024 UTC [msp] DeserializeIdentity -> DEBU 6d3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.024 UTC [msp.identity] newIdentity -> DEBU 6d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6d5 0xc0036eb490 gate 1563590387025007200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d6 0xc0036eb490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d7 0xc0036eb490 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d8 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] Validate -> DEBU 6d9 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp] getCertificationChain -> DEBU 6da MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6db 0xc0036eb490 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dc Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +peer0.org1.example.com | 00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dd Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +peer0.org1.example.com | 00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +peer0.org1.example.com | 00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +peer0.org1.example.com | 00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +peer0.org1.example.com | 00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6de 0xc0036eb490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6df 0xc0036eb490 gate 1563590387025007200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.025 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] JoinChan -> INFO 6e4 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e5 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e6 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e8 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e9 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [gossip.service] updateEndpoints -> DEBU 6ea Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-07-20 02:39:47.026 UTC [peer] updateTrustedRoots -> DEBU 6eb Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ec parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ed scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] watcher -> DEBU 6ee ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] switchBalancer -> DEBU 6ef ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.027 UTC [grpc] HandleSubConnStateChange -> DEBU 6f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.039 UTC [grpc] HandleSubConnStateChange -> DEBU 6f1 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, READY" +peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f2 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.041 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f5 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.043 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [msp] Validate -> DEBU 6fa MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [msp] getCertificationChain -> DEBU 6fb MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6fd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6ff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func1 -> DEBU 707 0xc00377bc70 gate 1563590387046596900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 708 0xc00377bc70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 709 0xc00377bc70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70a 0xc00377bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70b 0xc00377bc70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 70c 0xc00377bc70 gate 1563590387046596900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 710 0xc0037984d0 gate 1563590387047829100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 711 0xc0037984d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 712 0xc0037984d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.047 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 713 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp] Validate -> DEBU 714 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp] getCertificationChain -> DEBU 715 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 716 0xc0037984d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 717 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 718 Verify: sig = 00000000 30 45 02 21 00 c5 42 26 31 9b 5f 88 e8 ff 3c af |0E.!..B&1._...<.| +peer0.org1.example.com | 00000010 89 aa 06 67 e2 b6 11 2d 5c 3c 46 9f e7 66 a8 fd |...g...-\..| +peer0.org1.example.com | 00000030 a7 5f c2 d5 fb df 79 1f 8d 4b 32 8f b7 a0 3b de |._....y..K2...;.| +peer0.org1.example.com | 00000040 6d eb ba 3e c2 98 e3 |m..>...|" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 719 0xc0037984d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [cauthdsl] func1 -> DEBU 71a 0xc0037984d0 gate 1563590387047829100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [gossip.comm] authenticateRemotePeer -> DEBU 71f Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] DeserializeIdentity -> DEBU 720 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 721 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 722 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915100F " +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 723 Sign: digest: FD5AEC2A368260611D522F195C3901A89781740BD1E3F90CA9C8FB49E2302DCC " +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 724 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 725 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [msp.identity] Sign -> DEBU 726 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [msp] DeserializeIdentity -> DEBU 727 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] Send -> DEBU 728 Entering, sending GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] sendToEndpoint -> DEBU 729 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.050 UTC [gossip.comm] createConnection -> DEBU 72a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72c parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72d scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] watcher -> DEBU 72e ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.055 UTC [grpc] switchBalancer -> DEBU 72f ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.056 UTC [grpc] HandleSubConnStateChange -> DEBU 730 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 731 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 732 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 733 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [peer] buildTrustedRootsForChain -> DEBU 734 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 735 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 736 [businesschannel] validateTx completes for block 0xc003516200 env 0xc00353d860 txn 0" +peer0.org1.example.com | "2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> DEBU 737 got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> INFO 738 [businesschannel] Validated block [2] in 97ms" +peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [gossip.privdata] listMissingPrivateData -> DEBU 739 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [gossip.privdata] StoreBlock -> DEBU 73a [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [committer] preCommit -> DEBU 73b Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-07-20 02:39:47.061 UTC [kvledger] CommitWithPvtData -> DEBU 73c [businesschannel] Validating state for block [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73e lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73f Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 740 ValidateAndPrepareBatch() for block number = [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 741 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] preprocessProtoBlock -> DEBU 742 txType=CONFIG" +peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 743 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 744 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 745 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:47.064 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 747 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-07-20 02:39:47.064 UTC [peer] GenerateSimulationResults -> DEBU 748 Processing CONFIG" +peer0.org1.example.com | "2019-07-20 02:39:47.063 UTC [grpc] HandleSubConnStateChange -> DEBU 746 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, READY" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [common.channelconfig] validateMSP -> DEBU 53a Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] newBccspMsp -> DEBU 53b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] New -> DEBU 53c Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.119 UTC [msp] Setup -> DEBU 53d Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 540 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] Validate -> DEBU 541 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 542 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] hasOURole -> DEBU 543 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 544 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 545 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 546 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 547 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 548 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] Validate -> DEBU 549 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [common.channelconfig] validateMSP -> DEBU 54a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] newBccspMsp -> DEBU 54b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] New -> DEBU 54c Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp] Setup -> DEBU 54d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 550 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Validate -> DEBU 551 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 552 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] hasOURole -> DEBU 553 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 554 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 555 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 556 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 557 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 558 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 559 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55a Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55b Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55c Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55d Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55e Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55f Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 560 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 561 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 562 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 563 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 564 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 565 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 566 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 567 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 568 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 569 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56a Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56b Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56c Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57e Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 580 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 582 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 583 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 584 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 585 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 586 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 589 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58a Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58c Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 590 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 591 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 592 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 593 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 594 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 595 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 596 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 597 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 598 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 599 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59a Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59b Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:39.126 UTC [orderer.common.cluster] NewStream -> DEBU 59c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2019-07-20 02:39:39.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 59d Send of SubmitRequest for channel testchainid with payload of size 24752 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +orderer0.example.com | "2019-07-20 02:39:39.128 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 59e Sending msg of 24752 bytes to 3 on channel testchainid took 439.3µs" +orderer0.example.com | "2019-07-20 02:39:39.128 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 59f [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39030" +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [common.deliver] deliverBlocks -> DEBU 5a0 Rejecting deliver for 172.18.0.9:39028 because channel businesschannel not found" +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.broadcast] Handle -> DEBU 5a1 Received EOF from 172.18.0.9:39030, hangup" +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a2 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39028 grpc.code=OK grpc.call_duration=87.743ms +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a4 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39030 grpc.code=OK grpc.call_duration=58.5325ms +orderer0.example.com | "2019-07-20 02:39:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 24963" +orderer0.example.com | "2019-07-20 02:39:39.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2019-07-20 02:39:39.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5aa Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ac Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5ad Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ae Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5af Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b0 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b2 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5b3 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b4 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b5 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b7 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b9 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] Validate -> DEBU 5ba Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [common.channelconfig] validateMSP -> DEBU 5bb Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] newBccspMsp -> DEBU 5bc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] New -> DEBU 5bd Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] Setup -> DEBU 5be Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c1 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.143 UTC [msp] Validate -> DEBU 5c2 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c3 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] hasOURole -> DEBU 5c4 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c5 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c7 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c9 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] Validate -> DEBU 5ca Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [common.channelconfig] validateMSP -> DEBU 5cb Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] newBccspMsp -> DEBU 5cc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] New -> DEBU 5cd Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp] Setup -> DEBU 5ce Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5d1 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] Validate -> DEBU 5d2 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] getCertificationChain -> DEBU 5d3 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.145 UTC [msp] hasOURole -> DEBU 5d4 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:39.146 UTC [msp] getCertificationChain -> DEBU 5d5 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] NewStandardValues -> DEBU 5d6 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d7 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d8 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d9 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [common.channelconfig] validateMSP -> DEBU 5e1 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] newBccspMsp -> DEBU 5e2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] New -> DEBU 5e3 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp] Setup -> DEBU 5e4 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | "2019-07-20 02:39:47.065 UTC [peer] processChannelConfigTx -> DEBU 749 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74a Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] Done -> DEBU 74b Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-07-20 02:39:47.066 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74c Block [2] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valinternal] ApplyWriteSet -> DEBU 74d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003862b80)}" +peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74e validating rwset..." +peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74f postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:39:47.067 UTC [kvledger] CommitWithPvtData -> DEBU 751 [businesschannel] Adding CommitHash to the block [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.068 UTC [kvledger] CommitWithPvtData -> DEBU 752 [businesschannel] Committing block [2] to storage" +peer0.org1.example.com | "2019-07-20 02:39:47.068 UTC [ledgerstorage] CommitWithPvtData -> DEBU 753 Writing block [2] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp] GetDefaultSigningIdentity -> DEBU 754 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 755 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 756 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.069 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.070 UTC [gossip.comm] authenticateRemotePeer -> DEBU 758 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 759 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 75a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.071 UTC [msp.identity] newIdentity -> DEBU 75b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.072 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.072 UTC [msp] Validate -> DEBU 75d MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [msp] getCertificationChain -> DEBU 75e MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 75f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [msp] DeserializeIdentity -> DEBU 760 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 763 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 764 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 765 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 766 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 767 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func1 -> DEBU 769 0xc0038cd0c0 gate 1563590387074883400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76a 0xc0038cd0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76b 0xc0038cd0c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76c 0xc0038cd0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76d 0xc0038cd0c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.075 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038cd0c0 gate 1563590387074883400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 76f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func1 -> DEBU 772 0xc0038cd920 gate 1563590387076484600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 773 0xc0038cd920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 774 0xc0038cd920 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 775 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.076 UTC [msp] Validate -> DEBU 776 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [msp] getCertificationChain -> DEBU 777 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 778 Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= +peer0.org1.example.com | txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 +peer0.org1.example.com | ]" +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e8 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e9 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ea Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5eb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ed Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ee Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ef Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f1 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f3 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f4 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f6 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f7 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f8 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f9 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fa Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fb Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fc Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fd Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fe Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5ff Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 600 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 610 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 611 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 612 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 613 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 614 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 615 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 616 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 617 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 618 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 619 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61e Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61f Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 620 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 621 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62d As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62e As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 62f Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 630 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 631 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 632 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 633 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 634 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 635 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 636 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 637 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 638 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 639 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63a Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63b Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63c Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 63d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63e As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63f As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 640 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:39.165 UTC [common.capabilities] Supported -> DEBU 641 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:39.174 UTC [common.capabilities] Supported -> DEBU 642 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:39.174 UTC [fsblkstorage] newBlockfileMgr -> DEBU 643 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2019-07-20 02:39:39.174 UTC [kvledger.util] CreateDirIfMissing -> DEBU 644 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2019-07-20 02:39:39.174 UTC [kvledger.util] logDirStatus -> DEBU 645 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2019-07-20 02:39:39.175 UTC [kvledger.util] logDirStatus -> DEBU 646 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2019-07-20 02:39:39.175 UTC [fsblkstorage] newBlockfileMgr -> INFO 647 Getting block information from block storage" +orderer0.example.com | "2019-07-20 02:39:39.175 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 648 Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 77a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to txid-index" +peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [fsblkstorage] indexBlock -> DEBU 77b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx number:[0] ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:39:47.077 UTC [cauthdsl] func2 -> DEBU 779 0xc0038cd920 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77d Verify: sig = 00000000 30 45 02 21 00 b5 08 ec a2 9a f2 02 e8 0d 9f fa |0E.!............| +peer0.org1.example.com | 00000010 be 56 91 95 23 4b 8b fe 8a 0e 32 22 e3 92 90 4c |.V..#K....2"...L| +peer0.org1.example.com | 00000020 9d 28 c3 af c4 02 20 50 74 94 85 0a 43 01 c4 6a |.(.... Pt...C..j| +peer0.org1.example.com | 00000030 16 31 5b dd c4 61 b7 01 a2 1c 97 0c 6f 4b b4 1c |.1[..a......oK..| +peer0.org1.example.com | 00000040 fc 29 ea 1b be 73 4d |.)...sM|" +peer0.org1.example.com | "2019-07-20 02:39:47.078 UTC [cauthdsl] func2 -> DEBU 77e 0xc0038cd920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [cauthdsl] func1 -> DEBU 77f 0xc0038cd920 gate 1563590387076484600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 782 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.079 UTC [fsblkstorage] updateCheckpoint -> DEBU 783 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71461], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [pvtdatastorage] Commit -> DEBU 785 Committing private data for block [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [policies] Evaluate -> DEBU 784 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.080 UTC [gossip.comm] authenticateRemotePeer -> DEBU 786 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.081 UTC [gossip.comm] createConnection -> DEBU 787 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.081 UTC [gossip.comm] sendToEndpoint -> DEBU 788 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.082 UTC [pvtdatastorage] Commit -> DEBU 789 Committed private data for block [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.083 UTC [gossip.comm] func1 -> DEBU 78a Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.083 UTC [gossip.gossip] handleMessage -> DEBU 78b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.084 UTC [gossip.gossip] handleMessage -> DEBU 78c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 78d Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:39:47.085 UTC [lockbasedtxmgr] Commit -> DEBU 790 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [lockbasedtxmgr] Commit -> DEBU 791 Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 793 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:39:47.087 UTC [lockbasedtxmgr] Commit -> DEBU 794 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:39:47.088 UTC [stateleveldb] ApplyUpdates -> DEBU 795 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-07-20 02:39:47.086 UTC [msp.identity] Verify -> DEBU 792 Verify: digest = 00000000 fd 5a ec 2a 36 82 60 61 1d 52 2f 19 5c 39 01 a8 |.Z.*6.`a.R/.\9..| +peer0.org1.example.com | 00000010 97 81 74 0b d1 e3 f9 0c a9 c8 fb 49 e2 30 2d cc |..t........I.0-.|" +peer0.org1.example.com | "2019-07-20 02:39:47.088 UTC [msp.identity] Verify -> DEBU 796 Verify: sig = 00000000 30 44 02 20 67 38 97 b4 58 0a 45 87 30 6f 98 3c |0D. g8..X.E.0o.<| +peer0.org1.example.com | 00000010 3e dd f2 97 5f 34 92 98 f4 61 72 84 3d d8 ba 3f |>..._4...ar.=..?| +peer0.org1.example.com | 00000020 32 47 f4 91 02 20 21 d0 d6 93 ad 18 9b 91 06 25 |2G... !........%| +peer0.org1.example.com | 00000030 de 3f 3f 56 d9 10 0d a4 bb 6c 96 fd 69 2e 62 0d |.??V.....l..i.b.| +peer0.org1.example.com | 00000040 88 83 39 ee 9a 01 |..9...|" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] isSentByMe -> DEBU 798 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 799 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 79a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79b Verify: digest = 00000000 33 e9 f7 b7 64 80 eb 44 9f b9 1a 0c c0 54 da b1 |3...d..D.....T..| +peer0.org1.example.com | 00000010 12 a2 7b 21 b9 aa 26 4c 17 09 9a 62 90 51 13 03 |..{!..&L...b.Q..|" +peer0.org1.example.com | "2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79c Verify: sig = 00000000 30 44 02 20 57 e9 01 f9 79 01 99 25 40 d2 89 c4 |0D. W...y..%@...| +peer0.org1.example.com | 00000010 39 8d a1 8c 1a f0 a9 da 2a f9 c6 2d 89 88 05 ce |9.......*..-....| +peer0.org1.example.com | 00000020 c5 a5 65 61 02 20 42 ad ad 4a 55 ae d8 0c 59 25 |..ea. B..JU...Y%| +peer0.org1.example.com | 00000030 b0 4b 69 80 7c 07 75 16 89 34 f8 38 ff 79 2a ed |.Ki.|.u..4.8.y*.| +peer0.org1.example.com | 00000040 27 e8 69 10 53 bf |'.i.S.|" +orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 649 retrieveLastFileSuffix()" +orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 64a retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64b Last file number found = -1" +orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64c No block file found" +orderer0.example.com | "2019-07-20 02:39:39.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 64d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0002be900)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [fsblkstorage] newBlockIndex -> DEBU 64e newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] func1 -> DEBU 64f Executing callback to update root CAs" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 650 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 651 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] Commit -> DEBU 79d Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 79e Preparing potential purge list working-set for expiringAtBlk [3]" +peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [leveldbhelper] GetIterator -> DEBU 79f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 7a2 No expiry entry found for expiringAtBlk [3]" +peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] func1 -> DEBU 7a1 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [kvledger] CommitWithPvtData -> DEBU 7aa [businesschannel] Committing block [2] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ab Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:39:47.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ad Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-07-20 02:39:47.095 UTC [historyleveldb] Commit -> DEBU 7ae Channel [businesschannel]: Updates committed to history database for blockNo [2]" +peer0.org1.example.com | "2019-07-20 02:39:47.095 UTC [kvledger] CommitWithPvtData -> INFO 7af [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=5ms block_and_pvtdata_commit=17ms state_commit=7ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org1.example.com | "2019-07-20 02:39:47.096 UTC [msp] GetDefaultSigningIdentity -> DEBU 7b0 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.096 UTC [msp.identity] Sign -> DEBU 7b1 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020803 " +peer0.org1.example.com | "2019-07-20 02:39:47.097 UTC [msp.identity] Sign -> DEBU 7b2 Sign: digest: 6120CB6F8FAA033DDE98258E327315924BF1BBCF6DB355D5B4AE64BDA214C726 " +peer0.org1.example.com | "2019-07-20 02:39:47.097 UTC [gossip.state] commitBlock -> DEBU 7b3 [businesschannel] Committed block [2] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:39:47.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.101 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 652 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 653 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-07-20 02:39:39.211 UTC [fsblkstorage] indexBlock -> DEBU 654 Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= +orderer0.example.com | txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:39.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 655 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23947], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-07-20 02:39:39.229 UTC [fsblkstorage] Next -> DEBU 656 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:39.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 657 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:39.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 658 Remaining bytes=[23947], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 659 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 65a blockbytes [23944] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:39.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 65b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2019-07-20 02:39:39.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 65c EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 65d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 65e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.247 UTC [orderer.common.server] Deliver -> DEBU 65f Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 660 Starting new deliver loop for 172.18.0.9:39032" +orderer0.example.com | "2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 661 Attempting to read seek info message from 172.18.0.9:39032" +orderer0.example.com | "2019-07-20 02:39:39.248 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 662 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 663 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 664 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] Next -> DEBU 665 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] newBlockfileStream -> DEBU 666 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 667 Remaining bytes=[23947], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 668 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 669 blockbytes [23944] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:39.253 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 66a [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2019-07-20 02:39:39.254 UTC [orderer.commmon.multichannel] newChain -> INFO 66b Created and starting new chain businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.254 UTC [orderer.consensus.etcdraft] Start -> INFO 66c Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] Configure -> INFO 66d Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +peer0.org1.example.com | "2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func1 -> DEBU 7ba 0xc00390d680 gate 1563590387105027200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bb 0xc00390d680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bc 0xc00390d680 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bd 0xc00390d680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7be 0xc00390d680 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.107 UTC [cauthdsl] func1 -> DEBU 7bf 0xc00390d680 gate 1563590387105027200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func1 -> DEBU 7c3 0xc00390dec0 gate 1563590387110615100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c4 0xc00390dec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c5 0xc00390dec0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c6 0xc00390dec0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c7 Verify: digest = 00000000 37 29 4f 27 ee 89 d6 8e 32 ef 91 79 4f e2 d1 74 |7)O'....2..yO..t| +peer0.org1.example.com | 00000010 e1 30 0d d1 0e 6b 5d 2b cc 5a 4f 26 a8 22 b3 9a |.0...k]+.ZO&."..|" +peer0.org1.example.com | "2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c8 Verify: sig = 00000000 30 44 02 20 5b d2 0a 4b b5 fe f2 39 00 65 ef 04 |0D. [..K...9.e..| +peer0.org1.example.com | 00000010 21 a8 70 d5 76 9b b1 b2 df 47 3a 43 7b bc 9b f4 |!.p.v....G:C{...| +peer0.org1.example.com | 00000020 31 35 67 a6 02 20 26 8b da dd f0 b4 9b b5 3e 5f |15g.. &.......>_| +peer0.org1.example.com | 00000030 3f 9a 30 db b8 50 7f bb 51 e2 59 78 e7 cb 9f 73 |?.0..P..Q.Yx...s| +peer0.org1.example.com | 00000040 3c 08 e5 df 73 bf |<...s.|" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [cauthdsl] func2 -> DEBU 7c9 0xc00390dec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [cauthdsl] func1 -> DEBU 7ca 0xc00390dec0 gate 1563590387110615100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 7cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.113 UTC [gossip.discovery] learnNewMembers -> DEBU 7d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.144 UTC [comm.grpc.server] 1 -> INFO 7d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.143Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=346.9µs +peer0.org1.example.com | "2019-07-20 02:39:47.146 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d6 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.146 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.147 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60306" +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +peer0.org1.example.com | "2019-07-20 02:39:47.148 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60306" +peer0.org1.example.com | "2019-07-20 02:39:47.149 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.149 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.150 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.150 UTC [grpc] infof -> DEBU 7de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.151 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.151 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.gossip] handleMessage -> DEBU 7e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e2 Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e3 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.152 UTC [msp] DeserializeIdentity -> DEBU 7e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [policies] Evaluate -> DEBU 7ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003988d40 gate 1563590387156212600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ec 0xc003988d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ed 0xc003988d40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ee 0xc003988d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ef 0xc003988d40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f0 0xc003988d40 gate 1563590387156212600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f4 0xc003989580 gate 1563590387157637200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003989580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.158 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003989580 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7f8 0xc003989580 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7f9 Verify: digest = 00000000 8d 96 0a e7 f4 d6 9c 6a 41 dd 56 bd 54 37 68 f8 |.......jA.V.T7h.| +peer0.org1.example.com | 00000010 86 5d 33 ca d9 e3 62 54 84 3c 10 d3 48 0d 9f 26 |.]3...bT.<..H..&|" +peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7fa Verify: sig = 00000000 30 45 02 21 00 ba ca 3b 2a 08 32 48 44 89 bb cd |0E.!...;*.2HD...| +peer0.org1.example.com | 00000010 e8 fe d1 bd 03 49 28 e4 c6 9f 33 a6 2f 6e 6a 7f |.....I(...3./nj.| +peer0.org1.example.com | 00000020 33 26 20 63 9b 02 20 36 43 a1 44 d4 f4 33 ff b3 |3& c.. 6C.D..3..| +peer0.org1.example.com | 00000030 a7 62 eb 2f b3 0e 53 6c f0 8e 83 8c ad 34 32 f1 |.b./..Sl.....42.| +peer0.org1.example.com | 00000040 92 8b 10 c6 aa a3 47 |......G|" +peer0.org1.example.com | "2019-07-20 02:39:47.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7fb 0xc003989580 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.159 UTC [cauthdsl] func1 -> DEBU 7fc 0xc003989580 gate 1563590387157637200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 800 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [msp] DeserializeIdentity -> DEBU 801 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 802 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 803 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 804 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 805 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 806 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 807 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 809 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.162 UTC [gossip.discovery] sendMemResponse -> DEBU 80a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [gossip.comm] Send -> DEBU 80d Entering, sending GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 80e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 80f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [gossip.discovery] sendMemResponse -> DEBU 810 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 811 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 812 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 813 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [policies] Evaluate -> DEBU 814 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func1 -> DEBU 815 0xc0039a7050 gate 1563590387165054700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 816 0xc0039a7050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 817 0xc0039a7050 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 818 0xc0039a7050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [cauthdsl] func2 -> DEBU 819 0xc0039a7050 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [cauthdsl] func1 -> DEBU 81a 0xc0039a7050 gate 1563590387165054700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func1 -> DEBU 81e 0xc0039a7890 gate 1563590387166750100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 81f 0xc0039a7890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 820 0xc0039a7890 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 821 0xc0039a7890 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 822 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 823 Verify: sig = 00000000 30 44 02 20 6d b6 11 5e b2 8d 15 70 cb a8 c8 d8 |0D. m..^...p....| +peer0.org1.example.com | 00000010 34 91 cf f1 80 6a 2f 1f 8e f7 15 2c bf fe d5 fc |4....j/....,....| +peer0.org1.example.com | 00000020 ee 0a 62 60 02 20 13 35 c4 b1 10 1a 41 2f 2a 16 |..b`. .5....A/*.| +peer0.org1.example.com | 00000030 c7 59 4b ca 7c 04 39 0b 04 c6 06 a2 b2 26 9c 1d |.YK.|.9......&..| +peer0.org1.example.com | 00000040 37 39 f1 c3 85 3d |79...=|" +peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [cauthdsl] func2 -> DEBU 824 0xc0039a7890 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [cauthdsl] func1 -> DEBU 825 0xc0039a7890 gate 1563590387166750100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.169 UTC [policies] Evaluate -> DEBU 826 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82a Authenticated 172.18.0.8:60306" +peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] GossipStream -> DEBU 82b Servicing 172.18.0.8:60306" +peer0.org1.example.com | "2019-07-20 02:39:47.171 UTC [gossip.comm] writeToStream -> DEBU 82c Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] serviceConnection -> DEBU 82d Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82f Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [gossip.comm] func2 -> DEBU 830 Client 172.18.0.8:60306 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [comm.grpc.server] 1 -> INFO 831 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.146Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0277ms +peer0.org1.example.com | "2019-07-20 02:39:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 832 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.175 UTC [gossip.comm] createConnection -> DEBU 835 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:47.174 UTC [gossip.comm] writeToStream -> DEBU 833 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.174 UTC [grpc] infof -> DEBU 834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.178 UTC [grpc] DialContext -> DEBU 836 parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.179 UTC [grpc] DialContext -> DEBU 837 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] watcher -> DEBU 838 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] switchBalancer -> DEBU 839 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.180 UTC [grpc] HandleSubConnStateChange -> DEBU 83a pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.187 UTC [grpc] HandleSubConnStateChange -> DEBU 83b pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, READY" +peer0.org1.example.com | "2019-07-20 02:39:47.196 UTC [msp] GetDefaultSigningIdentity -> DEBU 83c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.196 UTC [msp.identity] Sign -> DEBU 83d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [msp.identity] Sign -> DEBU 83e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 840 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 841 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 842 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 843 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 844 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.199 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 847 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 848 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 849 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func1 -> DEBU 84c 0xc003a290c0 gate 1563590387201199500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84d 0xc003a290c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84e 0xc003a290c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84f 0xc003a290c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [cauthdsl] func2 -> DEBU 850 0xc003a290c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [cauthdsl] func1 -> DEBU 851 0xc003a290c0 gate 1563590387201199500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 852 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [cauthdsl] func1 -> DEBU 855 0xc003a29900 gate 1563590387203096300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.203 UTC [cauthdsl] func2 -> DEBU 856 0xc003a29900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.204 UTC [cauthdsl] func2 -> DEBU 857 0xc003a29900 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [cauthdsl] func2 -> DEBU 858 0xc003a29900 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 859 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 85a Verify: sig = 00000000 30 45 02 21 00 e9 e4 68 d4 df e3 f8 4d 5a 3a 48 |0E.!...h....MZ:H| +peer0.org1.example.com | 00000010 69 08 ac 7a 81 65 5c ac a8 93 17 b7 50 06 16 b9 |i..z.e\.....P...| +peer0.org1.example.com | 00000020 42 6f 05 0c 4a 02 20 62 cd 76 94 68 20 61 dc f0 |Bo..J. b.v.h a..| +peer0.org1.example.com | 00000030 2e 83 42 5f 09 56 d2 9a df 89 3b 1f f1 67 8c 5e |..B_.V....;..g.^| +peer0.org1.example.com | 00000040 54 84 08 79 53 c7 cb |T..yS..|" +peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [cauthdsl] func2 -> DEBU 85b 0xc003a29900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [cauthdsl] func1 -> DEBU 85c 0xc003a29900 gate 1563590387203096300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.208 UTC [policies] Evaluate -> DEBU 85f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.209 UTC [policies] Evaluate -> DEBU 860 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.209 UTC [gossip.comm] authenticateRemotePeer -> DEBU 861 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.210 UTC [gossip.comm] createConnection -> DEBU 862 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.210 UTC [gossip.comm] sendToEndpoint -> DEBU 863 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.215 UTC [comm.grpc.server] 1 -> INFO 864 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.214Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=280.1µs +peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp] GetDefaultSigningIdentity -> DEBU 865 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 866 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 867 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 868 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60310" +peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 869 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60310" +peer0.org1.example.com | "2019-07-20 02:39:47.221 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [msp] DeserializeIdentity -> DEBU 86e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 870 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [policies] Evaluate -> DEBU 874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func1 -> DEBU 875 0xc003a8c6d0 gate 1563590387224316500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 876 0xc003a8c6d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 877 0xc003a8c6d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 878 0xc003a8c6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [cauthdsl] func2 -> DEBU 879 0xc003a8c6d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [cauthdsl] func1 -> DEBU 87a 0xc003a8c6d0 gate 1563590387224316500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func1 -> DEBU 87e 0xc003a8cf10 gate 1563590387226149600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 87f 0xc003a8cf10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 880 0xc003a8cf10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 881 0xc003a8cf10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 882 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 883 Verify: sig = 00000000 30 44 02 20 6d d0 06 0a 99 c2 1d 0b e9 3a 86 7e |0D. m........:.~| +peer0.org1.example.com | 00000010 68 d0 40 cb 2f 4e d9 d8 78 cd 47 dd 01 76 b8 9d |h.@./N..x.G..v..| +peer0.org1.example.com | 00000020 f5 70 2e 60 02 20 3d a3 e5 19 8e 4e a7 e1 9f f1 |.p.`. =....N....| +peer0.org1.example.com | 00000030 d8 bc bb ff 20 77 36 db db 14 c8 b4 d4 5d 1a 9a |.... w6......]..| +peer0.org1.example.com | 00000040 ed 38 04 92 47 49 |.8..GI|" +peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [cauthdsl] func2 -> DEBU 884 0xc003a8cf10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [cauthdsl] func1 -> DEBU 885 0xc003a8cf10 gate 1563590387226149600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.227 UTC [policies] Evaluate -> DEBU 886 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 888 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 889 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88a Authenticated 172.18.0.8:60310" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] GossipStream -> DEBU 88b Servicing 172.18.0.8:60310" +peer0.org1.example.com | "2019-07-20 02:39:47.228 UTC [gossip.comm] serviceConnection -> DEBU 88c Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [gossip.comm] writeToStream -> DEBU 88d Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [gossip.comm] readFromStream -> DEBU 88e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:39:47.229 UTC [grpc] infof -> DEBU 88f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [grpc] infof -> DEBU 890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] readFromStream -> DEBU 891 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] func2 -> DEBU 892 Client 172.18.0.8:60310 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [comm.grpc.server] 1 -> INFO 893 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.219Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6668ms +peer0.org1.example.com | "2019-07-20 02:39:47.231 UTC [gossip.comm] writeToStream -> DEBU 894 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 895 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 896 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151010 " +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 897 Sign: digest: 9E55EC7FB3BB5A09C8F1096E69D65D68FCCE83FB3E49B5C1994EDFEB97B2439D " +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 898 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 899 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 89a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:47.265 UTC [gossip.discovery] periodicalSendAlive -> DEBU 89b Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.267 UTC [gossip.comm] Send -> DEBU 89e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] Send -> DEBU 89f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.269 UTC [gossip.comm] createConnection -> DEBU 8a3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a4 parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a5 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] watcher -> DEBU 8a6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] switchBalancer -> DEBU 8a7 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.270 UTC [grpc] HandleSubConnStateChange -> DEBU 8a8 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.275 UTC [grpc] HandleSubConnStateChange -> DEBU 8a9 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, READY" +peer0.org1.example.com | "2019-07-20 02:39:47.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 8aa Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.280 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.283 UTC [msp] DeserializeIdentity -> DEBU 8af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.286 UTC [msp] DeserializeIdentity -> DEBU 8b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.287 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.288 UTC [policies] Evaluate -> DEBU 8b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.289 UTC [policies] Evaluate -> DEBU 8b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [policies] Evaluate -> DEBU 8b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [cauthdsl] func1 -> DEBU 8ba 0xc003b22fc0 gate 1563590387290515900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.290 UTC [cauthdsl] func2 -> DEBU 8bb 0xc003b22fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bc 0xc003b22fc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bd 0xc003b22fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8be 0xc003b22fc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [cauthdsl] func1 -> DEBU 8bf 0xc003b22fc0 gate 1563590387290515900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func1 -> DEBU 8c3 0xc003b23800 gate 1563590387292449700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c4 0xc003b23800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c5 0xc003b23800 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.293 UTC [cauthdsl] func2 -> DEBU 8c6 0xc003b23800 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 4b 5d ab 54 15 82 ca 40 c4 e0 84 79 |0D. K].T...@...y| +peer0.org1.example.com | 00000010 5e ca 3d 33 21 b2 3e 8c a7 81 ef 81 3b 80 cd 16 |^.=3!.>.....;...| +peer0.org1.example.com | 00000020 98 81 0e 88 02 20 7d 19 e5 dc 30 31 7d 30 0d 6c |..... }...01}0.l| +peer0.org1.example.com | 00000030 10 f1 6e 61 fc ef 84 93 f5 10 5f 08 5f 1d b7 d6 |..na......_._...| +peer0.org1.example.com | 00000040 f0 0b 6e d9 05 44 |..n..D|" +peer0.org1.example.com | "2019-07-20 02:39:47.294 UTC [cauthdsl] func2 -> DEBU 8c9 0xc003b23800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.296 UTC [cauthdsl] func1 -> DEBU 8ca 0xc003b23800 gate 1563590387292449700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.296 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8cf Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.297 UTC [gossip.comm] createConnection -> DEBU 8d0 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 8d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.302 UTC [comm.grpc.server] 1 -> INFO 8d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.301Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=480.6µs +peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d3 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d4 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.306 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:58950" +peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58950" +peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.310 UTC [msp.identity] newIdentity -> DEBU 8da Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:47.316 UTC [grpc] infof -> DEBU 8db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.318 UTC [msp] Validate -> DEBU 8dc MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.319 UTC [msp] getCertificationChain -> DEBU 8dd MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.320 UTC [msp] DeserializeIdentity -> DEBU 8df Obtaining identity" +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66f Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] func1 -> DEBU 670 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 671 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 672 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] func1 -> DEBU 673 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 674 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 675 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.common.cluster] Configure -> INFO 676 Exiting" +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> DEBU 677 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> INFO 678 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 679 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] newRaft -> INFO 67a newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 67b 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.258 UTC [orderer.consensus.etcdraft] run -> INFO 67c This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.259 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 67d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2019-07-20 02:39:39.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 67e Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.321 UTC [msp] DeserializeIdentity -> DEBU 8e1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [msp] DeserializeIdentity -> DEBU 8e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func1 -> DEBU 8e9 0xc003ba0b30 gate 1563590387323532000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ea 0xc003ba0b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8eb 0xc003ba0b30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ec 0xc003ba0b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8ed 0xc003ba0b30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8ee 0xc003ba0b30 gate 1563590387323532000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8f2 0xc003ba1390 gate 1563590387324697600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f3 0xc003ba1390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f4 0xc003ba1390 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8f5 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] Validate -> DEBU 8f6 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp] getCertificationChain -> DEBU 8f7 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [cauthdsl] func2 -> DEBU 8f8 0xc003ba1390 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:39.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 67f Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 680 Sign: plaintext: 0A00120B0A090A03010203100418050A...077E55C999B3556466F594DE3B047CB5 " +orderer0.example.com | "2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 681 Sign: digest: AEA4BEA9C2F4D3EC03C57972E641FFA37F4FFC7DA1BDC0A89540566538A541D6 " +orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 682 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 683 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 684 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:39.265 UTC [fsblkstorage] indexBlock -> DEBU 685 Indexing block [blockNum=1, blockHash=[]byte{0xf, 0x5c, 0xba, 0x1d, 0x96, 0x7b, 0x97, 0x7d, 0x56, 0xde, 0x67, 0xed, 0x27, 0xfc, 0x3b, 0x1d, 0xb7, 0xa5, 0x53, 0x81, 0xfd, 0xea, 0xcb, 0x6e, 0x75, 0x92, 0x64, 0x72, 0x6a, 0xb2, 0x7b, 0xc6} txOffsets= +orderer0.example.com | txId=2f78a887aca86ed201b3eecf6235b46f50837a1005a59ced8b90e723e89181de locPointer=offset=71, bytesLength=24832 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:39.267 UTC [fsblkstorage] updateCheckpoint -> DEBU 686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-07-20 02:39:39.267 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 687 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2019-07-20 02:39:39.454 UTC [common.deliver] deliverBlocks -> WARN 688 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39032 because of consenter error" +orderer0.example.com | "2019-07-20 02:39:39.455 UTC [orderer.common.server] func1 -> DEBU 689 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:39.455 UTC [comm.grpc.server] 1 -> INFO 68a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39032 grpc.code=OK grpc.call_duration=208.0585ms +orderer0.example.com | "2019-07-20 02:39:39.470 UTC [orderer.common.server] Deliver -> DEBU 68b Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68c Starting new deliver loop for 172.18.0.9:39034" +orderer0.example.com | "2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68d Attempting to read seek info message from 172.18.0.9:39034" +orderer0.example.com | "2019-07-20 02:39:39.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:39.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68f Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-07-20 02:39:39.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.6µs " +orderer0.example.com | "2019-07-20 02:39:39.673 UTC [common.deliver] deliverBlocks -> WARN 691 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39034 because of consenter error" +orderer0.example.com | "2019-07-20 02:39:39.673 UTC [orderer.common.server] func1 -> DEBU 692 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:39.673 UTC [comm.grpc.server] 1 -> INFO 693 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39034 grpc.code=OK grpc.call_duration=203.0503ms +orderer0.example.com | "2019-07-20 02:39:39.698 UTC [orderer.common.server] Deliver -> DEBU 694 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 695 Starting new deliver loop for 172.18.0.9:39036" +orderer0.example.com | "2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 696 Attempting to read seek info message from 172.18.0.9:39036" +orderer0.example.com | "2019-07-20 02:39:39.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU 697 No inactive chains to try to replicate" +orderer0.example.com | "2019-07-20 02:39:39.903 UTC [common.deliver] deliverBlocks -> WARN 698 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39036 because of consenter error" +orderer0.example.com | "2019-07-20 02:39:39.904 UTC [orderer.common.server] func1 -> DEBU 699 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:39.904 UTC [comm.grpc.server] 1 -> INFO 69a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39036 grpc.code=OK grpc.call_duration=206.494ms +orderer0.example.com | "2019-07-20 02:39:39.921 UTC [orderer.common.server] Deliver -> DEBU 69b Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69c Starting new deliver loop for 172.18.0.9:39038" +orderer0.example.com | "2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69d Attempting to read seek info message from 172.18.0.9:39038" +orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69f Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +orderer0.example.com | "2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +orderer0.example.com | "2019-07-20 02:39:40.123 UTC [common.deliver] deliverBlocks -> WARN 6a1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39038 because of consenter error" +orderer0.example.com | "2019-07-20 02:39:40.124 UTC [orderer.common.server] func1 -> DEBU 6a2 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:40.124 UTC [comm.grpc.server] 1 -> INFO 6a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39038 grpc.code=OK grpc.call_duration=202.4616ms +orderer0.example.com | "2019-07-20 02:39:40.149 UTC [orderer.common.server] Deliver -> DEBU 6a4 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a5 Starting new deliver loop for 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a6 Attempting to read seek info message from 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.259 UTC [orderer.consensus.etcdraft] Step -> INFO 6a7 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6a8 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] poll -> INFO 6a9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6aa 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ab 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.262 UTC [orderer.common.cluster] NewStream -> DEBU 6ac Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +peer0.org1.example.com | "2019-07-20 02:39:47.325 UTC [msp.identity] Verify -> DEBU 8f9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [msp.identity] Verify -> DEBU 8fa Verify: sig = 00000000 30 45 02 21 00 ec 4e f4 b9 c2 ae 88 47 27 4e eb |0E.!..N.....G'N.| +peer0.org1.example.com | 00000010 3f 69 a1 76 5c 36 3a d0 5b 98 46 37 df 28 42 89 |?i.v\6:.[.F7.(B.| +peer0.org1.example.com | 00000020 d0 32 07 7e 32 02 20 4e 19 cc b7 55 d9 c8 ae ad |.2.~2. N...U....| +peer0.org1.example.com | 00000030 f3 11 34 7a 2b c7 7e 6a dc 00 11 ca 5d b1 96 29 |..4z+.~j....]..)| +peer0.org1.example.com | 00000040 28 a0 24 5f 3e b6 6b |(.$_>.k|" +peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [cauthdsl] func2 -> DEBU 8fb 0xc003ba1390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [cauthdsl] func1 -> DEBU 8fc 0xc003ba1390 gate 1563590387324697600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 8ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 900 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [gossip.comm] authenticateRemotePeer -> DEBU 901 Authenticated 172.18.0.7:58950" +peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [gossip.comm] GossipStream -> DEBU 902 Servicing 172.18.0.7:58950" +peer0.org1.example.com | "2019-07-20 02:39:47.327 UTC [comm.grpc.server] 1 -> INFO 903 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.322Z grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=284.7µs +peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] readFromStream -> DEBU 904 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] func2 -> DEBU 905 Client 172.18.0.7:58950 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [comm.grpc.server] 1 -> INFO 906 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.305Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1435ms +peer0.org1.example.com | "2019-07-20 02:39:47.328 UTC [gossip.comm] writeToStream -> DEBU 907 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 908 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 909 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 90a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.332 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60318" +peer0.org1.example.com | "2019-07-20 02:39:47.334 UTC [comm.grpc.server] 1 -> INFO 90c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.333Z grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=495.3µs +peer0.org1.example.com | "2019-07-20 02:39:47.335 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90d Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60318" +peer0.org1.example.com | "2019-07-20 02:39:47.335 UTC [msp] DeserializeIdentity -> DEBU 90e Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:40.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 2 on channel businesschannel took 798.9µs" +orderer0.example.com | "2019-07-20 02:39:40.263 UTC [orderer.common.cluster] NewStream -> DEBU 6ae Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel businesschannel took 422.9µs" +orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.5µs " +orderer0.example.com | "2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.8µs " +orderer0.example.com | "2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b2 Connection from orderer1.example.com(172.18.0.3:47792)" +orderer0.example.com | "2019-07-20 02:39:40.270 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b3 Connection from orderer2.example.com(172.18.0.4:54782)" +orderer0.example.com | "2019-07-20 02:39:40.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.270 UTC [orderer.consensus.etcdraft] poll -> INFO 6b6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.271 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6b7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6b8 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] poll -> INFO 6b9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ba 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6bb 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.275 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6be Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-07-20 02:39:40.276 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " +orderer0.example.com | "2019-07-20 02:39:40.278 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " +orderer0.example.com | "2019-07-20 02:39:40.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] poll -> INFO 6c1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6c2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6c3 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] run -> INFO 6c4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.284 UTC [orderer.consensus.etcdraft] run -> INFO 6c5 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 36 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 36 bytes to 3 on channel businesschannel took 9.6µs" +orderer0.example.com | "2019-07-20 02:39:40.287 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +orderer0.example.com | "2019-07-20 02:39:40.288 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +orderer0.example.com | "2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6c9 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6cd There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.284 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " +orderer0.example.com | "2019-07-20 02:39:40.292 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6d1 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:40.295 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.303 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-07-20 02:39:40.303 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " +orderer0.example.com | "2019-07-20 02:39:40.304 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 90f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.336 UTC [msp] DeserializeIdentity -> DEBU 910 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 911 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [msp] DeserializeIdentity -> DEBU 912 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 913 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 914 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 915 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.comm] func1 -> DEBU 916 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 917 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 918 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 919 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.342 UTC [msp.identity] Verify -> DEBU 91b Verify: digest = 00000000 9e 55 ec 7f b3 bb 5a 09 c8 f1 09 6e 69 d6 5d 68 |.U....Z....ni.]h| +peer0.org1.example.com | 00000010 fc ce 83 fb 3e 49 b5 c1 99 4e df eb 97 b2 43 9d |....>I...N....C.|" +peer0.org1.example.com | "2019-07-20 02:39:47.346 UTC [msp.identity] Verify -> DEBU 91c Verify: sig = 00000000 30 44 02 20 18 f2 c2 95 0f c2 43 dd bb 8d 34 53 |0D. ......C...4S| +peer0.org1.example.com | 00000010 3d 2c a9 9a ac d2 45 f8 70 4e 74 8a ae 3b 19 33 |=,....E.pNt..;.3| +peer0.org1.example.com | 00000020 f8 4d f8 b5 02 20 08 b7 2f 8b 20 08 b9 33 38 92 |.M... ../. ..38.| +peer0.org1.example.com | 00000030 a7 08 9b fc ee dc e1 a7 88 8e 4a a3 e7 09 25 2a |..........J...%*| +peer0.org1.example.com | 00000040 48 79 eb c2 aa f7 |Hy....|" +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [gossip.discovery] isSentByMe -> DEBU 91d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU 91e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp] GetDefaultSigningIdentity -> DEBU 91f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 920 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 921 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.347 UTC [grpc] infof -> DEBU 922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [gossip.comm] authenticateRemotePeer -> DEBU 924 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58954" +peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [gossip.comm] authenticateRemotePeer -> DEBU 927 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58954" +peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func1 -> DEBU 928 0xc003c1c310 gate 1563590387349063600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [msp] DeserializeIdentity -> DEBU 929 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92a 0xc003c1c310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92b 0xc003c1c310 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [msp] DeserializeIdentity -> DEBU 92d Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6da == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:39:40.354 UTC [msp] DeserializeIdentity -> DEBU 6db Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:40.354 UTC [msp.identity] newIdentity -> DEBU 6dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:40.354 UTC [cauthdsl] func1 -> DEBU 6dd 0xc000b19be0 gate 1563590380354833100 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6de 0xc000b19be0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6df 0xc000b19be0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e0 0xc000b19be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e1 0xc000b19be0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:40.355 UTC [cauthdsl] func1 -> DEBU 6e2 0xc000b19be0 gate 1563590380354833100 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e3 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] func1 -> DEBU 6e5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e6 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func1 -> DEBU 6eb 0xc000b3d210 gate 1563590380357524400 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ec 0xc000b3d210 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ed 0xc000b3d210 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ee 0xc000b3d210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:39:40.358 UTC [cauthdsl] func2 -> DEBU 6ef 0xc000b3d210 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:40.358 UTC [cauthdsl] func1 -> DEBU 6f0 0xc000b3d210 gate 1563590380357524400 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:40.359 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func1 -> DEBU 6f4 0xc000b3da70 gate 1563590380359582400 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f5 0xc000b3da70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f6 0xc000b3da70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:40.359 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6f7 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp] Validate -> DEBU 6f8 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp] getCertificationChain -> DEBU 6f9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:40.360 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b3da70 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fb Verify: digest = 00000000 09 2c 72 fc ea 8e d5 fa 55 c5 cb c8 76 a3 20 ed |.,r.....U...v. .| +orderer0.example.com | 00000010 d8 f5 8f 8b c9 a0 b2 66 d3 5a d0 00 9a 3b 5b c3 |.......f.Z...;[.|" +orderer0.example.com | "2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fc Verify: sig = 00000000 30 44 02 21 00 fe 75 e0 47 08 50 1a 90 6c 0e 42 |0D.!..u.G.P..l.B| +orderer0.example.com | 00000010 dd d4 06 4f f2 2b 0c 8f 75 9f d2 8b 5d 3d 20 f2 |...O.+..u...]= .| +orderer0.example.com | 00000020 66 7b 07 72 98 02 1f 75 ed 66 f7 b4 5b 99 b6 17 |f{.r...u.f..[...| +orderer0.example.com | 00000030 5e fb 78 3d 43 aa 35 b8 31 c3 0c e8 17 00 2f f2 |^.x=C.5.1...../.| +orderer0.example.com | 00000040 eb fe 9f bc 6b fc |....k.|" +orderer0.example.com | "2019-07-20 02:39:40.361 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000b3da70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:40.361 UTC [cauthdsl] func1 -> DEBU 6fe 0xc000b3da70 gate 1563590380359582400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 6ff Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 701 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 702 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 703 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [common.deliver] deliverBlocks -> DEBU 705 [channel: businesschannel] Received seekInfo (0xc0008d08c0) start: > stop: > from 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [fsblkstorage] Next -> DEBU 706 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-07-20 02:39:40.362 UTC [fsblkstorage] newBlockfileStream -> DEBU 707 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 708 Remaining bytes=[23947], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 709 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 70a blockbytes [23944] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:40.363 UTC [common.deliver] deliverBlocks -> DEBU 70b [channel: businesschannel] Delivering block for (0xc0008d08c0) for 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] deliverBlocks -> DEBU 70c [channel: businesschannel] Done delivering to 172.18.0.9:39040 for (0xc0008d08c0)" +orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70d Waiting for new SeekInfo from 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70e Attempting to read seek info message from 172.18.0.9:39040" +orderer0.example.com | "2019-07-20 02:39:40.368 UTC [grpc] infof -> DEBU 70f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.368 UTC [grpc] warningf -> DEBU 710 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39040: read: connection reset by peer" +orderer0.example.com | "2019-07-20 02:39:40.369 UTC [common.deliver] Handle -> WARN 711 Error reading from 172.18.0.9:39040: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:39:40.369 UTC [orderer.common.server] func1 -> DEBU 712 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:40.370 UTC [comm.grpc.server] 1 -> INFO 713 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39040 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.1565ms +orderer0.example.com | "2019-07-20 02:39:40.371 UTC [grpc] infof -> DEBU 714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 715 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 716 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 717 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 718 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 719 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +orderer0.example.com | "2019-07-20 02:39:40.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " +orderer0.example.com | "2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62µs " +orderer0.example.com | "2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:41.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:41.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2019-07-20 02:39:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 726 Sending msg of 28 bytes to 2 on channel businesschannel took 54.9µs" +orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 727 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-07-20 02:39:41.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 728 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278µs " +orderer0.example.com | "2019-07-20 02:39:41.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.3µs " +peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [msp] DeserializeIdentity -> DEBU 92f Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:41.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 931 Got policy manager for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-07-20 02:39:41.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 932 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-07-20 02:39:41.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:39:41.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +peer0.org1.example.com | "2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [policies] Evaluate -> DEBU 935 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 936 0xc003c32a80 gate 1563590387352234800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 937 0xc003c32a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 938 0xc003c32a80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 939 0xc003c32a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 93a 0xc003c32a80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 93b 0xc003c32a80 gate 1563590387352234800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func1 -> DEBU 93f 0xc003c332c0 gate 1563590387353411100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 940 0xc003c332c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 941 0xc003c332c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 942 0xc003c332c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.353 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 44 02 20 65 d6 03 06 2b 67 cb 70 e0 a4 e2 07 |0D. e...+g.p....| +peer0.org1.example.com | 00000010 64 fb a2 19 b3 6c a6 5b 1e cf a2 43 48 39 b0 72 |d....l.[...CH9.r| +peer0.org1.example.com | 00000020 9f df cf 18 02 20 76 23 2e 73 5c ce 38 87 8d 9e |..... v#.s\.8...| +orderer0.example.com | "2019-07-20 02:39:41.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 730 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-07-20 02:39:41.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 731 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.7µs " +orderer0.example.com | "2019-07-20 02:39:41.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 728µs " +orderer0.example.com | "2019-07-20 02:39:41.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 734 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 3 on channel testchainid took 39.2µs" +orderer0.example.com | "2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 737 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " +orderer0.example.com | "2019-07-20 02:39:42.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 739 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 588.6µs " +orderer0.example.com | "2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.5µs " +orderer0.example.com | "2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel testchainid took 471.2µs" +orderer0.example.com | "2019-07-20 02:39:42.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 740 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " +orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-07-20 02:39:42.758 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +orderer0.example.com | "2019-07-20 02:39:42.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 744 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " +orderer0.example.com | "2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 746 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +orderer0.example.com | "2019-07-20 02:39:43.134 UTC [orderer.common.server] Deliver -> DEBU 74a Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:43.134 UTC [common.deliver] Handle -> DEBU 74b Starting new deliver loop for 172.18.0.9:39066" +orderer0.example.com | "2019-07-20 02:39:43.135 UTC [common.deliver] Handle -> DEBU 74c Attempting to read seek info message from 172.18.0.9:39066" +orderer0.example.com | "2019-07-20 02:39:43.157 UTC [orderer.common.server] Broadcast -> DEBU 74d Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:39:43.157 UTC [orderer.common.broadcast] Handle -> DEBU 74e Starting new broadcast loop for 172.18.0.9:39068" +orderer0.example.com | "2019-07-20 02:39:43.158 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 74f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39068" +orderer0.example.com | "2019-07-20 02:39:43.158 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 750 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 751 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 752 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.159 UTC [cauthdsl] func1 -> DEBU 756 0xc0001a8150 gate 1563590383159486800 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.159 UTC [cauthdsl] func2 -> DEBU 757 0xc0001a8150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 758 0xc0001a8150 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 759 0xc0001a8150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org1.example.com | 00000030 fd 44 e1 03 fb 66 1c 69 f4 a1 b1 f5 1e 2e 2b 2b |.D...f.i......++| +peer0.org1.example.com | 00000040 48 78 ed 05 fc 4d |Hx...M|" +peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [cauthdsl] func2 -> DEBU 945 0xc003c332c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.354 UTC [cauthdsl] func1 -> DEBU 946 0xc003c332c0 gate 1563590387353411100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 947 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 949 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 94a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.357 UTC [gossip.comm] authenticateRemotePeer -> DEBU 94b Authenticated 172.18.0.7:58954" +peer0.org1.example.com | "2019-07-20 02:39:47.358 UTC [gossip.comm] GossipStream -> DEBU 94c Servicing 172.18.0.7:58954" +peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 94d Entering, 172.18.0.7:58954 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.350 UTC [cauthdsl] func2 -> DEBU 94e 0xc003c1c310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [cauthdsl] func2 -> DEBU 94f 0xc003c1c310 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [cauthdsl] func1 -> DEBU 950 0xc003c1c310 gate 1563590387349063600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.362 UTC [cauthdsl] func1 -> DEBU 956 0xc003c1cb50 gate 1563590387362093400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 951 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.360 UTC [gossip.discovery] handleMsgFromComm -> DEBU 952 Got message: GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.364 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 957 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.364 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 959 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [policies] Evaluate -> DEBU 95e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func1 -> DEBU 95f 0xc003c42fa0 gate 1563590387367201200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 960 0xc003c42fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 961 0xc003c42fa0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 962 0xc003c42fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 75a 0xc0001a8150 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:43.161 UTC [cauthdsl] func1 -> DEBU 75b 0xc0001a8150 gate 1563590383159486800 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75c Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.162 UTC [policies] func1 -> DEBU 75e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 75f Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 761 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 762 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 763 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.164 UTC [cauthdsl] func1 -> DEBU 764 0xc0001a8f50 gate 1563590383164442500 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 765 0xc0001a8f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 766 0xc0001a8f50 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 767 0xc0001a8f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 768 0xc0001a8f50 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [cauthdsl] func1 -> DEBU 769 0xc0001a8f50 gate 1563590383164442500 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:43.165 UTC [policies] Evaluate -> DEBU 76a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func1 -> DEBU 76d 0xc0001a9b50 gate 1563590383166471700 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76e 0xc0001a9b50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76f 0xc0001a9b50 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.167 UTC [cauthdsl] func2 -> DEBU 770 0xc0001a9b50 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:43.167 UTC [msp.identity] Verify -> DEBU 771 Verify: digest = 00000000 f1 1b b5 a4 11 0d ee 67 25 3d 7c 6e 69 a9 1b 10 |.......g%=|ni...| +orderer0.example.com | 00000010 c8 ab 62 3e 3c 3f 38 1c 1b 90 39 69 1e 40 58 73 |..b> DEBU 772 Verify: sig = 00000000 30 45 02 21 00 a5 b2 eb 66 85 66 e3 74 0f c5 bc |0E.!....f.f.t...| +orderer0.example.com | 00000010 6e 5d 06 96 f7 40 aa 52 1f 88 be 6b 38 37 91 26 |n]...@.R...k87.&| +orderer0.example.com | 00000020 b1 4e 79 81 c1 02 20 21 ce 28 3d c0 b1 e8 7b 02 |.Ny... !.(=...{.| +orderer0.example.com | 00000030 3e 75 4f 40 57 45 97 3a f8 7f b4 17 5c 22 85 f4 |>uO@WE.:....\"..| +orderer0.example.com | 00000040 ea d1 33 a7 e2 d5 e5 |..3....|" +orderer0.example.com | "2019-07-20 02:39:43.168 UTC [cauthdsl] func2 -> DEBU 773 0xc0001a9b50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:43.168 UTC [cauthdsl] func1 -> DEBU 774 0xc0001a9b50 gate 1563590383166471700 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 775 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 777 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 778 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 77a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.169 UTC [common.configtx] addToMap -> DEBU 77b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.170 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 787 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 788 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 789 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] verifyDeltaSet -> DEBU 78c Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [common.configtx] policyForItem -> DEBU 78d Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78e Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78f Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 790 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 791 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 792 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 793 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 794 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 795 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 796 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 797 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func1 -> DEBU 799 0xc000321400 gate 1563590383174605800 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79a 0xc000321400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79b 0xc000321400 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 79c Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79d 0xc000321400 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79e Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +orderer0.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +orderer0.example.com | "2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79f Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +orderer0.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +orderer0.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +orderer0.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +orderer0.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +orderer0.example.com | "2019-07-20 02:39:43.175 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000321400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:43.175 UTC [cauthdsl] func1 -> DEBU 7a1 0xc000321400 gate 1563590383174605800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:43.175 UTC [policies] Evaluate -> DEBU 7a2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.176 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ab Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ac Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ad Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ae Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7af Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b0 Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b1 Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b2 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b3 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7ba Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7bb Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7bc Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bd Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7be Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bf Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c0 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c1 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c2 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c3 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c4 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c5 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c6 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] NewStandardValues -> DEBU 7c7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c8 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] Validate -> DEBU 7c9 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [common.channelconfig] validateMSP -> DEBU 7ca Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] newBccspMsp -> DEBU 7cb Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] New -> DEBU 7cc Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.182 UTC [msp] Setup -> DEBU 7cd Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.183 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.184 UTC [msp.identity] newIdentity -> DEBU 7cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d0 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] Validate -> DEBU 7d1 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d2 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] hasOURole -> DEBU 7d3 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d4 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d5 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [common.channelconfig] Validate -> DEBU 7d9 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [common.channelconfig] validateMSP -> DEBU 7da Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] newBccspMsp -> DEBU 7db Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] New -> DEBU 7dc Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp] Setup -> DEBU 7dd Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7df Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | "2019-07-20 02:39:47.368 UTC [cauthdsl] func2 -> DEBU 963 0xc003c42fa0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.368 UTC [cauthdsl] func1 -> DEBU 964 0xc003c42fa0 gate 1563590387367201200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 965 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 966 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [cauthdsl] func1 -> DEBU 968 0xc003c437e0 gate 1563590387369590100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.369 UTC [cauthdsl] func2 -> DEBU 969 0xc003c437e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96a 0xc003c437e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96b 0xc003c437e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.371 UTC [msp.identity] Verify -> DEBU 96c Verify: digest = 00000000 46 0e f5 10 76 fd 59 e6 b3 07 a1 3c a9 b9 14 47 |F...v.Y....<...G| +peer0.org1.example.com | 00000010 6e b4 e5 a5 0e 58 e2 3e 59 e7 90 e0 f0 9d 65 e3 |n....X.>Y.....e.|" +peer0.org1.example.com | "2019-07-20 02:39:47.372 UTC [msp.identity] Verify -> DEBU 96d Verify: sig = 00000000 30 45 02 21 00 b8 8e c9 09 9c 74 bb 27 15 12 64 |0E.!......t.'..d| +peer0.org1.example.com | 00000010 a8 e6 99 91 7a fc 2e 35 65 70 c5 88 dd 13 b9 37 |....z..5ep.....7| +peer0.org1.example.com | 00000020 d6 af fd aa 46 02 20 3d 93 80 67 b2 d9 73 c9 0e |....F. =..g..s..| +peer0.org1.example.com | 00000030 fb ed 14 93 c5 6c 38 74 35 30 1b 71 26 3f 14 68 |.....l8t50.q&?.h| +peer0.org1.example.com | 00000040 47 f0 c3 1c 3c 85 ea |G...<..|" +peer0.org1.example.com | "2019-07-20 02:39:47.372 UTC [cauthdsl] func2 -> DEBU 96e 0xc003c437e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [cauthdsl] func1 -> DEBU 96f 0xc003c437e0 gate 1563590387369590100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 970 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 971 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 972 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.374 UTC [policies] Evaluate -> DEBU 973 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.375 UTC [gossip.discovery] handleAliveMessage -> DEBU 974 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.375 UTC [gossip.discovery] learnNewMembers -> DEBU 975 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 976 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 977 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.376 UTC [gossip.discovery] handleAliveMessage -> DEBU 978 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 979 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [gossip.discovery] sendMemResponse -> DEBU 97a Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:39:47.377 UTC [msp] DeserializeIdentity -> DEBU 97b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [gossip.comm] Send -> DEBU 97e Entering, sending GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.378 UTC [gossip.discovery] sendMemResponse -> DEBU 97f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 980 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.379 UTC [cauthdsl] func2 -> DEBU 982 0xc003c1cb50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.380 UTC [cauthdsl] func2 -> DEBU 983 0xc003c1cb50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.381 UTC [cauthdsl] func2 -> DEBU 984 0xc003c1cb50 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 985 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 986 Verify: sig = 00000000 30 44 02 20 07 bf 14 d0 c5 d2 c1 f2 ef 16 88 ec |0D. ............| +peer0.org1.example.com | 00000010 81 9a 71 25 b5 56 e4 e9 cb d7 4c 8f 0c 43 f3 48 |..q%.V....L..C.H| +peer0.org1.example.com | 00000020 78 c8 33 85 02 20 60 09 fd ed 42 92 cb d1 d9 df |x.3.. `...B.....| +peer0.org1.example.com | 00000030 d8 6c c3 bb c4 88 49 a4 53 66 c4 e4 0d 33 9f fe |.l....I.Sf...3..| +peer0.org1.example.com | 00000040 71 c7 d1 67 c3 61 |q..g.a|" +peer0.org1.example.com | "2019-07-20 02:39:47.383 UTC [cauthdsl] func2 -> DEBU 987 0xc003c1cb50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.386 UTC [cauthdsl] func1 -> DEBU 988 0xc003c1cb50 gate 1563590387362093400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.386 UTC [policies] Evaluate -> DEBU 989 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [policies] Evaluate -> DEBU 98c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98d Authenticated 172.18.0.8:60318" +peer0.org1.example.com | "2019-07-20 02:39:47.388 UTC [gossip.comm] GossipStream -> DEBU 98e Servicing 172.18.0.8:60318" +peer0.org1.example.com | "2019-07-20 02:39:47.389 UTC [gossip.comm] writeToStream -> DEBU 98f Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.389 UTC [gossip.comm] serviceConnection -> DEBU 990 Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [grpc] infof -> DEBU 991 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 992 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 993 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:47.391 UTC [gossip.comm] func2 -> DEBU 994 Client 172.18.0.8:60318 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 995 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=60.9364ms +peer0.org1.example.com | "2019-07-20 02:39:47.392 UTC [gossip.comm] writeToStream -> DEBU 996 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.398 UTC [gossip.comm] func1 -> DEBU 997 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 998 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 999 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99c Verify: digest = 00000000 9f d0 26 d1 27 53 cc a4 10 e3 12 24 b9 9c af b5 |..&.'S.....$....| +peer0.org1.example.com | 00000010 d8 75 4f 57 66 75 65 1a 86 7e 3d c1 ec 77 c1 12 |.uOWfue..~=..w..|" +peer0.org1.example.com | "2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99d Verify: sig = 00000000 30 45 02 21 00 82 3a a6 f3 a6 43 fb fa 98 0b 6a |0E.!..:...C....j| +peer0.org1.example.com | 00000010 95 a3 d6 4b 72 16 b6 ec 61 57 e6 00 36 c7 f2 62 |...Kr...aW..6..b| +peer0.org1.example.com | 00000020 05 4f 2e fb 13 02 20 0e 17 15 56 af 2b 49 22 7d |.O.... ...V.+I"}| +peer0.org1.example.com | 00000030 30 66 0f f6 16 cf 2b 65 fb bf 25 25 21 03 0a c8 |0f....+e..%%!...| +peer0.org1.example.com | 00000040 b1 4b 80 07 67 0a ce |.K..g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 99e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 99f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] handleAliveMessage -> DEBU 9a4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9a5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.407 UTC [msp] DeserializeIdentity -> DEBU 9a6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.408 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [gossip.comm] Send -> DEBU 9a9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9aa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.410 UTC [gossip.comm] Send -> DEBU 9ab Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.411 UTC [gossip.comm] sendToEndpoint -> DEBU 9ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.412 UTC [gossip.comm] createConnection -> DEBU 9ad Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:47.413 UTC [comm.grpc.server] 1 -> INFO 9ae unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.411Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.507ms +peer0.org1.example.com | "2019-07-20 02:39:47.415 UTC [grpc] DialContext -> DEBU 9af parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.417 UTC [grpc] DialContext -> DEBU 9b1 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] watcher -> DEBU 9b2 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] switchBalancer -> DEBU 9b3 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.418 UTC [grpc] HandleSubConnStateChange -> DEBU 9b4 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.415 UTC [gossip.comm] sendToEndpoint -> DEBU 9b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.419 UTC [gossip.comm] sendToEndpoint -> DEBU 9b5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.422 UTC [comm.grpc.server] 1 -> INFO 9b6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.421Z grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.3µs +peer0.org1.example.com | "2019-07-20 02:39:47.425 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b7 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9ba Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.426 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b8 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.426 UTC [grpc] HandleSubConnStateChange -> DEBU 9b9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, READY" +peer0.org1.example.com | "2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9bb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9bd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58958" +peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9be Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58958" +peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9bf Obtaining identity" +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7e0 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] Validate -> DEBU 7e1 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e2 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] hasOURole -> DEBU 7e3 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e4 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:43.187 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e7 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e9 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ea Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7eb Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ec Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ed Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [common.channelconfig] validateMSP -> DEBU 7f0 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] newBccspMsp -> DEBU 7f1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] New -> DEBU 7f2 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.188 UTC [msp] Setup -> DEBU 7f3 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp] Validate -> DEBU 7f6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.189 UTC [msp] Setup -> DEBU 7f7 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [msp] Setup -> DEBU 7f8 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7ff Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 800 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 801 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 802 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 803 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 804 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 805 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 806 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 83f Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 840 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 841 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 842 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 843 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 844 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 845 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 846 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 847 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 848 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 849 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84a Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84b Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84c Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 84d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84e As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84f As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 850 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 851 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 852 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 853 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 854 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 855 Sign: plaintext: 0AD2060A1B08011A0608EFFDC9E90522...3AF87FB4175C2285F4EAD133A7E2D5E5 " +orderer0.example.com | "2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 856 Sign: digest: 2535EC334577C737BEBB3855C9646EDF0B2D1FD1FCFCDD1E862154A654C9A8DA " +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 859 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:39:43.200 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp.identity] newIdentity -> DEBU 85d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func1 -> DEBU 85e 0xc000c5d020 gate 1563590383201372400 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 85f 0xc000c5d020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 860 0xc000c5d020 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 861 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [msp] Validate -> DEBU 862 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 863 0xc000c5d020 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 864 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| +orderer0.example.com | 00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 865 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| +orderer0.example.com | 00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| +orderer0.example.com | 00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| +orderer0.example.com | 00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| +orderer0.example.com | 00000040 dd aa 68 72 78 34 |..hrx4|" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [cauthdsl] func2 -> DEBU 866 0xc000c5d020 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [cauthdsl] func1 -> DEBU 867 0xc000c5d020 gate 1563590383201372400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 868 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 869 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 86a Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86c Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [orderer.common.msgprocessor] Apply -> DEBU 86e Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] NewStandardValues -> DEBU 86f Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 870 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 871 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 872 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 873 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 874 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 875 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 876 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 877 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 878 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 879 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 87a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] Validate -> DEBU 87c Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [common.channelconfig] validateMSP -> DEBU 87d Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [msp] newBccspMsp -> DEBU 87e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.204 UTC [msp] New -> DEBU 87f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp] Setup -> DEBU 880 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 881 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.205 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 883 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] Validate -> DEBU 884 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 885 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] hasOURole -> DEBU 886 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 887 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 888 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] initializeProtosStruct -> DEBU 889 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 88a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] Validate -> DEBU 88c Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [common.channelconfig] validateMSP -> DEBU 88d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] newBccspMsp -> DEBU 88e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] New -> DEBU 88f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp] Setup -> DEBU 890 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 891 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 892 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9c1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [msp] DeserializeIdentity -> DEBU 9c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.428 UTC [msp.identity] Sign -> DEBU 9bc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.431 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 893 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] Validate -> DEBU 894 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 895 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] hasOURole -> DEBU 896 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 897 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.208 UTC [common.channelconfig] NewStandardValues -> DEBU 898 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89b Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 89f Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 8a1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:43.210 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.211 UTC [msp.identity] newIdentity -> DEBU 8a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.211 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.213 UTC [msp] Setup -> DEBU 8aa Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [msp] Setup -> DEBU 8ab MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ac Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8be Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c0 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:43.219 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:43.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39068" +orderer0.example.com | "2019-07-20 02:39:43.220 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:43.225 UTC [common.deliver] Handle -> WARN 8f2 Error reading from 172.18.0.9:39066: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:39:43.226 UTC [orderer.common.server] func1 -> DEBU 8f3 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:43.226 UTC [comm.grpc.server] 1 -> INFO 8f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.6637ms +orderer0.example.com | "2019-07-20 02:39:43.227 UTC [orderer.common.broadcast] Handle -> WARN 8f5 Error reading from 172.18.0.9:39068: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:39:43.227 UTC [orderer.common.server] func1 -> DEBU 8f6 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:39:43.227 UTC [comm.grpc.server] 1 -> INFO 8f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=70.1227ms +orderer0.example.com | "2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:43.228 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8fa Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:43.229 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8fb Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:43.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " +orderer0.example.com | "2019-07-20 02:39:43.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fd Sending msg of 22816 bytes to 2 on channel businesschannel took 139.7µs" +orderer0.example.com | "2019-07-20 02:39:43.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fe Sending msg of 22816 bytes to 3 on channel businesschannel took 96.2µs" +orderer0.example.com | "2019-07-20 02:39:43.236 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ff Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +orderer0.example.com | "2019-07-20 02:39:43.238 UTC [orderer.common.cluster.step] handleMessage -> DEBU 900 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 902 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 904 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU 905 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 903 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 917 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 918 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [common.configtx] policyForItem -> DEBU 919 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91b Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91c Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 920 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 921 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 922 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 923 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.243 UTC [policies] Evaluate -> DEBU 924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:43.243 UTC [cauthdsl] func1 -> DEBU 925 0xc000cda8c0 gate 1563590383243353300 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.244 UTC [cauthdsl] func2 -> DEBU 926 0xc000cda8c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 927 0xc000cda8c0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 928 0xc000cda8c0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 929 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +orderer0.example.com | 00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +orderer0.example.com | "2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 92a Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +orderer0.example.com | 00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +orderer0.example.com | 00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +orderer0.example.com | 00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +peer0.org1.example.com | "2019-07-20 02:39:47.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60326" +peer0.org1.example.com | "2019-07-20 02:39:47.432 UTC [policies] Evaluate -> DEBU 9c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9cd 0xc003d45cf0 gate 1563590387435038700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9ce 0xc003d45cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9cf 0xc003d45cf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d0 0xc003d45cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d1 0xc003d45cf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003d45cf0 gate 1563590387435038700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60326" +peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [msp] DeserializeIdentity -> DEBU 9d4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.436 UTC [policies] Evaluate -> DEBU 9d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func1 -> DEBU 9d8 0xc003d6e530 gate 1563590387437254300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9d9 0xc003d6e530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9da 0xc003d6e530 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9db 0xc003d6e530 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.437 UTC [msp.identity] Verify -> DEBU 9dc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [msp.identity] Verify -> DEBU 9dd Verify: sig = 00000000 30 45 02 21 00 a7 34 94 cc b4 6e 33 da 61 32 b7 |0E.!..4...n3.a2.| +peer0.org1.example.com | 00000010 02 32 93 59 79 93 21 66 bc 21 a2 25 1f 29 9e 4d |.2.Yy.!f.!.%.).M| +peer0.org1.example.com | 00000020 2f 7b 19 bf f5 02 20 4b e7 84 35 6f 18 ab 22 08 |/{.... K..5o..".| +peer0.org1.example.com | 00000030 f2 54 e4 20 6c 92 45 59 f2 10 63 8d 47 b2 2b 3c |.T. l.EY..c.G.+<| +peer0.org1.example.com | 00000040 fa db 89 4c 14 94 bf |...L...|" +peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [cauthdsl] func2 -> DEBU 9de 0xc003d6e530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [cauthdsl] func1 -> DEBU 9e0 0xc003d6e530 gate 1563590387437254300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.439 UTC [grpc] infof -> DEBU 9e1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [policies] Evaluate -> DEBU 9e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9e6 Authenticated 172.18.0.7:58958" +peer0.org1.example.com | "2019-07-20 02:39:47.432 UTC [msp] GetDefaultSigningIdentity -> DEBU 9cb Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [msp.identity] Sign -> DEBU 9e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.440 UTC [gossip.comm] GossipStream -> DEBU 9e7 Servicing 172.18.0.7:58958" +peer0.org1.example.com | "2019-07-20 02:39:47.441 UTC [msp.identity] Sign -> DEBU 9e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.441 UTC [msp] DeserializeIdentity -> DEBU 9ea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9ec Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] func2 -> DEBU 9ed Client 172.18.0.7:58954 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [comm.grpc.server] 1 -> INFO 9ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.2205ms +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9f1 Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [msp] DeserializeIdentity -> DEBU 9f2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] writeToStream -> DEBU 9f4 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] readFromStream -> DEBU 9f5 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9eb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9fe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ff Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.447 UTC [cauthdsl] func1 -> DEBU a03 0xc003da1580 gate 1563590387446997800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.442 UTC [gossip.comm] writeToStream -> DEBU 9f0 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a04 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a05 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.449 UTC [policies] Evaluate -> DEBU a08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.449 UTC [cauthdsl] func1 -> DEBU a09 0xc003d92da0 gate 1563590387449798200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0a 0xc003d92da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0b 0xc003d92da0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0c 0xc003d92da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0e 0xc003d92da0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func1 -> DEBU a0f 0xc003d92da0 gate 1563590387449798200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [grpc] infof -> DEBU a10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.443 UTC [gossip.comm] func2 -> DEBU 9f3 Client 172.18.0.7:58958 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [policies] Evaluate -> DEBU a11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [comm.grpc.server] 1 -> INFO a12 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.425Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.4571ms +peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0d 0xc003da1580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func1 -> DEBU a15 0xc003d935e0 gate 1563590387452999600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a17 0xc003d935e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a18 0xc003d935e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a19 0xc003d935e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a16 0xc003da1580 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1b 0xc003da1580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1c 0xc003da1580 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [cauthdsl] func1 -> DEBU a1d 0xc003da1580 gate 1563590387446997800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.454 UTC [msp.identity] Verify -> DEBU a1a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [msp.identity] Verify -> DEBU a1e Verify: sig = 00000000 30 44 02 20 7e ef 42 17 4e 75 f7 b1 84 c6 08 ac |0D. ~.B.Nu......| +peer0.org1.example.com | 00000010 f5 93 48 4f 87 36 01 b1 22 a4 ec 7c d4 b4 d1 4d |..HO.6.."..|...M| +peer0.org1.example.com | 00000020 d0 f2 3c c0 02 20 57 66 4f b8 9d bd db 81 1f 00 |..<.. WfO.......| +peer0.org1.example.com | 00000030 7c a0 23 b4 ec 75 81 de 6e 69 1e 7e 23 92 c7 42 ||.#..u..ni.~#..B| +peer0.org1.example.com | 00000040 e3 cc 03 cb 12 6c |.....l|" +peer0.org1.example.com | "2019-07-20 02:39:47.455 UTC [policies] Evaluate -> DEBU a1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func1 -> DEBU a22 0xc003d93c60 gate 1563590387456635500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a24 0xc003d93c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a25 0xc003d93c60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a26 0xc003d93c60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a23 0xc003d935e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [cauthdsl] func1 -> DEBU a27 0xc003d935e0 gate 1563590387452999600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.458 UTC [gossip.comm] authenticateRemotePeer -> DEBU a2c Authenticated 172.18.0.8:60326" +peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] GossipStream -> DEBU a2d Servicing 172.18.0.8:60326" +peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] readFromStream -> DEBU a2e Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [gossip.comm] func2 -> DEBU a2f Client 172.18.0.8:60326 disconnected" +peer0.org1.example.com | "2019-07-20 02:39:47.459 UTC [comm.grpc.server] 1 -> INFO a30 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.3484ms +peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [gossip.comm] writeToStream -> DEBU a31 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:39:47.457 UTC [msp.identity] Verify -> DEBU a32 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [msp.identity] Verify -> DEBU a33 Verify: sig = 00000000 30 45 02 21 00 ee 4f fa 86 9e 91 8b 41 9c 03 b0 |0E.!..O.....A...| +peer0.org1.example.com | 00000010 f7 d0 7a ea bf 00 52 e8 69 02 8d 71 88 48 d5 52 |..z...R.i..q.H.R| +peer0.org1.example.com | 00000020 01 44 a3 a1 4a 02 20 39 89 1d b4 e2 32 73 e9 39 |.D..J. 9....2s.9| +peer0.org1.example.com | 00000030 ed 9c 15 0b 93 84 3c c6 20 0b 3b 8e 75 b2 56 74 |......<. .;.u.Vt| +peer0.org1.example.com | 00000040 45 4f 0c d5 22 dd 1c |EO.."..|" +peer0.org1.example.com | "2019-07-20 02:39:47.460 UTC [cauthdsl] func2 -> DEBU a34 0xc003d93c60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [cauthdsl] func1 -> DEBU a35 0xc003d93c60 gate 1563590387456635500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a38 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU a3a Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] createConnection -> DEBU a3b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.462 UTC [gossip.comm] sendToEndpoint -> DEBU a3c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.comm] func1 -> DEBU a3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU a40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a41 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:47.584 UTC [msp] DeserializeIdentity -> DEBU a42 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a43 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a44 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a45 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a49 0xc003dc5ba0 gate 1563590387586305400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4a 0xc003dc5ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4b 0xc003dc5ba0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4c 0xc003dc5ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4d 0xc003dc5ba0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a4e 0xc003dc5ba0 gate 1563590387586305400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a52 0xc003de63e0 gate 1563590387586913300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a53 0xc003de63e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a54 0xc003de63e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a55 0xc003de63e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.587 UTC [grpc] infof -> DEBU a56 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a57 Verify: digest = 00000000 51 9a 6c 48 b8 eb d6 4b 88 88 ea d0 ec 8e 4b 42 |Q.lH...K......KB| +peer0.org1.example.com | 00000010 57 f4 fc 43 04 d0 64 31 4d 50 e0 af 73 83 b9 17 |W..C..d1MP..s...|" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a58 Verify: sig = 00000000 30 44 02 20 65 d8 95 e0 67 01 de a1 7e ed 23 a0 |0D. e...g...~.#.| +peer0.org1.example.com | 00000010 d2 cb 0b 0a dd 64 02 e8 07 3c d2 2b b1 0a 39 d9 |.....d...<.+..9.| +peer0.org1.example.com | 00000020 9d a3 42 2b 02 20 76 d5 68 8a ff 92 e9 b5 62 28 |..B+. v.h.....b(| +peer0.org1.example.com | 00000030 50 49 6e 8b 2b 6e ba c8 6f 8e 45 15 a3 c5 41 80 |PIn.+n..o.E...A.| +peer0.org1.example.com | 00000040 9d 53 ef fe 7e 10 |.S..~.|" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [cauthdsl] func2 -> DEBU a59 0xc003de63e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [cauthdsl] func1 -> DEBU a5a 0xc003de63e0 gate 1563590387586913300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a61 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a62 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a64 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a65 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU a66 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.comm] func1 -> DEBU a67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a69 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a6f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a70 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a71 Obtaining identity" +orderer0.example.com | 00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +orderer0.example.com | "2019-07-20 02:39:43.248 UTC [cauthdsl] func2 -> DEBU 92b 0xc000cda8c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:43.248 UTC [cauthdsl] func1 -> DEBU 92c 0xc000cda8c0 gate 1563590383243353300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 932 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.4526ms " +orderer0.example.com | "2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 935 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.251 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:39:43.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 901 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 939 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-07-20 02:39:43.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +orderer0.example.com | "2019-07-20 02:39:43.266 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 93c Sending msg of 28 bytes to 3 on channel businesschannel took 51.9µs" +orderer0.example.com | "2019-07-20 02:39:43.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +orderer0.example.com | "2019-07-20 02:39:43.268 UTC [common.configtx] recurseConfigMap -> DEBU 93e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 93f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 940 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 941 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 942 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 943 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 944 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.273 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:43.273 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] NewStandardValues -> DEBU 953 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: ConsensusType" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a75 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a76 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] createConnection -> DEBU a77 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a79 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7a parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7b scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] watcher -> DEBU a7c ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] switchBalancer -> DEBU a7d ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:39:47.601 UTC [grpc] HandleSubConnStateChange -> DEBU a7e pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:39:47.613 UTC [grpc] HandleSubConnStateChange -> DEBU a7f pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, READY" +peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp] GetDefaultSigningIdentity -> DEBU a80 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a81 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a82 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:39:47.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU a83 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a85 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 955 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 957 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 959 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95a Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95b Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95d Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [common.channelconfig] validateMSP -> DEBU 95e Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.277 UTC [msp] newBccspMsp -> DEBU 95f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.278 UTC [msp] New -> DEBU 961 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.279 UTC [msp] Setup -> DEBU 962 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:43.280 UTC [msp.identity] newIdentity -> DEBU 963 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.281 UTC [msp.identity] newIdentity -> DEBU 964 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 965 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.281 UTC [msp] Validate -> DEBU 966 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.282 UTC [common.channelconfig] NewStandardValues -> DEBU 967 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:43.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 968 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.284 UTC [common.channelconfig] Validate -> DEBU 96e Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:43.284 UTC [common.channelconfig] validateMSP -> DEBU 96f Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.284 UTC [msp] newBccspMsp -> DEBU 970 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.284 UTC [msp] New -> DEBU 971 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.285 UTC [msp] Setup -> DEBU 972 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.285 UTC [msp.identity] newIdentity -> DEBU 973 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.286 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 975 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a87 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a89 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func1 -> DEBU a90 0xc003e6ed10 gate 1563590387617822800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a91 0xc003e6ed10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a92 0xc003e6ed10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a93 0xc003e6ed10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a94 0xc003e6ed10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a95 0xc003e6ed10 gate 1563590387617822800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a99 0xc003e6f550 gate 1563590387619373700 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] Validate -> DEBU 976 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.287 UTC [msp] getCertificationChain -> DEBU 977 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] hasOURole -> DEBU 978 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] getCertificationChain -> DEBU 979 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97b Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] Validate -> DEBU 97e Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [common.channelconfig] validateMSP -> DEBU 97f Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.288 UTC [msp] newBccspMsp -> DEBU 980 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp] New -> DEBU 981 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp] Setup -> DEBU 982 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.289 UTC [msp.identity] newIdentity -> DEBU 983 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 985 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.290 UTC [msp] Validate -> DEBU 986 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 987 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] hasOURole -> DEBU 988 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 989 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98a Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98b MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:43.291 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:43.295 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9a 0xc003e6f550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9b 0xc003e6f550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9c 0xc003e6f550 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9e Verify: sig = 00000000 30 45 02 21 00 c3 13 c2 66 f7 f6 a6 53 8b 6b 86 |0E.!....f...S.k.| +peer0.org1.example.com | 00000010 c3 c3 e2 78 95 a9 22 3a f0 2e 00 bf 94 b5 74 02 |...x..":......t.| +peer0.org1.example.com | 00000020 20 8f bc 10 e4 02 20 50 2f be 78 fd 1d cd 08 72 | ..... P/.x....r| +peer0.org1.example.com | 00000030 58 e9 b7 ba 25 0d 0f 31 0c 59 72 1c 65 7a 12 dc |X...%..1.Yr.ez..| +peer0.org1.example.com | 00000040 af cb a2 d5 8d 70 b5 |.....p.|" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [cauthdsl] func2 -> DEBU a9f 0xc003e6f550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [cauthdsl] func1 -> DEBU aa0 0xc003e6f550 gate 1563590387619373700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] authenticateRemotePeer -> DEBU aa5 Authenticated 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] createConnection -> DEBU aa6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:47.621 UTC [gossip.comm] sendToEndpoint -> DEBU aa7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.270 UTC [gossip.pull] Hello -> DEBU aa8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:48.270 UTC [gossip.comm] Send -> DEBU aa9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aaa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aaf Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.273 UTC [gossip.comm] func1 -> DEBU ab4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.273 UTC [gossip.gossip] handleMessage -> DEBU ab5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.274 UTC [gossip.pull] HandleMessage -> DEBU ab6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.274 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.pull] HandleMessage -> DEBU aba GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU abb Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.281 UTC [gossip.comm] func1 -> DEBU abc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.281 UTC [gossip.gossip] handleMessage -> DEBU abd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.282 UTC [gossip.pull] HandleMessage -> DEBU abe GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.282 UTC [gossip.gossip] handleMessage -> DEBU abf Exiting" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d0 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d1 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-07-20 02:39:48.301 UTC [msp] GetDefaultSigningIdentity -> DEBU ac0 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:48.301 UTC [msp.identity] Sign -> DEBU ac1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151011 " +peer0.org1.example.com | "2019-07-20 02:39:48.302 UTC [msp.identity] Sign -> DEBU ac2 Sign: digest: FFBB9045B582F1F2F605222245833C1B3A2C2C650EF05DD7A6C39D8270C5E845 " +peer0.org1.example.com | "2019-07-20 02:39:48.303 UTC [msp] GetDefaultSigningIdentity -> DEBU ac3 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:48.303 UTC [msp.identity] Sign -> DEBU ac4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [msp.identity] Sign -> DEBU ac5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [gossip.comm] Send -> DEBU ac6 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.304 UTC [msp] DeserializeIdentity -> DEBU ac7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU ac8 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [msp] DeserializeIdentity -> DEBU ac9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU aca Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ace Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ad0 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.309 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [gossip.gossip] handleMessage -> DEBU ad9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.311 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +peer0.org1.example.com | "2019-07-20 02:39:48.313 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d2 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d3 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d4 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d8 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d9 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9db Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dc Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dd Manager Channel has managers Orderer" +peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" +peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU adb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] isSentByMe -> DEBU adc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ade Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.317 UTC [msp] DeserializeIdentity -> DEBU adf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func1 -> DEBU ae6 0xc003e87ff0 gate 1563590388319200400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae7 0xc003e87ff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae8 0xc003e87ff0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU ae9 0xc003e87ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU aea 0xc003e87ff0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aeb 0xc003e87ff0 gate 1563590388319200400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aef 0xc003f10830 gate 1563590388321942500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af0 0xc003f10830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af1 0xc003f10830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.323 UTC [cauthdsl] func2 -> DEBU af2 0xc003f10830 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.323 UTC [msp.identity] Verify -> DEBU af3 Verify: digest = 00000000 dd a6 da a6 83 bb 3d 4d 62 9a 5c b6 79 ea 94 3e |......=Mb.\.y..>| +peer0.org1.example.com | 00000010 51 07 45 5e 71 f1 1a 16 0b 38 83 2a 80 ff b5 f1 |Q.E^q....8.*....|" +peer0.org1.example.com | "2019-07-20 02:39:48.325 UTC [msp.identity] Verify -> DEBU af4 Verify: sig = 00000000 30 44 02 20 50 79 7d 88 3f 03 86 f4 b3 4f 62 86 |0D. Py}.?....Ob.| +peer0.org1.example.com | 00000010 8a 38 18 a2 e6 0f 11 c6 13 fa b4 76 ec 39 45 64 |.8.........v.9Ed| +peer0.org1.example.com | 00000020 ae b3 f0 40 02 20 0f ce 1f 8d d4 23 9c 3e 25 a0 |...@. .....#.>%.| +peer0.org1.example.com | 00000030 01 30 85 29 fd 39 85 ea 54 0e ac 7c bd 5d 42 d7 |.0.).9..T..|.]B.| +peer0.org1.example.com | 00000040 e0 b9 fa 90 d5 f9 |......|" +peer0.org1.example.com | "2019-07-20 02:39:48.326 UTC [cauthdsl] func2 -> DEBU af5 0xc003f10830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.329 UTC [cauthdsl] func1 -> DEBU af6 0xc003f10830 gate 1563590388321942500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.331 UTC [policies] Evaluate -> DEBU afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.331 UTC [gossip.discovery] handleAliveMessage -> DEBU afb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afd updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afe Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU aff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU b00 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleAliveMessage -> DEBU b01 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b02 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b04 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b05 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b07 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +peer0.org1.example.com | "2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b08 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" +peer0.org1.example.com | "2019-07-20 02:39:48.336 UTC [gossip.discovery] handleAliveMessage -> DEBU b09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.discovery] isSentByMe -> DEBU b0a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.discovery] handleAliveMessage -> DEBU b0b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.337 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9de Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9df Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e4 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e5 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] func1 -> DEBU 9e6 Executing callback to update root CAs" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e7 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e8 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:43.300 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9eb [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-07-20 02:39:43.301 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ec [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-07-20 02:39:43.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ed Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ee Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9ef Sign: plaintext: 0A020801120B0A090A03010203100418...F2CDD8D5A6282CFC0741B2C754C9EB86 " +orderer0.example.com | "2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9f0 Sign: digest: 83FA658AE2186F1919C8D657A3B6EF232379955B505EBBF4C8203590B5F4A732 " +orderer0.example.com | "2019-07-20 02:39:43.304 UTC [fsblkstorage] indexBlock -> DEBU 9f1 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= +orderer0.example.com | txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:43.306 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47640], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-07-20 02:39:43.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f3 [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2019-07-20 02:39:43.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel testchainid took 212.6µs" +orderer0.example.com | "2019-07-20 02:39:43.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " +orderer0.example.com | "2019-07-20 02:39:43.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +orderer0.example.com | "2019-07-20 02:39:43.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f8 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.9µs " +orderer0.example.com | "2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " +orderer0.example.com | "2019-07-20 02:39:43.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:43.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fe Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" +orderer0.example.com | "2019-07-20 02:39:44.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2788ms " +orderer0.example.com | "2019-07-20 02:39:44.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 2 on channel businesschannel took 50.3µs" +orderer0.example.com | "2019-07-20 02:39:44.260 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a01 Sending msg of 28 bytes to 3 on channel businesschannel took 112.8µs" +orderer0.example.com | "2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " +orderer0.example.com | "2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 492.5µs " +orderer0.example.com | "2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a07 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func1 -> DEBU b14 0xc003f253c0 gate 1563590388340226000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b15 0xc003f253c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b16 0xc003f253c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b17 0xc003f253c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b18 0xc003f253c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [cauthdsl] func1 -> DEBU b19 0xc003f253c0 gate 1563590388340226000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [policies] Evaluate -> DEBU b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func1 -> DEBU b1d 0xc003f25c00 gate 1563590388342300800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1e 0xc003f25c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1f 0xc003f25c00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.343 UTC [cauthdsl] func2 -> DEBU b20 0xc003f25c00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.343 UTC [msp.identity] Verify -> DEBU b21 Verify: digest = 00000000 83 07 cd 61 c5 95 48 f2 88 fe e8 ac 2f 59 7a 7b |...a..H...../Yz{| +peer0.org1.example.com | 00000010 5f 4d d3 51 85 71 8c 9e 54 a9 d7 0b 3d 29 32 cb |_M.Q.q..T...=)2.|" +peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [msp.identity] Verify -> DEBU b22 Verify: sig = 00000000 30 45 02 21 00 9f d8 8c b9 60 a6 3c 4e 57 db d6 |0E.!.....`. DEBU b23 0xc003f25c00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [cauthdsl] func1 -> DEBU b24 0xc003f25c00 gate 1563590388342300800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.344 UTC [policies] Evaluate -> DEBU b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b27 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b29 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2a endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 20 but got ts: inc_num:1563590371938894800 seq_num:8 " +peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [endorser] ProcessProposal -> DEBU b2f Entering: request from 172.18.0.9:58326" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] ValidateProposalMessage -> DEBU b30 ValidateProposalMessage starts for signed proposal 0xc003e3f720" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] validateChannelHeader -> DEBU b31 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b32 begin" +peer0.org1.example.com | "2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] checkSignatureFromCreator -> DEBU b34 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| +peer0.org1.example.com | 00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| +peer0.org1.example.com | 00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| +peer0.org1.example.com | 00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| +peer0.org1.example.com | 00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| +peer0.org1.example.com | 00000040 43 3c 6e 22 ad 26 76 |C DEBU b37 exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b38 validateChaincodeProposalMessage starts for proposal 0xc003e368c0, header 0xc003e3fb30" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b39 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [endorser] preProcess -> DEBU b3a [][0b8a6e52] processing txid: 0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da" +peer0.org1.example.com | "2019-07-20 02:39:48.348 UTC [endorser] SimulateProposal -> DEBU b3b [][0b8a6e52] Entry chaincode: name:"lscc" " +orderer0.example.com | "2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU a08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-07-20 02:39:44.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel businesschannel took 53.7µs" +orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.9µs " +orderer0.example.com | "2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.6µs " +orderer0.example.com | "2019-07-20 02:39:44.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:44.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a10 Sending msg of 28 bytes to 3 on channel testchainid took 269.8µs" +orderer0.example.com | "2019-07-20 02:39:45.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU a11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.6µs " +orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " +orderer0.example.com | "2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 237.3µs " +orderer0.example.com | "2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.364 UTC [orderer.common.server] Deliver -> DEBU a18 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a19 Starting new deliver loop for 172.18.0.9:39070" +orderer0.example.com | "2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a1a Attempting to read seek info message from 172.18.0.9:39070" +orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.server] Broadcast -> DEBU a1b Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] Handle -> DEBU a1c Starting new broadcast loop for 172.18.0.9:39072" +orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39072" +orderer0.example.com | "2019-07-20 02:39:45.381 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1e Processing config update message for channel businesschannel" +orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.383 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.384 UTC [msp.identity] newIdentity -> DEBU a25 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func1 -> DEBU a26 0xc000d78fa0 gate 1563590385384567000 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a27 0xc000d78fa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a28 0xc000d78fa0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a29 0xc000d78fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a2a 0xc000d78fa0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.385 UTC [cauthdsl] func1 -> DEBU a2b 0xc000d78fa0 gate 1563590385384567000 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.385 UTC [policies] Evaluate -> DEBU a2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.386 UTC [cauthdsl] func1 -> DEBU a2f 0xc000de6120 gate 1563590385386826000 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a30 0xc000de6120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a31 0xc000de6120 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.387 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a32 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [endorser] callChaincode -> INFO b3c [][0b8a6e52] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [chaincode] Execute -> DEBU b3d Entry" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| +peer0.org1.example.com | 00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| +peer0.org1.example.com | 00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| +peer0.org1.example.com | 00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| +peer0.org1.example.com | 00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| +peer0.org1.example.com | 00000040 43 3c 6e 22 ad 26 76 |C DEBU b40 Created metadata tar" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b41 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b42 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU b43 constructing new query executor txid = [709da35e-09b3-41d0-8efc-62c5eb9dda45]" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [stateleveldb] GetState -> DEBU b44 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] Done -> DEBU b45 Done with transaction simulation / query execution [709da35e-09b3-41d0-8efc-62c5eb9dda45]" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b46 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [lscc] executeInstall -> INFO b47 Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] handleMessage -> DEBU b48 [0b8a6e52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] Notify -> DEBU b49 [0b8a6e52] notifying Txid:0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da, channelID:" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [chaincode] Execute -> DEBU b4a Exit" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] callChaincode -> INFO b4b [][0b8a6e52] Exit chaincode: name:"lscc" (1ms)" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] SimulateProposal -> DEBU b4c [][0b8a6e52] Exit" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [endorser] func1 -> DEBU b4d Exit: request from 172.18.0.9:58326" +peer0.org1.example.com | "2019-07-20 02:39:48.350 UTC [comm.grpc.server] 1 -> INFO b4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58326 grpc.code=OK grpc.call_duration=2.9756ms +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b50 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +peer0.org1.example.com | 00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b51 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +peer0.org1.example.com | 00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +peer0.org1.example.com | 00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +peer0.org1.example.com | 00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +peer0.org1.example.com | 00000040 2a 14 7e f4 03 95 |*.~...|" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b52 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b53 Verify: sig = 00000000 30 44 02 20 4d c5 8f c3 73 8e 7e e4 eb f9 c4 9a |0D. M...s.~.....| +peer0.org1.example.com | 00000010 b2 3e 0d ae 27 bc 6e f3 f8 98 1d 66 d8 03 38 7f |.>..'.n....f..8.| +peer0.org1.example.com | 00000020 7b 3b ae ff 02 20 38 46 1c 79 50 aa cd d5 22 24 |{;... 8F.yP..."$| +peer0.org1.example.com | 00000030 30 a3 62 27 f9 03 b0 07 30 d7 01 8d 07 9e 82 ef |0.b'....0.......| +peer0.org1.example.com | 00000040 ae 3d 0d 1e 60 05 |.=..`.|" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] isSentByMe -> DEBU b55 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU b57 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.351 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] warningf -> DEBU b59 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58326: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:39:45.387 UTC [msp] Validate -> DEBU a33 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp] getCertificationChain -> DEBU a34 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.388 UTC [cauthdsl] func2 -> DEBU a35 0xc000de6120 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a36 Verify: digest = 00000000 c5 5a be 1c 29 23 7f 23 39 cf 17 a5 ec 41 e6 c6 |.Z..)#.#9....A..| +orderer0.example.com | 00000010 6f c0 2d c4 a5 ab 38 7c ca 36 84 c1 82 cb 1a ce |o.-...8|.6......|" +orderer0.example.com | "2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a37 Verify: sig = 00000000 30 44 02 20 67 a5 33 2b c9 f6 28 3d aa 68 79 ec |0D. g.3+..(=.hy.| +orderer0.example.com | 00000010 a7 ff 72 cb 1b 25 d6 49 4b fe 8b 44 16 b2 4e e7 |..r..%.IK..D..N.| +orderer0.example.com | 00000020 f3 91 ef 22 02 20 7a c3 5b 30 ad 9e 74 1f be 45 |...". z.[0..t..E| +orderer0.example.com | 00000030 40 b9 97 df 12 3f 78 68 99 6b 59 36 ec 06 5c 86 |@....?xh.kY6..\.| +orderer0.example.com | 00000040 1f 95 16 08 41 48 |....AH|" +orderer0.example.com | "2019-07-20 02:39:45.389 UTC [cauthdsl] func2 -> DEBU a38 0xc000de6120 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:45.389 UTC [cauthdsl] func1 -> DEBU a39 0xc000de6120 gate 1563590385386826000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3c Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3e Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] verifyDeltaSet -> DEBU a51 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [common.configtx] policyForItem -> DEBU a52 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:39:45.393 UTC [policies] Manager -> DEBU a53 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a54 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a55 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a56 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a57 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a58 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a59 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a5a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5c Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.395 UTC [policies] Evaluate -> DEBU a5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func1 -> DEBU a5e 0xc000f4d0a0 gate 1563590385396347200 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a5f 0xc000f4d0a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a60 0xc000f4d0a0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a61 Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.397 UTC [cauthdsl] func2 -> DEBU a62 0xc000f4d0a0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:45.397 UTC [msp.identity] Verify -> DEBU a63 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +orderer0.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [msp.identity] Verify -> DEBU a64 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +orderer0.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +orderer0.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +orderer0.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +orderer0.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" +peer0.org1.example.com | "2019-07-20 02:39:48.393 UTC [gossip.gossip] handleMessage -> DEBU b5d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.pull] HandleMessage -> DEBU b61 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.pull] SendDigest -> DEBU b62 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.gossip] handleMessage -> DEBU b63 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.396 UTC [gossip.discovery] handleMsgFromComm -> DEBU b60 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b64 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b65 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| +peer0.org1.example.com | 00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" +peer0.org1.example.com | "2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b66 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| +peer0.org1.example.com | 00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| +peer0.org1.example.com | 00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| +peer0.org1.example.com | 00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| +peer0.org1.example.com | 00000040 dc a4 f9 81 1a 32 |.....2|" +peer0.org1.example.com | "2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b67 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b68 Verify: sig = 00000000 30 45 02 21 00 96 a4 ee c3 c1 8e eb b9 d7 c2 9b |0E.!............| +peer0.org1.example.com | 00000010 6b ab d1 8d 5e 9f 5c 75 38 f5 10 ce 52 9c 78 d2 |k...^.\u8...R.x.| +peer0.org1.example.com | 00000020 93 a8 92 24 d3 02 20 2b e2 d7 d4 f8 0a d5 6c 72 |...$.. +......lr| +peer0.org1.example.com | 00000030 59 f3 a0 6c 99 80 0a 10 25 ff fb 32 18 71 14 78 |Y..l....%..2.q.x| +peer0.org1.example.com | 00000040 35 a9 cf 1f 10 be 91 |5......|" +peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] handleAliveMessage -> DEBU b69 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] handleAliveMessage -> DEBU b6f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU b70 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [gossip.discovery] sendMemResponse -> DEBU b71 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b72 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] Send -> DEBU b74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b76 Exiting" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [cauthdsl] func2 -> DEBU a65 0xc000f4d0a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [cauthdsl] func1 -> DEBU a66 0xc000f4d0a0 gate 1563590385396347200 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a67 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.398 UTC [common.configtx] verifyDeltaSet -> DEBU a69 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.402 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a84 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a86 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a87 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a88 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a89 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8b Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.403 UTC [common.channelconfig] Validate -> DEBU a8e Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.404 UTC [common.channelconfig] validateMSP -> DEBU a8f Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] newBccspMsp -> DEBU a90 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] New -> DEBU a91 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp] Setup -> DEBU a92 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.404 UTC [msp.identity] newIdentity -> DEBU a93 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | "2019-07-20 02:39:48.402 UTC [gossip.discovery] sendMemResponse -> DEBU b77 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:39:48.574 UTC [gossip.comm] func1 -> DEBU b78 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.574 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.575 UTC [gossip.pull] HandleMessage -> DEBU b7a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [gossip.pull] SendDigest -> DEBU b7d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:48.576 UTC [gossip.gossip] handleMessage -> DEBU b7e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.577 UTC [gossip.comm] func1 -> DEBU b7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.577 UTC [gossip.gossip] handleMessage -> DEBU b80 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.578 UTC [gossip.gossip] handleMessage -> DEBU b81 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU b82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b83 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:48.579 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.580 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b86 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b87 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func1 -> DEBU b8b 0xc003f8b790 gate 1563590388581282400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8c 0xc003f8b790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8d 0xc003f8b790 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8e 0xc003f8b790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8f 0xc003f8b790 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b90 0xc003f8b790 gate 1563590388581282400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b94 0xc003f8bfd0 gate 1563590388582493300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b95 0xc003f8bfd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b96 0xc003f8bfd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [cauthdsl] func2 -> DEBU b97 0xc003f8bfd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b98 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| +peer0.org1.example.com | 00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" +peer0.org1.example.com | "2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b99 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| +peer0.org1.example.com | 00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| +peer0.org1.example.com | 00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | +peer0.org1.example.com | 00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| +peer0.org1.example.com | 00000040 32 48 30 50 b8 |2H0P.|" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [cauthdsl] func2 -> DEBU b9a 0xc003f8bfd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [cauthdsl] func1 -> DEBU b9b 0xc003f8bfd0 gate 1563590388582493300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.585 UTC [gossip.discovery] handleAliveMessage -> DEBU ba0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.585 UTC [gossip.discovery] learnExistingMembers -> DEBU ba1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba2 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] handleAliveMessage -> DEBU ba6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [gossip.discovery] sendMemResponse -> DEBU ba8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU ba9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU baa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU bab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.588 UTC [gossip.comm] Send -> DEBU bac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bad Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.589 UTC [gossip.discovery] sendMemResponse -> DEBU baf Exiting, replying with alive: alive:%\240\0010\205)\3759\205\352T\016\254|\275]B\327\340\271\372\220\325\371" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: " +peer0.org1.example.com | "2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] Send -> DEBU bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.756 UTC [gossip.pull] Hello -> DEBU bbb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.758 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.763 UTC [gossip.comm] func1 -> DEBU bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.757 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.763 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.766 UTC [gossip.gossip] handleMessage -> DEBU bc7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bca Obtaining identity" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp.identity] newIdentity -> DEBU a94 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a95 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] Validate -> DEBU a96 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a97 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] hasOURole -> DEBU a98 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a99 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] Validate -> DEBU a9e Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [common.channelconfig] validateMSP -> DEBU a9f Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [msp] newBccspMsp -> DEBU aa0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.406 UTC [msp] New -> DEBU aa1 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.407 UTC [msp] Setup -> DEBU aa2 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.407 UTC [msp.identity] newIdentity -> DEBU aa3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:45.408 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.409 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU aa5 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.409 UTC [msp] Validate -> DEBU aa6 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa7 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] hasOURole -> DEBU aa8 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.411 UTC [common.channelconfig] NewStandardValues -> DEBU aaa Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:45.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU aab Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aad Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aae Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaf Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [common.channelconfig] validateMSP -> DEBU ab5 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:39:48.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bcf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func1 -> DEBU bd3 0xc003c5c4e0 gate 1563590388778029000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd4 0xc003c5c4e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd5 0xc003c5c4e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd6 0xc003c5c4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd7 0xc003c5c4e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bd8 0xc003c5c4e0 gate 1563590388778029000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bdc 0xc003c5cd30 gate 1563590388779866400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdd 0xc003c5cd30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bde 0xc003c5cd30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdf 0xc003c5cd30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.780 UTC [msp.identity] Verify -> DEBU be0 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:48.781 UTC [msp.identity] Verify -> DEBU be1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:48.781 UTC [cauthdsl] func2 -> DEBU be2 0xc003c5cd30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [cauthdsl] func1 -> DEBU be3 0xc003c5cd30 gate 1563590388779866400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.769 UTC [gossip.comm] sendToEndpoint -> DEBU bcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [msp] DeserializeIdentity -> DEBU be8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.783 UTC [gossip.comm] sendToEndpoint -> DEBU be9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU beb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [cauthdsl] func1 -> DEBU bef 0xc00369e5e0 gate 1563590388784488600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.762 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [gossip.comm] sendToEndpoint -> DEBU bf1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.769 UTC [gossip.comm] func1 -> DEBU bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.784 UTC [cauthdsl] func2 -> DEBU bf0 0xc00369e5e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf3 0xc00369e5e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf4 0xc00369e5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf5 0xc00369e5e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [cauthdsl] func1 -> DEBU bf6 0xc00369e5e0 gate 1563590388784488600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:45.413 UTC [msp] newBccspMsp -> DEBU ab6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.414 UTC [msp] New -> DEBU ab7 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.414 UTC [msp] Setup -> DEBU ab8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU ab9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU aba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Validate -> DEBU abb MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abc Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abd MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:45.416 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ace Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acf Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:45.427 UTC [common.channelconfig] LogSanityChecks -> DEBU b03 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [common.channelconfig] LogSanityChecks -> DEBU b04 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b05 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b06 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b07 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b08 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:48.787 UTC [cauthdsl] func1 -> DEBU bfa 0xc003424290 gate 1563590388787778800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfb 0xc003424290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfc 0xc003424290 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfe 0xc003424290 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU bff Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU c00 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:48.789 UTC [cauthdsl] func2 -> DEBU c01 0xc003424290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [cauthdsl] func1 -> DEBU c02 0xc003424290 gate 1563590388787778800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c05 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c07 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c08 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c0a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.792 UTC [msp] DeserializeIdentity -> DEBU c0b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.793 UTC [policies] Evaluate -> DEBU c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [cauthdsl] func1 -> DEBU c12 0xc002f881c0 gate 1563590388794622500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.794 UTC [cauthdsl] func2 -> DEBU c13 0xc002f881c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c14 0xc002f881c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c15 0xc002f881c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [cauthdsl] func2 -> DEBU c16 0xc002f881c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [cauthdsl] func1 -> DEBU c17 0xc002f881c0 gate 1563590388794622500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.798 UTC [policies] Evaluate -> DEBU c18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func1 -> DEBU c1b 0xc002f88a00 gate 1563590388800124500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1c 0xc002f88a00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1d 0xc002f88a00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1e 0xc002f88a00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c1f Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c20 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [cauthdsl] func2 -> DEBU c21 0xc002f88a00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [cauthdsl] func1 -> DEBU c22 0xc002f88a00 gate 1563590388800124500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.801 UTC [policies] Evaluate -> DEBU c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c25 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [msp] DeserializeIdentity -> DEBU c27 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c28 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c29 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c2d 0xc002f89af0 gate 1563590388803987600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2e 0xc002f89af0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2f 0xc002f89af0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c30 0xc002f89af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c31 0xc002f89af0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c32 0xc002f89af0 gate 1563590388803987600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.805 UTC [cauthdsl] func1 -> DEBU c36 0xc0003dc380 gate 1563590388805933700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c37 0xc0003dc380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c38 0xc0003dc380 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c39 0xc0003dc380 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.806 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [cauthdsl] func2 -> DEBU c3c 0xc0003dc380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [cauthdsl] func1 -> DEBU c3d 0xc0003dc380 gate 1563590388805933700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.807 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c40 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c42 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c44 Verify: digest = 00000000 32 33 fc e6 d3 c3 38 f4 ff ec d9 4a ea 4e 2c 6b |23....8....J.N,k| +peer0.org1.example.com | 00000010 c8 49 ed 2f c8 e7 a4 4a d2 09 e1 ac 5f 95 4a ee |.I./...J...._.J.|" +peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c45 Verify: sig = 00000000 30 44 02 20 1b b4 6d f6 ae 3b cb 37 54 49 5d 88 |0D. ..m..;.7TI].| +peer0.org1.example.com | 00000010 af a0 31 de 23 33 f2 1a 6c d6 b6 5e 78 83 08 ab |..1.#3..l..^x...| +peer0.org1.example.com | 00000020 5f e7 5f df 02 20 4a 91 80 93 fc d7 53 30 81 9c |_._.. J.....S0..| +peer0.org1.example.com | 00000030 0d 16 cc 7c ca c1 59 77 c6 ea 43 74 84 8a ad 37 |...|..Yw..Ct...7| +peer0.org1.example.com | 00000040 36 d7 1f 14 5c d8 |6...\.|" +peer0.org1.example.com | "2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c46 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:48.810 UTC [msp.identity] Verify -> DEBU c47 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +orderer0.example.com | "2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b09 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0c As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0d As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0e Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b0f Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b10 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b11 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b12 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b15 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b17 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b18 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b19 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b1a Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 0AD2060A1B08011A0608F1FDC9E90522...7868996B5936EC065C861F9516084148 " +orderer0.example.com | "2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 9F6D0925EE9C0929724A0054A3E76FD29F7437D20D76847EDFA00754ACB3E3A9 " +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c48 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c49 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:48.811 UTC [policies] Evaluate -> DEBU c4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.812 UTC [policies] Evaluate -> DEBU c4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:48.813 UTC [policies] Evaluate -> DEBU c4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:48.813 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.814 UTC [msp.identity] newIdentity -> DEBU c4e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:48.815 UTC [cauthdsl] func1 -> DEBU c4f 0xc0002ec510 gate 1563590388815103800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:48.815 UTC [cauthdsl] func2 -> DEBU c50 0xc0002ec510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:48.816 UTC [cauthdsl] func2 -> DEBU c51 0xc0002ec510 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:48.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c52 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:48.817 UTC [msp] Validate -> DEBU c53 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:48.818 UTC [msp] getCertificationChain -> DEBU c54 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:48.819 UTC [cauthdsl] func2 -> DEBU c55 0xc0002ec510 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:48.821 UTC [cauthdsl] func2 -> DEBU c58 0xc0002ec510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:48.822 UTC [cauthdsl] func1 -> DEBU c59 0xc0002ec510 gate 1563590388815103800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.824 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.825 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:48.825 UTC [gossip.gossip] handleMessage -> DEBU c5e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.pull] HandleMessage -> DEBU c60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c61 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [gossip.gossip] handleMessage -> DEBU c62 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c63 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c64 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:48.828 UTC [msp] DeserializeIdentity -> DEBU c65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.828 UTC [gossip.gossip] handleMessage -> DEBU c66 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.912 UTC [gossip.comm] func1 -> DEBU c67 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.913 UTC [gossip.gossip] handleMessage -> DEBU c68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.916 UTC [gossip.gossip] handleMessage -> DEBU c6b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.927 UTC [gossip.comm] func1 -> DEBU c6c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.928 UTC [gossip.gossip] handleMessage -> DEBU c6d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.928 UTC [gossip.pull] HandleMessage -> DEBU c6e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.pull] SendDigest -> DEBU c70 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c71 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.comm] func1 -> DEBU c6f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c72 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c73 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c74 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:48.930 UTC [gossip.gossip] handleMessage -> DEBU c75 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:48.937 UTC [gossip.comm] func1 -> DEBU c76 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.937 UTC [gossip.gossip] handleMessage -> DEBU c77 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c78 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c79 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:48.939 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:48.939 UTC [gossip.gossip] handleMessage -> DEBU c7b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [gossip.comm] func1 -> DEBU c7c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [gossip.gossip] handleMessage -> DEBU c7d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.078 UTC [msp] DeserializeIdentity -> DEBU c80 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.078 UTC [gossip.gossip] handleMessage -> DEBU c81 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.082 UTC [gossip.comm] func1 -> DEBU c82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.083 UTC [gossip.gossip] handleMessage -> DEBU c83 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.083 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.434 UTC [msp] DeserializeIdentity -> DEBU b22 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.434 UTC [msp.identity] newIdentity -> DEBU b23 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.435 UTC [cauthdsl] func1 -> DEBU b24 0xc001032ed0 gate 1563590385435836700 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b25 0xc001032ed0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b26 0xc001032ed0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b27 0xc001032ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b28 0xc001032ed0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [cauthdsl] func1 -> DEBU b29 0xc001032ed0 gate 1563590385435836700 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b2d 0xc00105c010 gate 1563590385437043000 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2e 0xc00105c010 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2f 0xc00105c010 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b30 0xc00105c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b31 0xc00105c010 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b32 0xc00105c010 gate 1563590385437043000 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.437 UTC [policies] func1 -> DEBU b35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b36 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [cauthdsl] func1 -> DEBU b3b 0xc00105cd20 gate 1563590385438562200 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.438 UTC [cauthdsl] func2 -> DEBU b3c 0xc00105cd20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b3d 0xc00105cd20 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b3e Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp] Validate -> DEBU b3f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b40 0xc00105cd20 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b41 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| +orderer0.example.com | 00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" +orderer0.example.com | "2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b42 Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| +orderer0.example.com | 00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| +orderer0.example.com | 00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| +orderer0.example.com | 00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| +orderer0.example.com | 00000040 cb 1b 9e a8 cb 43 |.....C|" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [cauthdsl] func2 -> DEBU b43 0xc00105cd20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [cauthdsl] func1 -> DEBU b44 0xc00105cd20 gate 1563590385438562200 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b45 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b46 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b47 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b49 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.441 UTC [policies] Evaluate -> DEBU b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func1 -> DEBU c8b 0xc0002d7a20 gate 1563590389084995900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8c 0xc0002d7a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8d 0xc0002d7a20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8e 0xc0002d7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [cauthdsl] func2 -> DEBU c8f 0xc0002d7a20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [cauthdsl] func1 -> DEBU c90 0xc0002d7a20 gate 1563590389084995900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.086 UTC [policies] Evaluate -> DEBU c91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.087 UTC [cauthdsl] func1 -> DEBU c94 0xc00027a260 gate 1563590389087922900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c95 0xc00027a260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c96 0xc00027a260 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c97 0xc00027a260 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c98 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c99 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [cauthdsl] func2 -> DEBU c9a 0xc00027a260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [cauthdsl] func1 -> DEBU c9b 0xc00027a260 gate 1563590389087922900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.090 UTC [msp] DeserializeIdentity -> DEBU ca0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.090 UTC [gossip.gossip] handleMessage -> DEBU ca1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [gossip.comm] func1 -> DEBU ca2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [gossip.gossip] handleMessage -> DEBU ca3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.093 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.441 UTC [orderer.common.msgprocessor] Apply -> DEBU b4b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4e Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b50 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b51 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] NewStandardValues -> DEBU b52 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b53 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b57 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] Validate -> DEBU b59 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [common.channelconfig] validateMSP -> DEBU b5a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] newBccspMsp -> DEBU b5b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] New -> DEBU b5c Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp] Setup -> DEBU b5d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.443 UTC [msp.identity] newIdentity -> DEBU b5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.444 UTC [msp.identity] newIdentity -> DEBU b5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.444 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b60 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.445 UTC [msp] Validate -> DEBU b61 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.445 UTC [msp] getCertificationChain -> DEBU b62 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [msp] hasOURole -> DEBU b63 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [msp] getCertificationChain -> DEBU b64 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b65 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b66 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [common.channelconfig] Validate -> DEBU b69 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [common.channelconfig] validateMSP -> DEBU b6a Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] newBccspMsp -> DEBU b6b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] New -> DEBU b6c Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp] Setup -> DEBU b6d Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.447 UTC [msp.identity] newIdentity -> DEBU b6e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp.identity] newIdentity -> DEBU b6f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.094 UTC [policies] Evaluate -> DEBU ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func1 -> DEBU cab 0xc00027bda0 gate 1563590389095398000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cac 0xc00027bda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cad 0xc00027bda0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cae 0xc00027bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [cauthdsl] func2 -> DEBU caf 0xc00027bda0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [cauthdsl] func1 -> DEBU cb0 0xc00027bda0 gate 1563590389095398000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [policies] Evaluate -> DEBU cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func1 -> DEBU cb4 0xc0002665e0 gate 1563590389097311700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb5 0xc0002665e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb6 0xc0002665e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb7 0xc0002665e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:49.098 UTC [cauthdsl] func2 -> DEBU cba 0xc0002665e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [cauthdsl] func1 -> DEBU cbb 0xc0002665e0 gate 1563590389097311700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [msp] DeserializeIdentity -> DEBU cc0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.100 UTC [gossip.gossip] handleMessage -> DEBU cc1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.225 UTC [gossip.comm] func1 -> DEBU cc2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.225 UTC [gossip.gossip] handleMessage -> DEBU cc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.227 UTC [gossip.gossip] handleMessage -> DEBU cc7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.230 UTC [gossip.comm] func1 -> DEBU cc8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b70 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] Validate -> DEBU b71 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.448 UTC [msp] getCertificationChain -> DEBU b72 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [msp] hasOURole -> DEBU b73 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [msp] getCertificationChain -> DEBU b74 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b75 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b78 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7a Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7c Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7d Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7f Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [common.channelconfig] validateMSP -> DEBU b80 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] newBccspMsp -> DEBU b81 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] New -> DEBU b82 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp] Setup -> DEBU b83 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b84 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b85 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Validate -> DEBU b86 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b87 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b88 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b8a Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8b Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8d Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8e Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:39:49.230 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ccb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.231 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func1 -> DEBU cd1 0xc000262860 gate 1563590389232465300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd2 0xc000262860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd3 0xc000262860 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd4 0xc000262860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [cauthdsl] func2 -> DEBU cd5 0xc000262860 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [cauthdsl] func1 -> DEBU cd6 0xc000262860 gate 1563590389232465300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [policies] Evaluate -> DEBU cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func1 -> DEBU cda 0xc0002630a0 gate 1563590389234175000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdb 0xc0002630a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdc 0xc0002630a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdd 0xc0002630a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.234 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [cauthdsl] func2 -> DEBU ce0 0xc0002630a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.235 UTC [cauthdsl] func1 -> DEBU ce1 0xc0002630a0 gate 1563590389234175000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.237 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.238 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.239 UTC [msp] DeserializeIdentity -> DEBU ce6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.239 UTC [gossip.gossip] handleMessage -> DEBU ce7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.273 UTC [gossip.pull] SendReq -> DEBU ce8 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:49.274 UTC [gossip.comm] Send -> DEBU ce9 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.pull] SendReq -> DEBU cea Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc8 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] propose -> INFO bce Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bcf [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39072" +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bd0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd1 Proposed block [2] to raft consensus" channel=businesschannel node=1 +peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.comm] Send -> DEBU cec Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:49.275 UTC [gossip.comm] sendToEndpoint -> DEBU ceb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU ced Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU cee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.278 UTC [gossip.comm] sendToEndpoint -> DEBU cef Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.gossip] handleMessage -> DEBU cf1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [msp] DeserializeIdentity -> DEBU cf2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.283 UTC [policies] Evaluate -> DEBU cf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.286 UTC [cauthdsl] func1 -> DEBU cfa 0xc000228180 gate 1563590389286449300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfb 0xc000228180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfc 0xc000228180 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfd 0xc000228180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfe 0xc000228180 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.288 UTC [cauthdsl] func1 -> DEBU cff 0xc000228180 gate 1563590389286449300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.290 UTC [cauthdsl] func1 -> DEBU d03 0xc00020cb70 gate 1563590389290395000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.290 UTC [cauthdsl] func2 -> DEBU d04 0xc00020cb70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.291 UTC [cauthdsl] func2 -> DEBU d05 0xc00020cb70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.292 UTC [cauthdsl] func2 -> DEBU d06 0xc00020cb70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.292 UTC [msp.identity] Verify -> DEBU d07 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +peer0.org1.example.com | "2019-07-20 02:39:49.293 UTC [msp.identity] Verify -> DEBU d08 Verify: sig = 00000000 30 44 02 20 16 11 2c 76 34 0b 04 99 7d e7 f0 df |0D. ..,v4...}...| +peer0.org1.example.com | 00000010 43 2d 8c 9d e2 09 62 f0 49 8e 3a a0 26 d1 c8 e6 |C-....b.I.:.&...| +peer0.org1.example.com | 00000020 7d 07 c6 57 02 20 66 02 4d 17 39 5f d4 bd 22 ef |}..W. f.M.9_..".| +peer0.org1.example.com | 00000030 56 e0 3b 54 38 80 01 ed 3f a5 90 22 06 14 80 77 |V.;T8...?.."...w| +peer0.org1.example.com | 00000040 bf ae d3 ef 0c ad |......|" +peer0.org1.example.com | "2019-07-20 02:39:49.294 UTC [cauthdsl] func2 -> DEBU d09 0xc00020cb70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.295 UTC [cauthdsl] func1 -> DEBU d0a 0xc00020cb70 gate 1563590389290395000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.298 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.300 UTC [gossip.pull] HandleMessage -> DEBU d11 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.301 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.305 UTC [msp] DeserializeIdentity -> DEBU d14 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.463 UTC [common.deliver] Handle -> WARN bd2 Error reading from 172.18.0.9:39070: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:39:45.463 UTC [orderer.common.server] func1 -> DEBU bd3 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:45.463 UTC [comm.grpc.server] 1 -> INFO bd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.9045ms +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.broadcast] Handle -> WARN bd6 Error reading from 172.18.0.9:39072: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.server] func1 -> DEBU bd7 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [comm.grpc.server] 1 -> INFO bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.1023ms +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 22872 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdb Sending msg of 22872 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdc Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +orderer0.example.com | "2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdd Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " +orderer0.example.com | "2019-07-20 02:39:45.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU bde Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdf Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" +orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel businesschannel took 48.5µs" +orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +orderer0.example.com | "2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] writeBlock -> INFO be2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:39:45.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU be3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [common.configtx] policyForItem -> DEBU bf6 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf7 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf8 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf9 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfa Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfb Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfc Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfd Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfe Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bff Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU c00 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.473 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c02 0xc0011fb840 gate 1563590385474029500 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c03 0xc0011fb840 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c04 0xc0011fb840 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c05 0xc0011fb840 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c06 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +orderer0.example.com | 00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c07 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +orderer0.example.com | 00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +orderer0.example.com | 00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +orderer0.example.com | 00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +orderer0.example.com | 00000040 e9 49 62 bf 87 8d |.Ib...|" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c08 0xc0011fb840 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c09 0xc0011fb840 gate 1563590385474029500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.474 UTC [common.configtx] verifyDeltaSet -> DEBU c0c Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c13 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c14 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c15 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c16 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.476 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3075ms " +orderer0.example.com | "2019-07-20 02:39:45.476 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c1f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c20 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.492 UTC [common.configtx] recurseConfigMap -> DEBU c21 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c22 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c23 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:39:49.306 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.307 UTC [gossip.gossip] func2 -> DEBU d16 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-07-20 02:39:49.307 UTC [gossip.pull] HandleMessage -> DEBU d17 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +peer0.org1.example.com | "2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d18 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d19 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.309 UTC [msp] DeserializeIdentity -> DEBU d1a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.310 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:49.311 UTC [policies] Evaluate -> DEBU d1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.312 UTC [policies] Evaluate -> DEBU d1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:49.313 UTC [policies] Evaluate -> DEBU d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.313 UTC [cauthdsl] func1 -> DEBU d21 0xc00044e980 gate 1563590389313647700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d22 0xc00044e980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d23 0xc00044e980 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d24 0xc00044e980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d25 0xc00044e980 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.319 UTC [cauthdsl] func1 -> DEBU d26 0xc00044e980 gate 1563590389313647700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:49.320 UTC [policies] Evaluate -> DEBU d27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:49.322 UTC [cauthdsl] func1 -> DEBU d2a 0xc00044f240 gate 1563590389322117800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:49.322 UTC [cauthdsl] func2 -> DEBU d2b 0xc00044f240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2c 0xc00044f240 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2d 0xc00044f240 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2e Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +peer0.org1.example.com | "2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2f Verify: sig = 00000000 30 45 02 21 00 b2 0f 25 2e 73 2c ce ca bb da 79 |0E.!...%.s,....y| +peer0.org1.example.com | 00000010 49 7b f3 40 32 fb 7b 7e 3c f4 d0 a5 9c 36 14 8a |I{.@2.{~<....6..| +peer0.org1.example.com | 00000020 ca b4 aa d9 f3 02 20 30 b1 bf 9c 24 a5 aa 46 47 |...... 0...$..FG| +peer0.org1.example.com | 00000030 51 70 36 5a 52 b5 25 aa bf 66 3b 36 1d 1e c6 3a |Qp6ZR.%..f;6...:| +peer0.org1.example.com | 00000040 fb ef cf 54 18 2b 4d |...T.+M|" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [cauthdsl] func2 -> DEBU d30 0xc00044f240 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [cauthdsl] func1 -> DEBU d31 0xc00044f240 gate 1563590389322117800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:49.326 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d38 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d39 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c24 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] NewStandardValues -> DEBU c25 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c26 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c28 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2b Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2f Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d3b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.gossip] func2 -> DEBU d3d Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d3e Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +peer0.org1.example.com | "2019-07-20 02:39:49.327 UTC [gossip.gossip] handleMessage -> DEBU d3f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.574 UTC [gossip.comm] func1 -> DEBU d40 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.574 UTC [gossip.gossip] handleMessage -> DEBU d41 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.576 UTC [gossip.pull] HandleMessage -> DEBU d42 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:49.576 UTC [msp] DeserializeIdentity -> DEBU d43 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:49.577 UTC [gossip.gossip] handleMessage -> DEBU d44 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:49.577 UTC [gossip.pull] SendRes -> DEBU d45 Sending 1 IDENTITY_MSG items to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:50.748 UTC [endorser] ProcessProposal -> DEBU d46 Entering: request from 172.18.0.9:58342" +peer0.org1.example.com | "2019-07-20 02:39:50.748 UTC [protoutils] ValidateProposalMessage -> DEBU d47 ValidateProposalMessage starts for signed proposal 0xc0002c0d70" +peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [protoutils] validateChannelHeader -> DEBU d48 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [protoutils] checkSignatureFromCreator -> DEBU d49 begin" +peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [msp] GetManagerForChain -> DEBU d4a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:39:50.749 UTC [msp] DeserializeIdentity -> DEBU d4b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [msp.identity] newIdentity -> DEBU d4c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [protoutils] checkSignatureFromCreator -> DEBU d4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:39:50.750 UTC [msp] Validate -> DEBU d4e MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp] getCertificationChain -> DEBU d4f MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [protoutils] checkSignatureFromCreator -> DEBU d50 creator is valid" +peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| +peer0.org1.example.com | 00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" +peer0.org1.example.com | "2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| +peer0.org1.example.com | 00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| +peer0.org1.example.com | 00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| +peer0.org1.example.com | 00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| +peer0.org1.example.com | 00000040 4d 7b 7e 17 65 84 |M{~.e.|" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] checkSignatureFromCreator -> DEBU d53 exits successfully" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d54 validateChaincodeProposalMessage starts for proposal 0xc003982bd0, header 0xc0002c12c0" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d55 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [endorser] preProcess -> DEBU d56 [businesschannel][79f74fa3] processing txid: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d57 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d58 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d59 constructing new tx simulator txid = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +peer0.org1.example.com | "2019-07-20 02:39:50.753 UTC [endorser] SimulateProposal -> DEBU d5a [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:39:50.753 UTC [endorser] callChaincode -> INFO d5b [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:39:50.754 UTC [chaincode] Execute -> DEBU d5c Entry" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] handleMessage -> DEBU d5d [79f74fa3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d5e [79f74fa3] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d5f [79f74fa3] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [stateleveldb] GetState -> DEBU d60 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d61 [79f74fa3] No state associated with key: exp02. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d62 [79f74fa3] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:39:50.756 UTC [msp] GetManagerForChain -> DEBU d63 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func1 -> DEBU d64 0xc00042a3a0 gate 1563590390756990200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d65 0xc00042a3a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d66 0xc00042a3a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d67 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d68 0xc00042a3a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d69 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| +peer0.org1.example.com | 00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" +peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d6a Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| +peer0.org1.example.com | 00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| +peer0.org1.example.com | 00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| +peer0.org1.example.com | 00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| +peer0.org1.example.com | 00000040 4d 7b 7e 17 65 84 |M{~.e.|" +peer0.org1.example.com | "2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d6b 0xc00042a3a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6c 0xc00042a3a0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6d 0xc00042a3a0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6e 0xc00042a3a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:50.764 UTC [cauthdsl] func1 -> DEBU d6f 0xc00042a3a0 gate 1563590390756990200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] handleMessage -> DEBU d70 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d71 [79f74fa3] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d72 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] Validate -> DEBU c32 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.495 UTC [msp] Setup -> DEBU c36 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c38 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c39 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] Validate -> DEBU c3a MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.500 UTC [msp] getCertificationChain -> DEBU c3b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [msp] hasOURole -> DEBU c3c MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [msp] getCertificationChain -> DEBU c3d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c3e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c40 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [common.channelconfig] Validate -> DEBU c43 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [common.channelconfig] validateMSP -> DEBU c44 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] newBccspMsp -> DEBU c45 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] New -> DEBU c46 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp] Setup -> DEBU c47 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.505 UTC [msp.identity] newIdentity -> DEBU c48 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c4a Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.506 UTC [msp] Validate -> DEBU c4b MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.516 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.516 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2019-07-20 02:39:45.515 UTC [msp] getCertificationChain -> DEBU c4f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.521 UTC [msp] hasOURole -> DEBU c50 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:39:45.521 UTC [msp] getCertificationChain -> DEBU c51 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] NewStandardValues -> DEBU c52 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c56 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c58 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c59 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5a Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c5b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5c Processing field: MSP" +orderer0.example.com | "2019-07-20 02:39:45.523 UTC [common.channelconfig] validateMSP -> DEBU c5d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.524 UTC [msp] newBccspMsp -> DEBU c5e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.524 UTC [msp] New -> DEBU c5f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:39:45.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +orderer0.example.com | "2019-07-20 02:39:45.525 UTC [msp] Setup -> DEBU c61 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:39:45.525 UTC [msp.identity] newIdentity -> DEBU c62 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.526 UTC [msp.identity] newIdentity -> DEBU c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:45.526 UTC [msp] Validate -> DEBU c64 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c65 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c66 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c68 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c69 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6e Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6f Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c70 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c71 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c72 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c73 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c74 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c75 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c76 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c77 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c78 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c79 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7a Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7b Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7c Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:39:45.530 UTC [policies] NewManagerImpl -> DEBU c7d Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c91 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c92 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c93 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c94 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c95 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c96 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c97 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c98 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9c Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cac As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cad As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cae Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU caf Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb0 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb1 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb3 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb4 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb5 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb6 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb7 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb8 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb9 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cba Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cbb Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbd As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbe As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.channelconfig] LogSanityChecks -> DEBU cbf As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc0 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc1 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] func1 -> DEBU cc2 Executing callback to update root CAs" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc3 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc4 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc5 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc6 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc7 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cc9 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cca Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccb Sign: plaintext: 0A020802120B0A090A03010203100418...D73374974139F129A9820B7A112A17B7 " +orderer0.example.com | "2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccc Sign: digest: EC2AF97FF1FA7BB4F053EAEFF9365BF57FB7A816189F3740CC5BC0EDB381C885 " +orderer0.example.com | "2019-07-20 02:39:45.541 UTC [fsblkstorage] indexBlock -> DEBU ccd Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= +orderer0.example.com | txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:39:45.542 UTC [fsblkstorage] updateCheckpoint -> DEBU cce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71390], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-07-20 02:39:45.542 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ccf [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd0 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.3µs " +orderer0.example.com | "2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " +orderer0.example.com | "2019-07-20 02:39:45.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:45.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 3 on channel testchainid took 152.2µs" +orderer0.example.com | "2019-07-20 02:39:46.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +orderer0.example.com | "2019-07-20 02:39:46.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" +orderer0.example.com | "2019-07-20 02:39:46.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-07-20 02:39:46.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 433.1µs " +orderer0.example.com | "2019-07-20 02:39:46.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 661.6µs " +orderer0.example.com | "2019-07-20 02:39:46.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 3 on channel testchainid took 441.5µs" +orderer0.example.com | "2019-07-20 02:39:46.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.8µs " +orderer0.example.com | "2019-07-20 02:39:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce2 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [lscc] putChaincodeCollectionData -> DEBU d73 No collection configuration specified" +peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [gossip.channel] reportMembershipChanges -> INFO d74 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-07-20 02:39:50.766 UTC [chaincode] handleMessage -> DEBU d75 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:39:50.767 UTC [chaincode] Notify -> DEBU d76 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:39:50.767 UTC [chaincode] Execute -> DEBU d77 Exit" +peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] LaunchConfig -> DEBU d78 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d79 start container: exp02:1.0" +peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7b start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-07-20 02:39:50.768 UTC [container] lockContainer -> DEBU d7c waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-07-20 02:39:50.769 UTC [container] lockContainer -> DEBU d7d got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-07-20 02:39:50.769 UTC [dockercontroller] stopInternal -> DEBU d7e stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d7f stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d80 killing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d81 kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d82 removing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:39:50.778 UTC [dockercontroller] stopInternal -> DEBU d83 remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-07-20 02:39:50.779 UTC [dockercontroller] createContainer -> DEBU d84 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:39:50.779 UTC [dockercontroller] getDockerHostConfig -> DEBU d85 docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-07-20 02:39:50.785 UTC [chaincode.platform] GenerateDockerfile -> DEBU d86 +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.15 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.2" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.15" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" +peer0.org1.example.com | "2019-07-20 02:39:50.790 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO d87 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-07-20 02:39:50.791 UTC [chaincode.platform.util] DockerBuild -> DEBU d88 Attempting build with image hyperledger/fabric-ccenv:latest" +peer0.org1.example.com | "2019-07-20 02:39:51.783 UTC [gossip.election] waitForInterrupt -> DEBU d89 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [gossip.election] IsLeader -> DEBU d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp] GetDefaultSigningIdentity -> DEBU d8b Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510031801 " +peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8d Sign: digest: C125DA54F2FD625A6FF1593601FC46CF784E6611475464A50DC95F7779AC6E7F " +peer0.org1.example.com | "2019-07-20 02:39:51.784 UTC [gossip.election] waitForInterrupt -> DEBU d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d8f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d90 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d91 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d92 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] Send -> DEBU d93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d97 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.954 UTC [gossip.comm] func1 -> DEBU d98 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.2µs " +orderer0.example.com | "2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.2µs " +orderer0.example.com | "2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +orderer0.example.com | "2019-07-20 02:39:47.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU cea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +orderer0.example.com | "2019-07-20 02:39:47.109 UTC [orderer.common.server] Deliver -> DEBU ceb Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU cec Starting new deliver loop for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU ced Attempting to read seek info message from 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cf0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.112 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:47.113 UTC [msp.identity] newIdentity -> DEBU cf4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func1 -> DEBU cf5 0xc00098cf70 gate 1563590387113997400 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf6 0xc00098cf70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf7 0xc00098cf70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf8 0xc00098cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf9 0xc00098cf70 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.115 UTC [cauthdsl] func1 -> DEBU cfa 0xc00098cf70 gate 1563590387113997400 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfb Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] func1 -> DEBU cfd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfe Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func1 -> DEBU d03 0xc000a9a660 gate 1563590387117229100 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d04 0xc000a9a660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d05 0xc000a9a660 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d06 0xc000a9a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:47.118 UTC [cauthdsl] func2 -> DEBU d07 0xc000a9a660 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.118 UTC [cauthdsl] func1 -> DEBU d08 0xc000a9a660 gate 1563590387117229100 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d09 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [policies] Evaluate -> DEBU d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func1 -> DEBU d0c 0xc000a9aec0 gate 1563590387119254800 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0d 0xc000a9aec0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0e 0xc000a9aec0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d0f Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:47.119 UTC [msp] Validate -> DEBU d10 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:47.120 UTC [msp] getCertificationChain -> DEBU d11 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:47.120 UTC [cauthdsl] func2 -> DEBU d12 0xc000a9aec0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d13 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| +orderer0.example.com | 00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d14 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| +orderer0.example.com | 00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| +orderer0.example.com | 00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| +orderer0.example.com | 00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| +orderer0.example.com | 00000040 f0 df 1f af fc f3 dc |.......|" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [cauthdsl] func2 -> DEBU d15 0xc000a9aec0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [cauthdsl] func1 -> DEBU d16 0xc000a9aec0 gate 1563590387119254800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d19 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [common.deliver] deliverBlocks -> DEBU d1d [channel: businesschannel] Received seekInfo (0xc000d15040) start: > stop: > from 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] Next -> DEBU d1e Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] newBlockfileStream -> DEBU d1f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 Remaining bytes=[47443], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d21 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +orderer0.example.com | "2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d22 blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d23 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d24 Remaining bytes=[23750], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d25 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +orderer0.example.com | "2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d26 blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d27 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:39:47.124 UTC [fsblkstorage] waitForBlock -> DEBU d28 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-07-20 02:39:47.246 UTC [orderer.common.server] Deliver -> DEBU d29 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:39:47.246 UTC [common.deliver] Handle -> DEBU d2a Starting new deliver loop for 172.18.0.7:44748" +orderer0.example.com | "2019-07-20 02:39:47.247 UTC [common.deliver] Handle -> DEBU d2b Attempting to read seek info message from 172.18.0.7:44748" +orderer0.example.com | "2019-07-20 02:39:47.247 UTC [policies] Evaluate -> DEBU d2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.249 UTC [msp] DeserializeIdentity -> DEBU d31 Obtaining identity" +orderer0.example.com | "2019-07-20 02:39:47.249 UTC [msp.identity] newIdentity -> DEBU d32 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +orderer0.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +orderer0.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +orderer0.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d33 0xc000372b00 gate 1563590387250332700 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d34 0xc000372b00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d35 0xc000372b00 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d36 0xc000372b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d37 0xc000372b00 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d38 0xc000372b00 gate 1563590387250332700 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d39 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] func1 -> DEBU d3b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3c Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d41 0xc0001c8490 gate 1563590387252058500 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d42 0xc0001c8490 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d43 0xc0001c8490 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d44 0xc0001c8490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d45 0xc0001c8490 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d46 0xc0001c8490 gate 1563590387252058500 evaluation fails" +orderer0.example.com | "2019-07-20 02:39:47.252 UTC [policies] Evaluate -> DEBU d47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func1 -> DEBU d4a 0xc0001c8d20 gate 1563590387253349900 evaluation starts" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4b 0xc0001c8d20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4c 0xc0001c8d20 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4d Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-07-20 02:39:47.253 UTC [msp] Validate -> DEBU d4e MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp] getCertificationChain -> DEBU d4f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:39:47.254 UTC [cauthdsl] func2 -> DEBU d50 0xc0001c8d20 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 a3 6c 91 0d 93 c2 2b b7 84 4f c8 13 c2 e8 ec ac |.l....+..O......| +orderer0.example.com | 00000010 69 f1 88 f4 ef 83 1f d4 73 fe 27 7c 4d 2c 47 4d |i.......s.'|M,GM|" +orderer0.example.com | "2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 45 02 21 00 8c 87 61 6a 22 10 2f 66 11 6e 4d |0E.!...aj"./f.nM| +orderer0.example.com | 00000010 a3 04 ef 75 b5 e3 22 96 86 ad f2 79 9f ed 05 b1 |...u.."....y....| +orderer0.example.com | 00000020 8d e3 ec 68 9d 02 20 14 82 79 23 28 47 2f f6 12 |...h.. ..y#(G/..| +orderer0.example.com | 00000030 4b 4c 70 b7 45 df ab f5 65 80 5a df 45 e2 e3 8a |KLp.E...e.Z.E...| +orderer0.example.com | 00000040 db 2a f3 7a cd d7 10 |.*.z...|" +orderer0.example.com | "2019-07-20 02:39:47.255 UTC [cauthdsl] func2 -> DEBU d53 0xc0001c8d20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:39:47.255 UTC [cauthdsl] func1 -> DEBU d54 0xc0001c8d20 gate 1563590387253349900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:47.257 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:39:47.257 UTC [common.deliver] deliverBlocks -> DEBU d5b [channel: businesschannel] Received seekInfo (0xc0008d0100) start: > stop: > from 172.18.0.7:44748" +orderer0.example.com | "2019-07-20 02:39:47.257 UTC [fsblkstorage] Next -> DEBU d5c Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-07-20 02:39:47.257 UTC [fsblkstorage] newBlockfileStream -> DEBU d5d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5e Remaining bytes=[47443], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5f Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +orderer0.example.com | "2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d60 blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" +orderer0.example.com | "2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +orderer0.example.com | "2019-07-20 02:39:47.259 UTC [common.deliver] deliverBlocks -> DEBU d64 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" +orderer0.example.com | "2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.9µs " +orderer0.example.com | "2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d66 Remaining bytes=[23750], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d67 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +orderer0.example.com | "2019-07-20 02:39:47.260 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d68 blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-07-20 02:39:47.260 UTC [common.deliver] deliverBlocks -> DEBU d69 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" +orderer0.example.com | "2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.274 UTC [fsblkstorage] waitForBlock -> DEBU d6c Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-07-20 02:39:47.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-07-20 02:39:47.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +orderer0.example.com | "2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +orderer0.example.com | "2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " +orderer0.example.com | "2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel testchainid took 549.1µs" +orderer0.example.com | "2019-07-20 02:39:48.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.7µs " +orderer0.example.com | "2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 2 on channel businesschannel took 110.7µs" +orderer0.example.com | "2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +orderer0.example.com | "2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " +orderer0.example.com | "2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +orderer0.example.com | "2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel testchainid took 1.0259ms" +orderer0.example.com | "2019-07-20 02:39:48.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " +orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +orderer0.example.com | "2019-07-20 02:39:48.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.2µs " +orderer0.example.com | "2019-07-20 02:39:48.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU d85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " +orderer0.example.com | "2019-07-20 02:39:48.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel testchainid took 74.6µs" +orderer0.example.com | "2019-07-20 02:39:49.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-07-20 02:39:49.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.1µs " +orderer0.example.com | "2019-07-20 02:39:49.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +orderer0.example.com | "2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-07-20 02:39:49.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.8µs " +orderer0.example.com | "2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +orderer0.example.com | "2019-07-20 02:39:49.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:49.766 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2019-07-20 02:39:50.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 623.2µs " +orderer0.example.com | "2019-07-20 02:39:50.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 733.7µs " +orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU da3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 46µs" +orderer0.example.com | "2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +orderer0.example.com | "2019-07-20 02:39:50.744 UTC [orderer.common.server] Broadcast -> DEBU da6 Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:39:50.745 UTC [orderer.common.broadcast] Handle -> DEBU da7 Starting new broadcast loop for 172.18.0.9:39140" +orderer0.example.com | "2019-07-20 02:39:50.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-07-20 02:39:50.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 3 on channel businesschannel took 382.5µs" +orderer0.example.com | "2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU daa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +orderer0.example.com | "2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " +orderer0.example.com | "2019-07-20 02:39:50.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-07-20 02:39:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " +orderer0.example.com | "2019-07-20 02:39:51.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 2 on channel businesschannel took 43.3µs" +orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" +orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +orderer0.example.com | "2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.9µs " +orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dba Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-07-20 02:39:51.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " +orderer0.example.com | "2019-07-20 02:39:51.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.345ms " +orderer0.example.com | "2019-07-20 02:39:51.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc1 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-07-20 02:39:52.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.9µs " +orderer0.example.com | "2019-07-20 02:39:52.108 UTC [common.deliver] deliverBlocks -> DEBU dc3 Context canceled, aborting wait for next block" +orderer0.example.com | "2019-07-20 02:39:52.108 UTC [orderer.common.server] func1 -> DEBU dc4 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:39:52.108 UTC [grpc] infof -> DEBU dc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc6 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc9 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-07-20 02:39:52.109 UTC [comm.grpc.server] 1 -> INFO dc7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:44748 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.8632684s +orderer0.example.com | "2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-07-20 02:39:52.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.4µs " +orderer0.example.com | "2019-07-20 02:39:52.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 407µs " +orderer0.example.com | "2019-07-20 02:39:52.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-07-20 02:39:52.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +orderer0.example.com | "2019-07-20 02:39:52.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-07-20 02:39:52.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 524.6µs " +orderer0.example.com | "2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " +orderer0.example.com | "2019-07-20 02:39:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:52.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-07-20 02:39:53.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " +orderer0.example.com | "2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" +orderer0.example.com | "2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +orderer0.example.com | "2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU de0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6647ms " +peer0.org1.example.com | "2019-07-20 02:39:51.955 UTC [gossip.comm] func1 -> DEBU d99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.956 UTC [gossip.comm] func1 -> DEBU d9a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.960 UTC [gossip.gossip] handleMessage -> DEBU d9b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d9f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [msp] DeserializeIdentity -> DEBU da0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.963 UTC [cauthdsl] func1 -> DEBU da7 0xc00069b140 gate 1563590391963945100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da8 0xc00069b140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da9 0xc00069b140 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU daa 0xc00069b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [cauthdsl] func2 -> DEBU dab 0xc00069b140 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [cauthdsl] func1 -> DEBU dac 0xc00069b140 gate 1563590391963945100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:51.965 UTC [policies] Evaluate -> DEBU dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [cauthdsl] func1 -> DEBU db0 0xc00069b9b0 gate 1563590391966552900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:51.966 UTC [cauthdsl] func2 -> DEBU db1 0xc00069b9b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db2 0xc00069b9b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db3 0xc00069b9b0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:39:53.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU de2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 3 on channel testchainid took 40.9µs" +orderer0.example.com | "2019-07-20 02:39:53.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU de4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 579.9µs " +orderer0.example.com | "2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-07-20 02:39:53.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " +orderer0.example.com | "2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4015ms " +orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2019-07-20 02:39:54.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257.9µs " +orderer0.example.com | "2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +orderer0.example.com | "2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel businesschannel took 9.3µs" +orderer0.example.com | "2019-07-20 02:39:54.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " +orderer0.example.com | "2019-07-20 02:39:54.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU df1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " +orderer0.example.com | "2019-07-20 02:39:54.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU df4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2019-07-20 02:39:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +orderer0.example.com | "2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +orderer0.example.com | "2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.9µs " +orderer0.example.com | "2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " +orderer0.example.com | "2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-07-20 02:39:55.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " +orderer0.example.com | "2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-07-20 02:39:55.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202µs " +orderer0.example.com | "2019-07-20 02:39:55.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1379ms " +orderer0.example.com | "2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2019-07-20 02:39:55.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 469.8µs " +orderer0.example.com | "2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +orderer0.example.com | "2019-07-20 02:39:55.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481µs " +orderer0.example.com | "2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 765.8µs " +orderer0.example.com | "2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:55.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-07-20 02:39:56.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +orderer0.example.com | "2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +orderer0.example.com | "2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 405.8µs " +orderer0.example.com | "2019-07-20 02:39:56.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 161µs" +orderer0.example.com | "2019-07-20 02:39:56.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +orderer0.example.com | "2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-07-20 02:39:56.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " +orderer0.example.com | "2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " +orderer0.example.com | "2019-07-20 02:39:56.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2019-07-20 02:39:57.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.9µs " +orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.6µs " +orderer0.example.com | "2019-07-20 02:39:57.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2019-07-20 02:39:57.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.4µs " +orderer0.example.com | "2019-07-20 02:39:57.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +orderer0.example.com | "2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +orderer0.example.com | "2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2019-07-20 02:39:58.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.3µs " +orderer0.example.com | "2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2019-07-20 02:39:58.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.2µs " +orderer0.example.com | "2019-07-20 02:39:58.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1584ms " +orderer0.example.com | "2019-07-20 02:39:58.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +orderer0.example.com | "2019-07-20 02:39:58.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.4µs " +orderer0.example.com | "2019-07-20 02:39:58.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 362.7µs" +orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.6µs " +orderer0.example.com | "2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.2µs " +orderer0.example.com | "2019-07-20 02:39:58.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:58.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-07-20 02:39:59.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " +orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" +orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +orderer0.example.com | "2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +orderer0.example.com | "2019-07-20 02:39:59.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.7µs " +orderer0.example.com | "2019-07-20 02:39:59.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-07-20 02:39:59.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.2µs " +orderer0.example.com | "2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +orderer0.example.com | "2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " +orderer0.example.com | "2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +orderer0.example.com | "2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:39:59.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU e57 No inactive chains to try to replicate" +orderer0.example.com | "2019-07-20 02:40:00.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-07-20 02:40:00.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.1µs " +orderer0.example.com | "2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +orderer0.example.com | "2019-07-20 02:40:00.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.9µs " +orderer0.example.com | "2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +orderer0.example.com | "2019-07-20 02:40:00.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +orderer0.example.com | "2019-07-20 02:40:00.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.8µs " +orderer0.example.com | "2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +orderer0.example.com | "2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +orderer0.example.com | "2019-07-20 02:40:00.739 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.3µs " +orderer0.example.com | "2019-07-20 02:40:00.741 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.4µs " +orderer0.example.com | "2019-07-20 02:40:00.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.743 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:00.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-07-20 02:40:00.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.1µs " +orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-07-20 02:40:01.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +orderer0.example.com | "2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 777µs " +orderer0.example.com | "2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-07-20 02:40:01.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.5µs " +orderer0.example.com | "2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e77 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-07-20 02:40:01.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 633.1µs " +orderer0.example.com | "2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.6767ms " +peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| +peer0.org1.example.com | 00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" +peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| +peer0.org1.example.com | 00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| +peer0.org1.example.com | 00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| +peer0.org1.example.com | 00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| +peer0.org1.example.com | 00000040 bd 87 29 80 ca a0 |..)...|" +peer0.org1.example.com | "2019-07-20 02:39:51.968 UTC [cauthdsl] func2 -> DEBU db6 0xc00069b9b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [cauthdsl] func1 -> DEBU db7 0xc00069b9b0 gate 1563590391966552900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dba Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.971 UTC [gossip.comm] func1 -> DEBU dbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.972 UTC [gossip.discovery] handleAliveMessage -> DEBU dbd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.972 UTC [gossip.discovery] learnExistingMembers -> DEBU dbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dbf updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] handleAliveMessage -> DEBU dc3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU dc4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dc5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.comm] Send -> DEBU dc9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dca Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dcd Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.pull] HandleMessage -> DEBU dcf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:01.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-07-20 02:40:01.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 383.6µs " +orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e80 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-07-20 02:40:02.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +orderer0.example.com | "2019-07-20 02:40:02.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0933ms " +orderer0.example.com | "2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-07-20 02:40:02.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.4µs " +orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" +orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " +orderer0.example.com | "2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" +orderer0.example.com | "2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 992.9µs " +orderer0.example.com | "2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:02.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel testchainid took 46.8µs" +orderer0.example.com | "2019-07-20 02:40:02.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.8µs " +orderer0.example.com | "2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +orderer0.example.com | "2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e92 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.7µs " +orderer0.example.com | "2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 745.3µs " +orderer0.example.com | "2019-07-20 02:40:03.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:03.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:03.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:03.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-07-20 02:40:03.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " +orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " +orderer0.example.com | "2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 610.9µs " +orderer0.example.com | "2019-07-20 02:40:03.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:03.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.pull] SendDigest -> DEBU dd6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU dda Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:51.977 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ddc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ddd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dde Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func1 -> DEBU de2 0xc0006bbb60 gate 1563590391979879400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de3 0xc0006bbb60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de4 0xc0006bbb60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de5 0xc0006bbb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de6 0xc0006bbb60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU de7 0xc0006bbb60 gate 1563590391979879400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU deb 0xc0007323a0 gate 1563590391980879800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dec 0xc0007323a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU ded 0xc0007323a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dee 0xc0007323a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU def Verify: digest = 00000000 46 20 41 cc 8d 58 2c 2b 0f 57 ff f2 22 90 f5 5f |F A..X,+.W..".._| +peer0.org1.example.com | 00000010 bc ce 6d 92 64 45 bd 5a 06 5a 03 b3 ad a9 94 81 |..m.dE.Z.Z......|" +peer0.org1.example.com | "2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU df0 Verify: sig = 00000000 30 44 02 20 0e cf c9 77 85 5f 4d 3d 6d 04 af 83 |0D. ...w._M=m...| +peer0.org1.example.com | 00000010 9b 19 c0 51 38 19 6a ee a8 70 f3 6c 64 29 c2 52 |...Q8.j..p.ld).R| +peer0.org1.example.com | 00000020 30 df 6e 4f 02 20 0b 19 89 11 de db 6f 04 b7 5f |0.nO. ......o.._| +peer0.org1.example.com | 00000030 00 ae d2 67 e7 1f 76 d9 e0 ae 82 ab c9 2a 4a 46 |...g..v......*JF| +peer0.org1.example.com | 00000040 7a 3d 72 97 6b c2 |z=r.k.|" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [cauthdsl] func2 -> DEBU df1 0xc0007323a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [cauthdsl] func1 -> DEBU df2 0xc0007323a0 gate 1563590391980879800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df8 endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 22 but got ts: inc_num:1563590371938894800 seq_num:21 " +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfa Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.983 UTC [gossip.gossip] handleMessage -> DEBU dfd Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dfe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e00 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e01 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e02 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e03 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e04 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e05 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e06 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e09 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.265 UTC [msp] GetDefaultSigningIdentity -> DEBU e0c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151012 " +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0e Sign: digest: 15EC745CBC671F78A19C4207B9A2F43A526D8229FE508D1D60C1F4E245B3FB39 " +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp] GetDefaultSigningIdentity -> DEBU e0f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:52.266 UTC [gossip.discovery] periodicalSendAlive -> DEBU e12 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e14 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:03.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:03.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-07-20 02:40:03.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.6µs " +orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-07-20 02:40:04.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.1µs " +orderer0.example.com | "2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1502ms " +orderer0.example.com | "2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2019-07-20 02:40:04.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.8µs " +orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-07-20 02:40:04.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +orderer0.example.com | "2019-07-20 02:40:04.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 736µs " +orderer0.example.com | "2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:04.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2019-07-20 02:40:04.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.6µs " +orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156µs " +orderer0.example.com | "2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1143ms " +orderer0.example.com | "2019-07-20 02:40:05.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-07-20 02:40:05.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel testchainid took 124.3µs" +orderer0.example.com | "2019-07-20 02:40:05.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-07-20 02:40:05.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebf Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +orderer0.example.com | "2019-07-20 02:40:05.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.6µs " +orderer0.example.com | "2019-07-20 02:40:05.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.4µs " +orderer0.example.com | "2019-07-20 02:40:05.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:05.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-07-20 02:40:05.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " +orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 54.1µs" +orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.3µs " +orderer0.example.com | "2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +orderer0.example.com | "2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.8µs " +orderer0.example.com | "2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +orderer0.example.com | "2019-07-20 02:40:06.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +orderer0.example.com | "2019-07-20 02:40:06.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 2 on channel businesschannel took 55µs" +orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +orderer0.example.com | "2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +orderer0.example.com | "2019-07-20 02:40:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:06.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel testchainid took 29µs" +orderer0.example.com | "2019-07-20 02:40:06.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 43.4µs" +orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +orderer0.example.com | "2019-07-20 02:40:07.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " +orderer0.example.com | "2019-07-20 02:40:07.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2615ms " +orderer0.example.com | "2019-07-20 02:40:07.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +orderer0.example.com | "2019-07-20 02:40:07.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.8µs " +orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " +orderer0.example.com | "2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.7µs " +orderer0.example.com | "2019-07-20 02:40:07.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:07.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel testchainid took 202.8µs" +orderer0.example.com | "2019-07-20 02:40:07.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " +orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e16 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e19 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e29 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.comm] func1 -> DEBU e2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.pull] HandleMessage -> DEBU e2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.comm] func1 -> DEBU e30 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e31 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.pull] HandleMessage -> DEBU e32 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e33 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.comm] func1 -> DEBU e34 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.pull] HandleMessage -> DEBU e36 GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e37 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e38 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151013 " +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3a Sign: digest: 1BDA5E011B2CAD7F0981A1AD9ABD0D9AB25D2311F64929992AB2ABDE510006A5 " +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e3b Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e3e Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [msp] DeserializeIdentity -> DEBU e3f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e40 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] Send -> DEBU e42 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e44 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e45 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e46 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e48 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.308 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.308 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.gossip] handleMessage -> DEBU e4b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e4d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 03 d0 6b a7 fc 1b d2 38 6b 11 c8 13 |0D. ..k....8k...| +peer0.org1.example.com | 00000010 2c b4 57 a4 10 59 d3 da a5 30 c8 76 05 4a 82 eb |,.W..Y...0.v.J..| +peer0.org1.example.com | 00000020 d8 2b 80 77 02 20 57 45 64 35 11 d8 a8 70 21 96 |.+.w. WEd5...p!.| +peer0.org1.example.com | 00000030 ae 88 80 6c c9 16 bb 3a c7 71 1b c2 07 ce 60 80 |...l...:.q....`.| +peer0.org1.example.com | 00000040 40 d7 8a 33 0f 7f |@..3..|" +orderer0.example.com | "2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " +orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " +orderer0.example.com | "2019-07-20 02:40:08.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-07-20 02:40:08.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-07-20 02:40:08.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +orderer0.example.com | "2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +orderer0.example.com | "2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +orderer0.example.com | "2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 9.2µs" +orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " +orderer0.example.com | "2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +orderer0.example.com | "2019-07-20 02:40:09.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-07-20 02:40:09.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-07-20 02:40:09.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.6µs " +orderer0.example.com | "2019-07-20 02:40:09.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " +orderer0.example.com | "2019-07-20 02:40:09.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " +orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " +orderer0.example.com | "2019-07-20 02:40:10.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.4µs " +orderer0.example.com | "2019-07-20 02:40:10.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-07-20 02:40:10.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231µs " +orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +orderer0.example.com | "2019-07-20 02:40:10.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " +orderer0.example.com | "2019-07-20 02:40:10.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.1µs " +orderer0.example.com | "2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.2µs " +orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +orderer0.example.com | "2019-07-20 02:40:11.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " +orderer0.example.com | "2019-07-20 02:40:11.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2578ms " +orderer0.example.com | "2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-07-20 02:40:11.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.6µs " +orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +orderer0.example.com | "2019-07-20 02:40:11.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.1µs " +orderer0.example.com | "2019-07-20 02:40:11.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " +orderer0.example.com | "2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:11.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2019-07-20 02:40:11.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " +orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.8µs " +orderer0.example.com | "2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +orderer0.example.com | "2019-07-20 02:40:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2019-07-20 02:40:12.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 192.3µs" +orderer0.example.com | "2019-07-20 02:40:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-07-20 02:40:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.9µs " +orderer0.example.com | "2019-07-20 02:40:12.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467.8µs " +orderer0.example.com | "2019-07-20 02:40:12.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:12.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-07-20 02:40:12.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.3µs " +orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " +orderer0.example.com | "2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.8µs " +orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " +orderer0.example.com | "2019-07-20 02:40:13.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2019-07-20 02:40:13.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-07-20 02:40:13.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:13.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2019-07-20 02:40:13.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.7µs " +orderer0.example.com | "2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.8µs " +orderer0.example.com | "2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +orderer0.example.com | "2019-07-20 02:40:14.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " +orderer0.example.com | "2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +orderer0.example.com | "2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +orderer0.example.com | "2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +orderer0.example.com | "2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " +orderer0.example.com | "2019-07-20 02:40:14.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:14.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-07-20 02:40:14.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-07-20 02:40:15.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +orderer0.example.com | "2019-07-20 02:40:15.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " +orderer0.example.com | "2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +orderer0.example.com | "2019-07-20 02:40:15.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 144.4µs" +orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.7µs " +orderer0.example.com | "2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +orderer0.example.com | "2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:15.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-07-20 02:40:15.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +orderer0.example.com | "2019-07-20 02:40:16.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0763ms " +orderer0.example.com | "2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] isSentByMe -> DEBU e53 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e55 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.comm] func1 -> DEBU e56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU e59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5b Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5c Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] isSentByMe -> DEBU e5e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [msp] DeserializeIdentity -> DEBU e61 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e64 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e68 0xc00296ef30 gate 1563590392311707800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e69 0xc00296ef30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6a 0xc00296ef30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6b 0xc00296ef30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6c 0xc00296ef30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e6d 0xc00296ef30 gate 1563590392311707800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e71 0xc00296f790 gate 1563590392311977800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e72 0xc00296f790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e73 0xc00296f790 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e74 0xc00296f790 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e75 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| +peer0.org1.example.com | 00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e76 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| +peer0.org1.example.com | 00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| +peer0.org1.example.com | 00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | +peer0.org1.example.com | 00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| +peer0.org1.example.com | 00000040 32 48 30 50 b8 |2H0P.|" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e77 0xc00296f790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [cauthdsl] func1 -> DEBU e78 0xc00296f790 gate 1563590392311977800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.comm] func1 -> DEBU e80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e81 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e82 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU e83 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e84 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e85 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| +peer0.org1.example.com | 00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e86 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| +peer0.org1.example.com | 00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| +peer0.org1.example.com | 00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| +peer0.org1.example.com | 00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| +orderer0.example.com | "2019-07-20 02:40:16.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +orderer0.example.com | "2019-07-20 02:40:16.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " +orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.5µs " +orderer0.example.com | "2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:16.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-07-20 02:40:16.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +orderer0.example.com | "2019-07-20 02:40:17.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " +orderer0.example.com | "2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.8µs " +orderer0.example.com | "2019-07-20 02:40:17.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +orderer0.example.com | "2019-07-20 02:40:17.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " +orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +orderer0.example.com | "2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.1µs " +orderer0.example.com | "2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:17.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" +orderer0.example.com | "2019-07-20 02:40:17.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.8µs " +orderer0.example.com | "2019-07-20 02:40:18.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.473 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +orderer0.example.com | "2019-07-20 02:40:18.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +peer0.org1.example.com | 00000040 dc a4 f9 81 1a 32 |.....2|" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e89 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +peer0.org1.example.com | 00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +peer0.org1.example.com | 00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +peer0.org1.example.com | 00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +peer0.org1.example.com | 00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +peer0.org1.example.com | 00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] isSentByMe -> DEBU e8d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp] DeserializeIdentity -> DEBU e90 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e92 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e93 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e97 0xc002a63200 gate 1563590392314316100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e98 0xc002a63200 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e99 0xc002a63200 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9a 0xc002a63200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9b 0xc002a63200 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e9c 0xc002a63200 gate 1563590392314316100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea0 0xc002a63a40 gate 1563590392314593300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea1 0xc002a63a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea2 0xc002a63a40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea3 0xc002a63a40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| +peer0.org1.example.com | 00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| +peer0.org1.example.com | 00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| +peer0.org1.example.com | 00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| +peer0.org1.example.com | 00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| +peer0.org1.example.com | 00000040 bd 87 29 80 ca a0 |..)...|" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea6 0xc002a63a40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea7 0xc002a63a40 gate 1563590392314593300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eaa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU eac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.315 UTC [gossip.discovery] handleAliveMessage -> DEBU ead Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.315 UTC [gossip.discovery] handleMsgFromComm -> DEBU eae Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.comm] func1 -> DEBU eaf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 37.3µs" +orderer0.example.com | "2019-07-20 02:40:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +orderer0.example.com | "2019-07-20 02:40:18.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.9µs " +orderer0.example.com | "2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +orderer0.example.com | "2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +orderer0.example.com | "2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.4µs " +orderer0.example.com | "2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.7µs " +orderer0.example.com | "2019-07-20 02:40:19.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +orderer0.example.com | "2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.7µs " +orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +orderer0.example.com | "2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " +orderer0.example.com | "2019-07-20 02:40:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:19.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-07-20 02:40:19.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +orderer0.example.com | "2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +orderer0.example.com | "2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-07-20 02:40:20.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " +peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU eb2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.391 UTC [gossip.gossip] ValidateAliveMsg -> DEBU eb3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb4 Verify: digest = 00000000 0d 0e 79 e2 c7 a0 b2 f4 86 a8 d7 59 c5 dd ce 25 |..y........Y...%| +peer0.org1.example.com | 00000010 73 3c bf d7 a7 af d9 2e 52 5b de cf 43 6a eb 96 |s<......R[..Cj..|" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb5 Verify: sig = 00000000 30 44 02 20 74 3e 42 0d ca 82 d8 7f e9 f7 f7 36 |0D. t>B........6| +peer0.org1.example.com | 00000010 73 e8 71 45 b1 d6 b4 e2 95 f6 7c 70 64 be a3 2b |s.qE......|pd..+| +peer0.org1.example.com | 00000020 b8 64 3d 00 02 20 10 16 37 52 19 4a 6c 6c c5 d5 |.d=.. ..7R.Jll..| +peer0.org1.example.com | 00000030 f3 fc 28 f9 ed 79 8c d1 07 97 71 da 9f 41 e3 d2 |..(..y....q..A..| +peer0.org1.example.com | 00000040 8c 20 f4 cc 9f e5 |. ....|" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU eb6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU ebb Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU ebc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebd Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebf Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.394 UTC [gossip.gossip] handleMessage -> DEBU ec0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.pull] HandleMessage -> DEBU ec1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.pull] SendDigest -> DEBU ec2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:52.395 UTC [gossip.gossip] handleMessage -> DEBU ec3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec6 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:40:20.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1387ms " +orderer0.example.com | "2019-07-20 02:40:20.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.814 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39140 with txid '79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:20.816 UTC [policies] Evaluate -> DEBU fd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:40:20.816 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:20.816 UTC [msp.identity] newIdentity -> DEBU fd9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:20.817 UTC [cauthdsl] func1 -> DEBU fda 0xc000bfa3b0 gate 1563590420817456800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:20.817 UTC [cauthdsl] func2 -> DEBU fdb 0xc000bfa3b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:20.819 UTC [cauthdsl] func2 -> DEBU fdc 0xc000bfa3b0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:20.820 UTC [cauthdsl] func2 -> DEBU fdd 0xc000bfa3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:40:20.821 UTC [cauthdsl] func2 -> DEBU fde 0xc000bfa3b0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:20.821 UTC [cauthdsl] func1 -> DEBU fdf 0xc000bfa3b0 gate 1563590420817456800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:20.821 UTC [policies] Evaluate -> DEBU fe0 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:20.822 UTC [policies] Evaluate -> DEBU fe1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:20.822 UTC [policies] func1 -> DEBU fe2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-07-20 02:40:20.823 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [cauthdsl] func1 -> DEBU fe8 0xc000bfb9e0 gate 1563590420824690400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:20.824 UTC [cauthdsl] func2 -> DEBU fe9 0xc000bfb9e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:20.825 UTC [cauthdsl] func2 -> DEBU fea 0xc000bfb9e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:20.825 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU feb Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-07-20 02:40:20.825 UTC [msp] Validate -> DEBU fec MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp] getCertificationChain -> DEBU fed MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:20.826 UTC [cauthdsl] func2 -> DEBU fee 0xc000bfb9e0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +orderer0.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +orderer0.example.com | "2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +orderer0.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +orderer0.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +orderer0.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +orderer0.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" +orderer0.example.com | "2019-07-20 02:40:20.827 UTC [cauthdsl] func2 -> DEBU ff1 0xc000bfb9e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:20.827 UTC [cauthdsl] func1 -> DEBU ff2 0xc000bfb9e0 gate 1563590420824690400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:20.830 UTC [orderer.common.blockcutter] Ordered -> DEBU ff9 Enqueuing message into batch" +orderer0.example.com | "2019-07-20 02:40:20.830 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ffa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39140" +peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [msp] DeserializeIdentity -> DEBU ecc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ece Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ecf Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [gossip.comm] func1 -> DEBU ed2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [gossip.gossip] handleMessage -> DEBU ed3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed4 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +peer0.org1.example.com | "2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed5 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" +peer0.org1.example.com | "2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 44 02 20 50 d8 3b 18 9a 9e c0 8a aa f3 df 03 |0D. P.;.........| +peer0.org1.example.com | 00000010 c8 ce 20 d0 e5 43 96 93 79 64 50 6b 2d 04 29 d3 |.. ..C..ydPk-.).| +peer0.org1.example.com | 00000020 79 c1 8f c8 02 20 53 87 e9 bf 2f 79 d1 10 ea c0 |y.... S.../y....| +peer0.org1.example.com | 00000030 19 58 40 c3 d7 61 06 5a f9 77 66 b7 96 3d 57 c8 |.X@..a.Z.wf..=W.| +peer0.org1.example.com | 00000040 dd 94 b9 6b 70 ac |...kp.|" +peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] handleAliveMessage -> DEBU ed8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU ed9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU eda updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edd Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.404 UTC [gossip.discovery] handleAliveMessage -> DEBU ede Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU edf Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] Send -> DEBU ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-07-20 02:40:20.833 UTC [orderer.common.broadcast] Handle -> WARN ffb Error reading from 172.18.0.9:39140: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:20.834 UTC [orderer.common.server] func1 -> DEBU ffc Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:40:20.834 UTC [comm.grpc.server] 1 -> INFO ffd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1246301s +orderer0.example.com | "2019-07-20 02:40:20.837 UTC [grpc] infof -> DEBU ffe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +orderer0.example.com | "2019-07-20 02:40:22.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +orderer0.example.com | "2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +orderer0.example.com | "2019-07-20 02:40:22.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.9µs " +orderer0.example.com | "2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +orderer0.example.com | "2019-07-20 02:40:22.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.474 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +orderer0.example.com | "2019-07-20 02:40:22.475 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.9µs " +orderer0.example.com | "2019-07-20 02:40:22.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" +orderer0.example.com | "2019-07-20 02:40:22.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 727µs " +orderer0.example.com | "2019-07-20 02:40:22.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel businesschannel took 282.7µs" +orderer0.example.com | "2019-07-20 02:40:22.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " +orderer0.example.com | "2019-07-20 02:40:22.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 101d Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] propose -> INFO 101e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:22.833 UTC [orderer.consensus.etcdraft] 2 -> DEBU 101f Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 3650 bytes to 2 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 3650 bytes to 3 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer1.example.com(orderer1.example.com:7050) took 121µs " +orderer0.example.com | "2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 10.3µs" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1028 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 102a [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102b Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102c Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102d Sign: plaintext: 0A020802120B0A090A03010203100418...CB2402E5A0B3BA87B6BF21DA5A95E292 " +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102e Sign: digest: 6AFBD00D77A5732785EA5D33CF685F7A83868270E23725D9865CFE05D8FF32A5 " +orderer0.example.com | "2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.5µs " +orderer0.example.com | "2019-07-20 02:40:22.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.842 UTC [fsblkstorage] indexBlock -> DEBU 1031 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= +orderer0.example.com | txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] updateCheckpoint -> DEBU 1032 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75919], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1033 [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1034 Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1035 Remaining bytes=[4529], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 blockbytes [4527] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [common.deliver] deliverBlocks -> DEBU 1038 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1039 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +orderer0.example.com | "2019-07-20 02:40:22.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:22.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +orderer0.example.com | "2019-07-20 02:40:22.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-07-20 02:40:23.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.5µs " +orderer0.example.com | "2019-07-20 02:40:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 795.8µs " +orderer0.example.com | "2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2019-07-20 02:40:23.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.5µs " +orderer0.example.com | "2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +orderer0.example.com | "2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +orderer0.example.com | "2019-07-20 02:40:23.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.9µs " +orderer0.example.com | "2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " +orderer0.example.com | "2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +orderer0.example.com | "2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +orderer0.example.com | "2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 682.6µs " +orderer0.example.com | "2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" +orderer0.example.com | "2019-07-20 02:40:24.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105a Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-07-20 02:40:24.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " +orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.8µs " +orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.772 UTC [orderer.common.server] Broadcast -> DEBU 105f Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:40:24.772 UTC [orderer.common.broadcast] Handle -> DEBU 1060 Starting new broadcast loop for 172.18.0.9:39158" +orderer0.example.com | "2019-07-20 02:40:24.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1061 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39158 with txid '3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1066 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:40:24.810 UTC [cauthdsl] func1 -> DEBU 1067 0xc000fa8c70 gate 1563590424810651600 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:24.810 UTC [cauthdsl] func2 -> DEBU 1068 0xc000fa8c70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 1069 0xc000fa8c70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 106a 0xc000fa8c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:40:24.812 UTC [cauthdsl] func2 -> DEBU 106b 0xc000fa8c70 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:24.812 UTC [cauthdsl] func1 -> DEBU 106c 0xc000fa8c70 gate 1563590424810651600 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] func1 -> DEBU 106f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1070 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1072 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1073 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func1 -> DEBU 1075 0xc000fa9960 gate 1563590424814985400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1076 0xc000fa9960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1077 0xc000fa9960 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:24.816 UTC [cauthdsl] func2 -> DEBU 1078 0xc000fa9960 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 1079 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| +orderer0.example.com | 00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" +orderer0.example.com | "2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 107a Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| +orderer0.example.com | 00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| +orderer0.example.com | 00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| +orderer0.example.com | 00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| +orderer0.example.com | 00000040 95 b0 80 c3 bc 80 99 |.......|" +orderer0.example.com | "2019-07-20 02:40:24.817 UTC [cauthdsl] func2 -> DEBU 107b 0xc000fa9960 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:24.817 UTC [cauthdsl] func1 -> DEBU 107c 0xc000fa9960 gate 1563590424814985400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:24.817 UTC [policies] Evaluate -> DEBU 107d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107f Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1081 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:24.819 UTC [policies] Evaluate -> DEBU 1082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:24.819 UTC [orderer.common.blockcutter] Ordered -> DEBU 1083 Enqueuing message into batch" +orderer0.example.com | "2019-07-20 02:40:24.820 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1084 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39158" +orderer0.example.com | "2019-07-20 02:40:24.825 UTC [orderer.common.broadcast] Handle -> WARN 1085 Error reading from 172.18.0.9:39158: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:24.825 UTC [orderer.common.server] func1 -> DEBU 1086 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:40:24.825 UTC [comm.grpc.server] 1 -> INFO 1087 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.883ms +orderer0.example.com | "2019-07-20 02:40:24.825 UTC [grpc] infof -> DEBU 1088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.6µs " +orderer0.example.com | "2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 2 on channel businesschannel took 47.9µs" +orderer0.example.com | "2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " +orderer0.example.com | "2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " +orderer0.example.com | "2019-07-20 02:40:25.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.5µs " +orderer0.example.com | "2019-07-20 02:40:25.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 368.4µs" +orderer0.example.com | "2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 44.7µs" +orderer0.example.com | "2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-07-20 02:40:25.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +orderer0.example.com | "2019-07-20 02:40:25.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 670.1µs " +orderer0.example.com | "2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:25.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " +orderer0.example.com | "2019-07-20 02:40:25.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 1.8469ms" +orderer0.example.com | "2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-07-20 02:40:26.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " +orderer0.example.com | "2019-07-20 02:40:26.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " +orderer0.example.com | "2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2019-07-20 02:40:26.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " +orderer0.example.com | "2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 2 on channel businesschannel took 124.7µs" +orderer0.example.com | "2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 298.8µs " +orderer0.example.com | "2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.4µs " +orderer0.example.com | "2019-07-20 02:40:26.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10ad Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] propose -> INFO 10ae Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:26.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10af Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:26.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 3114 bytes to 2 on channel businesschannel took 92.7µs" +orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b1 Sending msg of 3114 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer1.example.com(orderer1.example.com:7050) took 980.1µs " +orderer0.example.com | "2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " +orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10b8 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:26.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.5µs " +orderer0.example.com | "2019-07-20 02:40:26.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " +orderer0.example.com | "2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.831 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10bb [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-07-20 02:40:26.832 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bc Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:26.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bd Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:26.841 UTC [msp.identity] Sign -> DEBU 10be Sign: plaintext: 0A020802120B0A090A03010203100418...52D1A12ABC704D520BFCB3D4E358B2F9 " +orderer0.example.com | "2019-07-20 02:40:26.846 UTC [msp.identity] Sign -> DEBU 10bf Sign: digest: 9216BD0E940C4DE1C355275BEC0E1803FC1B74F267389F1872A2CEC9948411DC " +orderer0.example.com | "2019-07-20 02:40:26.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.859 UTC [fsblkstorage] indexBlock -> DEBU 10c2 Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= +orderer0.example.com | txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:40:26.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 10c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79913], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] waitForBlock -> DEBU 10c4 Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c5 Remaining bytes=[3994], Going to peek [8] bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.406 UTC [gossip.gossip] handleMessage -> DEBU ee7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.comm] func1 -> DEBU eea Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU eeb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.pull] HandleMessage -> DEBU eec GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.pull] SendDigest -> DEBU ef3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU ef4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.578 UTC [gossip.comm] func1 -> DEBU ef5 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef8 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ef9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [policies] Evaluate -> DEBU f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func1 -> DEBU f01 0xc002f5ce70 gate 1563590392584287700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f02 0xc002f5ce70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f03 0xc002f5ce70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f04 0xc002f5ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [cauthdsl] func2 -> DEBU f05 0xc002f5ce70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [cauthdsl] func1 -> DEBU f06 0xc002f5ce70 gate 1563590392584287700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func1 -> DEBU f0a 0xc002f5d6b0 gate 1563590392586054100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0b 0xc002f5d6b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0c 0xc002f5d6b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0d 0xc002f5d6b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0e Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| +peer0.org1.example.com | 00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" +peer0.org1.example.com | "2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0f Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| +peer0.org1.example.com | 00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| +peer0.org1.example.com | 00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| +peer0.org1.example.com | 00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| +peer0.org1.example.com | 00000040 6e d8 65 dc d7 b6 e9 |n.e....|" +peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [cauthdsl] func2 -> DEBU f10 0xc002f5d6b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [cauthdsl] func1 -> DEBU f11 0xc002f5d6b0 gate 1563590392586054100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.588 UTC [policies] Evaluate -> DEBU f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f14 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.591 UTC [gossip.discovery] handleAliveMessage -> DEBU f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.591 UTC [gossip.discovery] learnExistingMembers -> DEBU f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f18 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f19 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] handleAliveMessage -> DEBU f1c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU f1d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU f1e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:39:52.594 UTC [msp] DeserializeIdentity -> DEBU f20 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f21 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.594 UTC [gossip.comm] func1 -> DEBU f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.comm] Send -> DEBU f24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c6 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +orderer0.example.com | "2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c7 blockbytes [3992] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:26.872 UTC [common.deliver] deliverBlocks -> DEBU 10c8 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:40:26.873 UTC [fsblkstorage] waitForBlock -> DEBU 10c9 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-07-20 02:40:26.873 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ca [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-07-20 02:40:26.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:26.975 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +orderer0.example.com | "2019-07-20 02:40:26.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +orderer0.example.com | "2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.5µs " +orderer0.example.com | "2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.478 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d5 Sending msg of 28 bytes to 3 on channel testchainid took 861.8µs" +orderer0.example.com | "2019-07-20 02:40:27.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +orderer0.example.com | "2019-07-20 02:40:27.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +orderer0.example.com | "2019-07-20 02:40:27.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d8 Sending msg of 28 bytes to 3 on channel businesschannel took 58µs" +orderer0.example.com | "2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320µs " +orderer0.example.com | "2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " +orderer0.example.com | "2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.849 UTC [orderer.common.server] Broadcast -> DEBU 10dd Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:40:27.849 UTC [orderer.common.broadcast] Handle -> DEBU 10de Starting new broadcast loop for 172.18.0.9:39172" +orderer0.example.com | "2019-07-20 02:40:27.866 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10df [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39172 with txid 'cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.868 UTC [policies] Evaluate -> DEBU 10e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:27.869 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.869 UTC [msp] DeserializeIdentity -> DEBU 10e5 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:27.870 UTC [msp.identity] newIdentity -> DEBU 10e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:27.870 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0011a80e0 gate 1563590427870766300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:27.870 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0011a80e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10e9 0xc0011a80e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10ea 0xc0011a80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:27.872 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0011a80e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:27.872 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0011a80e0 gate 1563590427870766300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:27.872 UTC [policies] Evaluate -> DEBU 10ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:52.596 UTC [gossip.gossip] handleMessage -> DEBU f23 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.gossip] handleMessage -> DEBU f25 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU f26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f27 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:52.597 UTC [msp] DeserializeIdentity -> DEBU f28 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f2f 0xc002ed18e0 gate 1563590392598463400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f30 0xc002ed18e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f31 0xc002ed18e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f32 0xc002ed18e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f33 0xc002ed18e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f34 0xc002ed18e0 gate 1563590392598463400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f38 0xc002fe8120 gate 1563590392598798900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f39 0xc002fe8120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3a 0xc002fe8120 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3b 0xc002fe8120 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.598 UTC [msp.identity] Verify -> DEBU f3c Verify: digest = 00000000 79 30 40 ed d1 f8 6d 03 2e bd d1 77 c6 b7 c6 b2 |y0@...m....w....| +peer0.org1.example.com | 00000010 1b 08 d9 26 3d f2 fb bc 4c 2c 97 63 16 3b 0d 13 |...&=...L,.c.;..|" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [msp.identity] Verify -> DEBU f3d Verify: sig = 00000000 30 45 02 21 00 a6 80 c1 dd 5d 72 85 0a a3 ec e4 |0E.!.....]r.....| +peer0.org1.example.com | 00000010 cb cb b6 ad 02 4e c7 8d c4 de 48 ee 3c 53 98 f3 |.....N....H. DEBU f3e 0xc002fe8120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [cauthdsl] func1 -> DEBU f3f 0xc002fe8120 gate 1563590392598798900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f42 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f45 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 20 but got ts: inc_num:1563590372570532900 seq_num:19 " +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU f47 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.comm] func1 -> DEBU f4a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.601 UTC [gossip.discovery] sendMemResponse -> DEBU f4f Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +peer0.org1.example.com | "2019-07-20 02:39:52.601 UTC [gossip.comm] func1 -> DEBU f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f51 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f53 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f54 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f55 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f56 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f57 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f59 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-07-20 02:40:27.873 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:27.873 UTC [policies] func1 -> DEBU 10ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-07-20 02:40:27.877 UTC [policies] Evaluate -> DEBU 10f0 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.879 UTC [policies] Evaluate -> DEBU 10f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:27.880 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.880 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0011a9710 gate 1563590427880758700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:27.880 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0011a9710 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0011a9710 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0011a9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:27.882 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0011a9710 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:27.882 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0011a9710 gate 1563590427880758700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:27.882 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func1 -> DEBU 10fe 0xc0011a9f70 gate 1563590427883598700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0011a9f70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 1100 0xc0011a9f70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1101 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] Validate -> DEBU 1102 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:27.884 UTC [msp] getCertificationChain -> DEBU 1103 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:27.885 UTC [cauthdsl] func2 -> DEBU 1104 0xc0011a9f70 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| +orderer0.example.com | 00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" +orderer0.example.com | "2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| +orderer0.example.com | 00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| +orderer0.example.com | 00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| +orderer0.example.com | 00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| +orderer0.example.com | 00000040 f3 e2 8c ca 4c 85 |....L.|" +orderer0.example.com | "2019-07-20 02:40:27.886 UTC [cauthdsl] func2 -> DEBU 1107 0xc0011a9f70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:27.886 UTC [cauthdsl] func1 -> DEBU 1108 0xc0011a9f70 gate 1563590427883598700 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:27.886 UTC [policies] Evaluate -> DEBU 1109 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:27.888 UTC [orderer.common.blockcutter] Ordered -> DEBU 110f Enqueuing message into batch" +orderer0.example.com | "2019-07-20 02:40:27.889 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1110 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39172" +orderer0.example.com | "2019-07-20 02:40:27.897 UTC [grpc] warningf -> DEBU 1111 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39172: read: connection reset by peer" +orderer0.example.com | "2019-07-20 02:40:27.901 UTC [grpc] infof -> DEBU 1112 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:27.902 UTC [orderer.common.broadcast] Handle -> WARN 1113 Error reading from 172.18.0.9:39172: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:27.902 UTC [orderer.common.server] func1 -> DEBU 1114 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:40:27.903 UTC [comm.grpc.server] 1 -> INFO 1115 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.0506ms +orderer0.example.com | "2019-07-20 02:40:27.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:27.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +orderer0.example.com | "2019-07-20 02:40:27.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +orderer0.example.com | "2019-07-20 02:40:28.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +orderer0.example.com | "2019-07-20 02:40:28.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-07-20 02:40:28.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405µs " +orderer0.example.com | "2019-07-20 02:40:28.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.9µs " +orderer0.example.com | "2019-07-20 02:40:28.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-07-20 02:40:28.474 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.9µs " +orderer0.example.com | "2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 39.2µs" +orderer0.example.com | "2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1123 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +orderer0.example.com | "2019-07-20 02:40:28.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.4µs " +orderer0.example.com | "2019-07-20 02:40:28.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0312ms " +orderer0.example.com | "2019-07-20 02:40:28.731 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:28.974 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50.1µs" +orderer0.example.com | "2019-07-20 02:40:28.975 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " +orderer0.example.com | "2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" +orderer0.example.com | "2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +orderer0.example.com | "2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.4µs " +orderer0.example.com | "2019-07-20 02:40:29.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-07-20 02:40:29.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +orderer0.example.com | "2019-07-20 02:40:29.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 32.1µs" +orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 2 on channel businesschannel took 258.8µs" +orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.3µs " +orderer0.example.com | "2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 584.7µs " +orderer0.example.com | "2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 113a Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] propose -> INFO 113b Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:29.891 UTC [orderer.consensus.etcdraft] 2 -> DEBU 113c Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:29.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 3112 bytes to 3 on channel businesschannel took 17µs" +orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 3112 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +orderer0.example.com | "2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer1.example.com(orderer1.example.com:7050) took 79.2µs " +orderer0.example.com | "2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f60 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f62 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f64 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] Send -> DEBU f65 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f67 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f69 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.gossip] handleMessage -> DEBU f6e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f6f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f70 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f71 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f72 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f76 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f79 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f78 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " +orderer0.example.com | "2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1144 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1146 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1147 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1148 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 1149 Sign: plaintext: 0A020802120B0A090A03010203100418...03E90289BE6FEC11C4DE24D2242E81F9 " +orderer0.example.com | "2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 114a Sign: digest: 0CA473387D6CDB7D787CDA3D7B85AE1D177FA930A3C5FDFB7F504D999C61315F " +orderer0.example.com | "2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114b Sending msg of 28 bytes to 3 on channel businesschannel took 893.6µs" +orderer0.example.com | "2019-07-20 02:40:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " +orderer0.example.com | "2019-07-20 02:40:29.902 UTC [fsblkstorage] indexBlock -> DEBU 114d Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= +orderer0.example.com | txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:40:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.906 UTC [fsblkstorage] updateCheckpoint -> DEBU 1150 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83904], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:29.907 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1151 [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2019-07-20 02:40:29.909 UTC [fsblkstorage] waitForBlock -> DEBU 1152 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:29.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Remaining bytes=[3991], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1155 blockbytes [3989] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:29.914 UTC [common.deliver] deliverBlocks -> DEBU 1156 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:40:29.914 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:29.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:29.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 134.1µs" +orderer0.example.com | "2019-07-20 02:40:29.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +orderer0.example.com | "2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.2µs " +orderer0.example.com | "2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.3µs " +orderer0.example.com | "2019-07-20 02:40:30.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1162 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1165 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.6µs " +orderer0.example.com | "2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1167 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 471.7µs " +orderer0.example.com | "2019-07-20 02:40:30.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116b Sending msg of 28 bytes to 3 on channel testchainid took 316.3µs" +peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [gossip.pull] Hello -> DEBU f7a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:52.758 UTC [msp] DeserializeIdentity -> DEBU f7b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [msp] DeserializeIdentity -> DEBU f7c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] Send -> DEBU f7d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.760 UTC [gossip.comm] func1 -> DEBU f80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f81 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.762 UTC [policies] Evaluate -> DEBU f82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.763 UTC [cauthdsl] func1 -> DEBU f85 0xc003081170 gate 1563590392763909000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f86 0xc003081170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f87 0xc003081170 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f88 0xc003081170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f89 0xc003081170 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.765 UTC [cauthdsl] func1 -> DEBU f8a 0xc003081170 gate 1563590392763909000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.765 UTC [policies] Evaluate -> DEBU f8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.767 UTC [cauthdsl] func1 -> DEBU f8e 0xc0030819c0 gate 1563590392767199700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.767 UTC [cauthdsl] func2 -> DEBU f8f 0xc0030819c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f90 0xc0030819c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f91 0xc0030819c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [cauthdsl] func2 -> DEBU f94 0xc0030819c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [cauthdsl] func1 -> DEBU f95 0xc0030819c0 gate 1563590392767199700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f98 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.771 UTC [msp] DeserializeIdentity -> DEBU f9c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +orderer0.example.com | "2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.2µs " +orderer0.example.com | "2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1170 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.6µs " +orderer0.example.com | "2019-07-20 02:40:31.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1173 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1174 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +orderer0.example.com | "2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1177 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-07-20 02:40:31.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2436ms " +orderer0.example.com | "2019-07-20 02:40:31.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1179 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.9µs " +orderer0.example.com | "2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:31.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-07-20 02:40:31.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.6882ms " +orderer0.example.com | "2019-07-20 02:40:32.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.9µs " +orderer0.example.com | "2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1182 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.9µs " +orderer0.example.com | "2019-07-20 02:40:32.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1185 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1186 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +orderer0.example.com | "2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1187 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +orderer0.example.com | "2019-07-20 02:40:32.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.9µs " +orderer0.example.com | "2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +orderer0.example.com | "2019-07-20 02:40:32.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118f Sending msg of 28 bytes to 3 on channel testchainid took 51.8µs" +orderer0.example.com | "2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1190 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +orderer0.example.com | "2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [policies] Evaluate -> DEBU fa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [cauthdsl] func1 -> DEBU fa5 0xc0030c34d0 gate 1563590392774506200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.774 UTC [cauthdsl] func2 -> DEBU fa6 0xc0030c34d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa7 0xc0030c34d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa8 0xc0030c34d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa9 0xc0030c34d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [cauthdsl] func1 -> DEBU faa 0xc0030c34d0 gate 1563590392774506200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.775 UTC [policies] Evaluate -> DEBU fab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func1 -> DEBU fae 0xc0030c3d10 gate 1563590392776932500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU faf 0xc0030c3d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb0 0xc0030c3d10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb1 0xc0030c3d10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb2 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb3 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [cauthdsl] func2 -> DEBU fb4 0xc0030c3d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.778 UTC [cauthdsl] func1 -> DEBU fb5 0xc0030c3d10 gate 1563590392776932500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fba Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbb Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbc Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:52.783 UTC [msp.identity] Verify -> DEBU fbd Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:52.783 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +orderer0.example.com | "2019-07-20 02:40:33.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " +orderer0.example.com | "2019-07-20 02:40:33.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +orderer0.example.com | "2019-07-20 02:40:33.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 111.4µs" +orderer0.example.com | "2019-07-20 02:40:33.617 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.618 UTC [msp] DeserializeIdentity -> DEBU 11a2 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:33.619 UTC [msp.identity] newIdentity -> DEBU 11a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:33.619 UTC [cauthdsl] func1 -> DEBU 11a4 0xc000f79400 gate 1563590433619571000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:33.619 UTC [cauthdsl] func2 -> DEBU 11a5 0xc000f79400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:33.624 UTC [cauthdsl] func2 -> DEBU 11a6 0xc000f79400 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:33.624 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a7 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:33.624 UTC [msp] Validate -> DEBU 11a8 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:33.625 UTC [cauthdsl] func2 -> DEBU 11a9 0xc000f79400 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 55 c9 26 71 a9 da 8f 39 4f 12 4f 6c f0 e9 45 30 |U.&q...9O.Ol..E0| +orderer0.example.com | 00000010 9c 1f 65 0e 71 cd 0b fc 87 3b 26 9b bf af 0f b7 |..e.q....;&.....|" +orderer0.example.com | "2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 13 d1 7a 88 5c 59 6e d7 83 10 61 2a |0D. ..z.\Yn...a*| +orderer0.example.com | 00000010 cc d9 b5 7b 34 21 e2 06 ae 3f 74 89 f3 c8 b9 56 |...{4!...?t....V| +orderer0.example.com | 00000020 94 88 ac 9d 02 20 4b 56 d3 98 42 a4 81 45 8c 3b |..... KV..B..E.;| +orderer0.example.com | 00000030 e3 70 af d5 0b bb 8f 15 46 0e 6e 35 cc 57 76 3a |.p......F.n5.Wv:| +orderer0.example.com | 00000040 fe b2 06 79 24 ab |...y$.|" +orderer0.example.com | "2019-07-20 02:40:33.627 UTC [cauthdsl] func2 -> DEBU 11ac 0xc000f79400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:33.627 UTC [cauthdsl] func1 -> DEBU 11ad 0xc000f79400 gate 1563590433619571000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:33.628 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.629 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.634 UTC [common.deliver] deliverBlocks -> DEBU 11b4 [channel: businesschannel] Received seekInfo (0xc00118d8c0) start: > stop: > from 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.634 UTC [fsblkstorage] Next -> DEBU 11b5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:33.634 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Remaining bytes=[3991], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +orderer0.example.com | "2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b9 blockbytes [3989] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:33.635 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Delivering block for (0xc00118d8c0) for 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] deliverBlocks -> DEBU 11bb [channel: businesschannel] Done delivering to 172.18.0.9:39218 for (0xc00118d8c0)" +peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.784 UTC [policies] Evaluate -> DEBU fc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func1 -> DEBU fc6 0xc0030f2380 gate 1563590392785406500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc7 0xc0030f2380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc8 0xc0030f2380 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.786 UTC [cauthdsl] func2 -> DEBU fc9 0xc0030f2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [cauthdsl] func2 -> DEBU fca 0xc0030f2380 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [cauthdsl] func1 -> DEBU fcb 0xc0030f2380 gate 1563590392785406500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [policies] Evaluate -> DEBU fce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func1 -> DEBU fcf 0xc0030f2bc0 gate 1563590392788342800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd0 0xc0030f2bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd1 0xc0030f2bc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd2 0xc0030f2bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd5 0xc0030f2bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [cauthdsl] func1 -> DEBU fd6 0xc0030f2bc0 gate 1563590392788342800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdb Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.792 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bc Waiting for new SeekInfo from 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bd Attempting to read seek info message from 172.18.0.9:39218" +orderer0.example.com | "2019-07-20 02:40:33.636 UTC [fsblkstorage] waitForBlock -> DEBU 11be Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:33.637 UTC [fsblkstorage] waitForBlock -> DEBU 11bf Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:33.644 UTC [grpc] warningf -> DEBU 11c0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39218: read: connection reset by peer" +orderer0.example.com | "2019-07-20 02:40:33.646 UTC [common.deliver] Handle -> WARN 11c1 Error reading from 172.18.0.9:39218: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:33.646 UTC [orderer.common.server] func1 -> DEBU 11c2 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:33.646 UTC [comm.grpc.server] 1 -> INFO 11c3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39218 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.802ms +orderer0.example.com | "2019-07-20 02:40:33.649 UTC [grpc] infof -> DEBU 11c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:33.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +orderer0.example.com | "2019-07-20 02:40:33.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 3 on channel businesschannel took 138.9µs" +orderer0.example.com | "2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " +orderer0.example.com | "2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.1µs " +orderer0.example.com | "2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.889 UTC [orderer.common.server] Deliver -> DEBU 11cb Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cc Starting new deliver loop for 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cd Attempting to read seek info message from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func1 -> DEBU 11d3 0xc00126b620 gate 1563590433891872700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d4 0xc00126b620 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d5 0xc00126b620 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d6 0xc00126b620 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:33.892 UTC [msp.identity] Verify -> DEBU 11d7 Verify: digest = 00000000 13 d8 2c 3b 19 3b 56 2b de 29 07 d5 a7 58 51 51 |..,;.;V+.)...XQQ| +orderer0.example.com | 00000010 2c a5 24 fa 2d be 90 7a 13 07 ec bb 28 fa a0 75 |,.$.-..z....(..u|" +orderer0.example.com | "2019-07-20 02:40:33.893 UTC [msp.identity] Verify -> DEBU 11d8 Verify: sig = 00000000 30 44 02 20 38 3b 2b 4e 6c e1 52 68 ba be 33 3f |0D. 8;+Nl.Rh..3?| +orderer0.example.com | 00000010 d6 8c 76 d3 a8 19 dd 8f 42 b8 e8 ab 0b 36 a8 fd |..v.....B....6..| +orderer0.example.com | 00000020 f5 52 77 a7 02 20 62 ec 99 2a c5 17 af 85 b8 4d |.Rw.. b..*.....M| +orderer0.example.com | 00000030 bd c2 ff 9b 55 67 36 1a 52 7f 7c 0a 3e fe 7d 10 |....Ug6.R.|.>.}.| +orderer0.example.com | 00000040 59 05 00 c8 fa 88 |Y.....|" +orderer0.example.com | "2019-07-20 02:40:33.894 UTC [cauthdsl] func2 -> DEBU 11d9 0xc00126b620 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:33.894 UTC [cauthdsl] func1 -> DEBU 11da 0xc00126b620 gate 1563590433891872700 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.896 UTC [common.deliver] deliverBlocks -> DEBU 11e1 [channel: businesschannel] Received seekInfo (0xc000fe9640) start: > stop: > from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.896 UTC [fsblkstorage] Next -> DEBU 11e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:33.896 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +orderer0.example.com | "2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Remaining bytes=[3991], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +orderer0.example.com | "2019-07-20 02:40:33.898 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 blockbytes [3989] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:33.899 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Delivering block for (0xc000fe9640) for 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.900 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9640)" +orderer0.example.com | "2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11e9 Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | "2019-07-20 02:39:52.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func1 -> DEBU fe6 0xc003116730 gate 1563590392797928400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe7 0xc003116730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe8 0xc003116730 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fe9 0xc003116730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fea 0xc003116730 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [cauthdsl] func1 -> DEBU feb 0xc003116730 gate 1563590392797928400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func1 -> DEBU fef 0xc003117090 gate 1563590392800302800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff0 0xc003117090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff1 0xc003117090 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff2 0xc003117090 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [cauthdsl] func2 -> DEBU ff5 0xc003117090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.801 UTC [cauthdsl] func1 -> DEBU ff6 0xc003117090 gate 1563590392800302800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:52.803 UTC [msp] DeserializeIdentity -> DEBU ffd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:33.901 UTC [common.deliver] Handle -> DEBU 11eb Waiting for new SeekInfo from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.902 UTC [common.deliver] Handle -> DEBU 11ec Attempting to read seek info message from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:33.906 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:33.907 UTC [cauthdsl] func1 -> DEBU 11f2 0xc001299650 gate 1563590433907098600 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:33.907 UTC [cauthdsl] func2 -> DEBU 11f3 0xc001299650 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f4 0xc001299650 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f5 0xc001299650 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 4e 8f 7f 37 eb 86 61 f8 3b a4 3a d5 32 0f a5 e1 |N..7..a.;.:.2...| +orderer0.example.com | 00000010 e7 ad 54 65 39 59 bf 01 7d e9 93 a0 4c e6 69 9c |..Te9Y..}...L.i.|" +orderer0.example.com | "2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 44 02 20 2a a1 af a0 ea d8 96 d9 ab 68 52 17 |0D. *........hR.| +orderer0.example.com | 00000010 22 12 bf fa 81 9a 3f 11 f8 78 dc 65 73 ca 36 94 |".....?..x.es.6.| +orderer0.example.com | 00000020 45 c4 79 3f 02 20 14 61 ea 34 83 b9 4c 1e 47 5e |E.y?. .a.4..L.G^| +orderer0.example.com | 00000030 4b a4 44 12 58 29 e9 7c f0 7a ad 65 ab 63 db ad |K.D.X).|.z.e.c..| +orderer0.example.com | 00000040 7f 37 d8 86 95 a8 |.7....|" +orderer0.example.com | "2019-07-20 02:40:33.910 UTC [cauthdsl] func2 -> DEBU 11f8 0xc001299650 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:33.910 UTC [cauthdsl] func1 -> DEBU 11f9 0xc001299650 gate 1563590433907098600 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.912 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:33.912 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fe9a00) start: > stop: > from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.912 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:33.912 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +orderer0.example.com | "2019-07-20 02:40:33.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[36264], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +orderer0.example.com | "2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:33.914 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fe9a00) for 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.916 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9a00)" +orderer0.example.com | "2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1208 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1209 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:33.917 UTC [common.deliver] Handle -> DEBU 120a Waiting for new SeekInfo from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.921 UTC [common.deliver] Handle -> DEBU 120b Attempting to read seek info message from 172.18.0.9:39220" +orderer0.example.com | "2019-07-20 02:40:33.927 UTC [common.deliver] Handle -> WARN 120c Error reading from 172.18.0.9:39220: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:33.927 UTC [orderer.common.server] func1 -> DEBU 120d Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:33.927 UTC [comm.grpc.server] 1 -> INFO 120e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39220 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.5069ms +orderer0.example.com | "2019-07-20 02:40:33.927 UTC [grpc] infof -> DEBU 120f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:33.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1210 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:33.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1211 Sending msg of 28 bytes to 3 on channel testchainid took 144.5µs" +orderer0.example.com | "2019-07-20 02:40:33.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 641.5µs " +orderer0.example.com | "2019-07-20 02:40:34.084 UTC [orderer.common.server] Deliver -> DEBU 1213 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1214 Starting new deliver loop for 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1215 Attempting to read seek info message from 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 1219 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [cauthdsl] func1 -> DEBU 1005 0xc003125150 gate 1563590392805720700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.805 UTC [cauthdsl] func2 -> DEBU 1006 0xc003125150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1007 0xc003125150 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1008 0xc003125150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1009 0xc003125150 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [cauthdsl] func1 -> DEBU 100a 0xc003125150 gate 1563590392805720700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func1 -> DEBU 100e 0xc003125b00 gate 1563590392808304900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 100f 0xc003125b00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 1010 0xc003125b00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [cauthdsl] func2 -> DEBU 1011 0xc003125b00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [cauthdsl] func2 -> DEBU 1014 0xc003125b00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [cauthdsl] func1 -> DEBU 1015 0xc003125b00 gate 1563590392808304900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.pull] HandleMessage -> DEBU 101c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.comm] func1 -> DEBU 101e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 101f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1020 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 1022 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.comm] func1 -> DEBU 1023 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1024 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.pull] HandleMessage -> DEBU 1025 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.pull] SendDigest -> DEBU 1026 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1027 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.954 UTC [gossip.comm] func1 -> DEBU 1028 Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 121a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.094 UTC [cauthdsl] func1 -> DEBU 121b 0xc0012b7f40 gate 1563590434094666400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:34.094 UTC [cauthdsl] func2 -> DEBU 121c 0xc0012b7f40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121d 0xc0012b7f40 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121e 0xc0012b7f40 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:34.095 UTC [msp.identity] Verify -> DEBU 121f Verify: digest = 00000000 7e 43 fb 52 94 7b bc 04 7f d2 6c 9f 95 25 f7 37 |~C.R.{....l..%.7| +orderer0.example.com | 00000010 cb dd 56 7a 09 c9 84 75 79 b9 ce fe e3 94 b6 a8 |..Vz...uy.......|" +orderer0.example.com | "2019-07-20 02:40:34.096 UTC [msp.identity] Verify -> DEBU 1220 Verify: sig = 00000000 30 44 02 20 30 ff 5b 04 1f bb 8e 30 0c 4b 0d df |0D. 0.[....0.K..| +orderer0.example.com | 00000010 da 16 e8 1e 80 32 90 2a e0 3b c0 b3 17 30 c1 de |.....2.*.;...0..| +orderer0.example.com | 00000020 40 a9 a7 be 02 20 3f 66 5d 22 21 3c bd 50 53 04 |@.... ?f]"!<.PS.| +orderer0.example.com | 00000030 15 d4 8e 53 77 2c e1 82 f2 2a f8 dc f8 92 2c ea |...Sw,...*....,.| +orderer0.example.com | 00000040 bd 03 a8 60 34 1b |...`4.|" +orderer0.example.com | "2019-07-20 02:40:34.103 UTC [cauthdsl] func2 -> DEBU 1221 0xc0012b7f40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:34.104 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012b7f40 gate 1563590434094666400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1223 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1224 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.105 UTC [common.deliver] deliverBlocks -> DEBU 1229 [channel: businesschannel] Received seekInfo (0xc0013160c0) start: > stop: > from 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] Next -> DEBU 122a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] newBlockfileStream -> DEBU 122b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:34.106 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122c Remaining bytes=[83904], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e blockbytes [23944] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 122f [channel: businesschannel] Delivering block for (0xc0013160c0) for 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Done delivering to 172.18.0.9:39222 for (0xc0013160c0)" +orderer0.example.com | "2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1231 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:34.109 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.114 UTC [grpc] infof -> DEBU 1234 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:34.111 UTC [common.deliver] Handle -> DEBU 1235 Attempting to read seek info message from 172.18.0.9:39222" +orderer0.example.com | "2019-07-20 02:40:34.114 UTC [common.deliver] Handle -> WARN 1236 Error reading from 172.18.0.9:39222: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:34.114 UTC [orderer.common.server] func1 -> DEBU 1237 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:34.114 UTC [comm.grpc.server] 1 -> INFO 1238 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39222 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.6095ms +orderer0.example.com | "2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 2 on channel businesschannel took 73.5µs" +orderer0.example.com | "2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123a Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.6µs " +orderer0.example.com | "2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.5µs " +orderer0.example.com | "2019-07-20 02:40:34.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.288 UTC [orderer.common.server] Deliver -> DEBU 123f Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:34.288 UTC [common.deliver] Handle -> DEBU 1240 Starting new deliver loop for 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.289 UTC [common.deliver] Handle -> DEBU 1241 Attempting to read seek info message from 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1243 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1244 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1245 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1246 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [cauthdsl] func1 -> DEBU 1247 0xc000266930 gate 1563590434290750100 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:34.290 UTC [cauthdsl] func2 -> DEBU 1248 0xc000266930 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 1249 0xc000266930 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124a 0xc000266930 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 b6 ff ca 28 9e 7c 64 7c 18 2f fe 11 67 9f 5c e6 |...(.|d|./..g.\.| +orderer0.example.com | 00000010 98 c3 94 a2 a5 7c b7 2f 11 b6 5d 99 65 38 31 a1 |.....|./..].e81.|" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 25 76 f6 0c 6b 08 93 d0 c9 c9 8b 6e |0D. %v..k......n| +orderer0.example.com | 00000010 39 ab 6d 08 97 a9 96 eb 84 0f d7 99 67 27 4c c8 |9.m.........g'L.| +orderer0.example.com | 00000020 eb 35 ec 00 02 20 64 0d 0d d0 2b 97 19 7f 7c 97 |.5... d...+...|.| +orderer0.example.com | 00000030 ff 71 2f 38 d7 cb 37 14 b3 79 d5 4d de 0a ef b3 |.q/8..7..y.M....| +orderer0.example.com | 00000040 dd a6 af 00 3d ed |....=.|" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124d 0xc000266930 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [cauthdsl] func1 -> DEBU 124e 0xc000266930 gate 1563590434290750100 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:34.291 UTC [policies] Evaluate -> DEBU 124f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1250 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1251 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1252 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1253 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.293 UTC [common.deliver] deliverBlocks -> DEBU 1255 [channel: businesschannel] Received seekInfo (0xc000d14600) start: > stop: > from 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.293 UTC [fsblkstorage] Next -> DEBU 1256 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:34.293 UTC [fsblkstorage] newBlockfileStream -> DEBU 1257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1258 Remaining bytes=[59957], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +orderer0.example.com | "2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:34.294 UTC [common.deliver] deliverBlocks -> DEBU 125b [channel: businesschannel] Delivering block for (0xc000d14600) for 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.295 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Done delivering to 172.18.0.9:39224 for (0xc000d14600)" +orderer0.example.com | "2019-07-20 02:40:34.295 UTC [fsblkstorage] waitForBlock -> DEBU 125d Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:34.296 UTC [fsblkstorage] waitForBlock -> DEBU 125e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:34.295 UTC [common.deliver] Handle -> DEBU 125f Waiting for new SeekInfo from 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.296 UTC [common.deliver] Handle -> DEBU 1260 Attempting to read seek info message from 172.18.0.9:39224" +orderer0.example.com | "2019-07-20 02:40:34.304 UTC [common.deliver] Handle -> WARN 1261 Error reading from 172.18.0.9:39224: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:34.304 UTC [orderer.common.server] func1 -> DEBU 1262 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:34.304 UTC [comm.grpc.server] 1 -> INFO 1263 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39224 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6359ms +orderer0.example.com | "2019-07-20 02:40:34.304 UTC [grpc] infof -> DEBU 1264 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:34.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-07-20 02:40:34.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +orderer0.example.com | "2019-07-20 02:40:34.458 UTC [orderer.common.server] Deliver -> DEBU 1268 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 1269 Starting new deliver loop for 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 126a Attempting to read seek info message from 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.460 UTC [cauthdsl] func1 -> DEBU 1270 0xc00029c200 gate 1563590434460744000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1271 0xc00029c200 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1272 0xc00029c200 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1273 0xc00029c200 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 e1 5a 7b 9e 59 a0 ff dd e8 71 0e d6 50 2b b3 6b |.Z{.Y....q..P+.k| +orderer0.example.com | 00000010 eb 35 f7 c1 54 12 29 76 94 77 c8 7a 86 11 61 e3 |.5..T.)v.w.z..a.|" +orderer0.example.com | "2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 44 02 20 33 2e 3f 3e e0 52 ff 41 fe b5 d3 a0 |0D. 3.?>.R.A....| +orderer0.example.com | 00000010 2d 27 e8 cf 58 7c ed 69 8b d4 f6 3d ab d4 9f a2 |-'..X|.i...=....| +orderer0.example.com | 00000020 c9 0d 27 04 02 20 39 44 87 05 83 70 f7 bd bd be |..'.. 9D...p....| +orderer0.example.com | 00000030 8c db 61 83 e9 1b 08 b9 80 be 5e ca 20 db a9 77 |..a.......^. ..w| +orderer0.example.com | 00000040 e6 dd 8c e8 6f 62 |....ob|" +orderer0.example.com | "2019-07-20 02:40:34.462 UTC [cauthdsl] func2 -> DEBU 1276 0xc00029c200 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:34.462 UTC [cauthdsl] func1 -> DEBU 1277 0xc00029c200 gate 1563590434460744000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 127a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [common.deliver] deliverBlocks -> DEBU 127e [channel: businesschannel] Received seekInfo (0xc00121e580) start: > stop: > from 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [fsblkstorage] Next -> DEBU 127f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:34.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 1280 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1281 Remaining bytes=[36264], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +orderer0.example.com | "2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:34.465 UTC [common.deliver] deliverBlocks -> DEBU 1284 [channel: businesschannel] Delivering block for (0xc00121e580) for 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.466 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Done delivering to 172.18.0.9:39226 for (0xc00121e580)" +orderer0.example.com | "2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1286 Waiting for new SeekInfo from 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1287 Attempting to read seek info message from 172.18.0.9:39226" +orderer0.example.com | "2019-07-20 02:40:34.467 UTC [fsblkstorage] waitForBlock -> DEBU 1288 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:34.469 UTC [fsblkstorage] waitForBlock -> DEBU 1289 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:34.479 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.9:39226: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:34.479 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:34.479 UTC [comm.grpc.server] 1 -> INFO 128c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39226 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.8288ms +orderer0.example.com | "2019-07-20 02:40:34.480 UTC [grpc] infof -> DEBU 128d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:34.685 UTC [orderer.common.server] Deliver -> DEBU 128e Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 128f Starting new deliver loop for 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 1290 Attempting to read seek info message from 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func1 -> DEBU 1296 0xc000bac420 gate 1563590434687004600 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1297 0xc000bac420 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1298 0xc000bac420 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:34.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " +orderer0.example.com | "2019-07-20 02:40:34.691 UTC [cauthdsl] func2 -> DEBU 129b 0xc000bac420 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:34.691 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 02 a4 1e 39 0d 23 70 6d 9f f9 40 d6 b3 e5 e0 92 |...9.#pm..@.....| +orderer0.example.com | 00000010 ca 59 28 b5 b1 75 d7 fa 41 f1 a7 d7 fb 4d b6 5b |.Y(..u..A....M.[|" +orderer0.example.com | "2019-07-20 02:40:34.692 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 45 02 21 00 b3 bb c4 d7 0e 11 6a 64 b5 70 f2 |0E.!.......jd.p.| +orderer0.example.com | 00000010 a4 2f 1f 35 ef 03 2f 5c e0 ad e3 d3 2e d4 e2 dc |./.5../\........| +orderer0.example.com | 00000020 77 ce 7d 5c 03 02 20 59 2f 4b 35 61 19 df f7 e0 |w.}\.. Y/K5a....| +orderer0.example.com | 00000030 cb 0d 19 13 68 c4 9a 6f 5d 78 fa 5c f8 68 55 59 |....h..o]x.\.hUY| +orderer0.example.com | 00000040 10 07 f3 98 52 ba fc |....R..|" +orderer0.example.com | "2019-07-20 02:40:34.692 UTC [cauthdsl] func2 -> DEBU 129e 0xc000bac420 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:34.692 UTC [cauthdsl] func1 -> DEBU 129f 0xc000bac420 gate 1563590434687004600 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:34.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a3 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1299 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" +orderer0.example.com | "2019-07-20 02:40:34.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +peer0.org1.example.com | "2019-07-20 02:39:52.954 UTC [gossip.gossip] handleMessage -> DEBU 1029 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [gossip.pull] HandleMessage -> DEBU 102a GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [msp] DeserializeIdentity -> DEBU 102b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:52.955 UTC [gossip.gossip] handleMessage -> DEBU 102c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:52.956 UTC [gossip.pull] SendRes -> DEBU 102d Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [gossip.comm] func1 -> DEBU 102e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [gossip.gossip] handleMessage -> DEBU 102f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:53.077 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.078 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:53.216 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:53.217 UTC [gossip.gossip] handleMessage -> DEBU 1035 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1038 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:53.219 UTC [gossip.gossip] handleMessage -> DEBU 1039 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.948 UTC [gossip.comm] func1 -> DEBU 103a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 103e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:55.950 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1042 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:55.951 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [cauthdsl] func1 -> DEBU 1046 0xc0032a0750 gate 1563590395952479500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:55.952 UTC [cauthdsl] func2 -> DEBU 1047 0xc0032a0750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1048 0xc0032a0750 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1049 0xc0032a0750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 104a 0xc0032a0750 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [cauthdsl] func1 -> DEBU 104b 0xc0032a0750 gate 1563590395952479500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:55.953 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func1 -> DEBU 1050 0xc0032a0f90 gate 1563590395955130100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1051 0xc0032a0f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:55.954 UTC [gossip.comm] func1 -> DEBU 104f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [gossip.gossip] handleMessage -> DEBU 1052 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [gossip.pull] HandleMessage -> DEBU 1053 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1054 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1055 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1056 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1057 0xc0032a0f90 processing identity 0 with bytes of 114b950" +orderer0.example.com | "2019-07-20 02:40:34.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.3µs " +orderer0.example.com | "2019-07-20 02:40:34.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.694 UTC [policies] Evaluate -> DEBU 12a8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.697 UTC [policies] Evaluate -> DEBU 12a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.698 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Received seekInfo (0xc00121eb80) start: > stop: > from 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.698 UTC [fsblkstorage] Next -> DEBU 12ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:34.699 UTC [fsblkstorage] newBlockfileStream -> DEBU 12ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" +orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad Remaining bytes=[12514], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ae Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +orderer0.example.com | "2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12af blockbytes [4527] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b0 [channel: businesschannel] Delivering block for (0xc00121eb80) for 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b1 [channel: businesschannel] Done delivering to 172.18.0.9:39228 for (0xc00121eb80)" +orderer0.example.com | "2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b2 Waiting for new SeekInfo from 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b3 Attempting to read seek info message from 172.18.0.9:39228" +orderer0.example.com | "2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b4 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:34.710 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.9:39228: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:34.711 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:34.710 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:34.712 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39228 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4236ms +orderer0.example.com | "2019-07-20 02:40:34.873 UTC [orderer.common.server] Deliver -> DEBU 12ba Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bb Starting new deliver loop for 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bc Attempting to read seek info message from 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func1 -> DEBU 12c2 0xc0003215b0 gate 1563590434875079900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003215b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003215b0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c5 0xc0003215b0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:34.875 UTC [msp.identity] Verify -> DEBU 12c6 Verify: digest = 00000000 0d 6a 08 6e fa 8f 49 c2 62 af 5e b4 fa b8 cf 31 |.j.n..I.b.^....1| +orderer0.example.com | 00000010 9b d4 09 ce 65 9c 3a fe 53 fc 4f f8 fa 94 c5 2e |....e.:.S.O.....|" +orderer0.example.com | "2019-07-20 02:40:34.876 UTC [msp.identity] Verify -> DEBU 12c7 Verify: sig = 00000000 30 45 02 21 00 b3 a8 89 f8 62 5b 5e e1 09 f0 07 |0E.!.....b[^....| +orderer0.example.com | 00000010 73 8d a2 99 7b 67 53 94 f8 56 14 78 9c 08 9f 2a |s...{gS..V.x...*| +orderer0.example.com | 00000020 47 10 0c 83 e2 02 20 57 a8 87 84 de 18 db 18 fd |G..... W........| +orderer0.example.com | 00000030 03 e7 40 b9 1a 50 6e cd 00 44 a2 2e 76 44 95 fb |..@..Pn..D..vD..| +orderer0.example.com | 00000040 94 0c 2a 5b 54 de da |..*[T..|" +orderer0.example.com | "2019-07-20 02:40:34.876 UTC [cauthdsl] func2 -> DEBU 12c8 0xc0003215b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:34.877 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003215b0 gate 1563590434875079900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12ce Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:34.878 UTC [common.deliver] deliverBlocks -> DEBU 12d0 [channel: businesschannel] Received seekInfo (0xc00121f300) start: > stop: > from 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] Next -> DEBU 12d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 12d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" +orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d3 Remaining bytes=[7985], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d4 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [cauthdsl] func2 -> DEBU 1059 0xc0032a0f90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [gossip.pull] SendDigest -> DEBU 105c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [gossip.gossip] handleMessage -> DEBU 105d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.957 UTC [msp.identity] Verify -> DEBU 105e Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| +peer0.org1.example.com | 00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" +peer0.org1.example.com | "2019-07-20 02:39:55.958 UTC [msp.identity] Verify -> DEBU 105f Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| +peer0.org1.example.com | 00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 1060 0xc0032a0f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:55.960 UTC [cauthdsl] func1 -> DEBU 1061 0xc0032a0f90 gate 1563590395955130100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:55.960 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1064 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1065 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:55.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1066 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.962 UTC [gossip.discovery] learnExistingMembers -> DEBU 1067 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1068 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1069 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 106c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.965 UTC [gossip.discovery] sendMemResponse -> DEBU 106e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [msp] DeserializeIdentity -> DEBU 1071 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.comm] Send -> DEBU 1072 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:55.968 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:55.967 UTC [gossip.discovery] sendMemResponse -> DEBU 1075 Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +peer0.org1.example.com | "2019-07-20 02:39:56.272 UTC [gossip.pull] Hello -> DEBU 1076 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1077 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 1078 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1079 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 107a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 107b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1080 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1081 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1082 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1083 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1084 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.276 UTC [gossip.gossip] handleMessage -> DEBU 1089 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.comm] func1 -> DEBU 108a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.pull] HandleMessage -> DEBU 108c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 108e Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 108f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151014 " +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1090 Sign: digest: C7D72175B4EA24BE781C5667FDD4D10C6AE41025931EB8B9790DBC66471A6E16 " +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 1091 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1092 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1093 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1094 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1095 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1096 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1098 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Exiting" +orderer0.example.com | "2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d5 blockbytes [3992] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:34.880 UTC [common.deliver] deliverBlocks -> DEBU 12d6 [channel: businesschannel] Delivering block for (0xc00121f300) for 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] deliverBlocks -> DEBU 12d7 [channel: businesschannel] Done delivering to 172.18.0.9:39230 for (0xc00121f300)" +orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d8 Waiting for new SeekInfo from 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d9 Attempting to read seek info message from 172.18.0.9:39230" +orderer0.example.com | "2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12da Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12db Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:34.889 UTC [grpc] infof -> DEBU 12dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:34.889 UTC [common.deliver] Handle -> WARN 12dd Error reading from 172.18.0.9:39230: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:34.889 UTC [orderer.common.server] func1 -> DEBU 12de Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:34.890 UTC [comm.grpc.server] 1 -> INFO 12df streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39230 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2245ms +orderer0.example.com | "2019-07-20 02:40:34.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:34.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +orderer0.example.com | "2019-07-20 02:40:34.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.6µs " +orderer0.example.com | "2019-07-20 02:40:35.053 UTC [orderer.common.server] Deliver -> DEBU 12e3 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e4 Starting new deliver loop for 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e5 Attempting to read seek info message from 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12ea == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.055 UTC [cauthdsl] func1 -> DEBU 12eb 0xc000c73a60 gate 1563590435055006700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ec 0xc000c73a60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ed 0xc000c73a60 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ee 0xc000c73a60 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12ef Verify: digest = 00000000 ac a4 e2 6b 85 76 c4 74 3c f2 ed 90 1d 38 82 3b |...k.v.t<....8.;| +orderer0.example.com | 00000010 a0 c5 2e 02 1b bc a5 1e 72 ed 54 a8 a8 51 12 40 |........r.T..Q.@|" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12f0 Verify: sig = 00000000 30 44 02 20 62 a1 1a 7d 4f 7a a7 76 ae 13 c5 ee |0D. b..}Oz.v....| +orderer0.example.com | 00000010 c1 18 b3 61 8e 0b 41 10 63 85 b2 a0 9b d8 0b f0 |...a..A.c.......| +orderer0.example.com | 00000020 e6 4e 6b 9b 02 20 79 f5 a2 9c 06 11 e5 d3 58 50 |.Nk.. y.......XP| +orderer0.example.com | 00000030 19 34 3b 23 73 79 56 ce 3a 78 61 8c 6a 2b 2a b2 |.4;#syV.:xa.j+*.| +orderer0.example.com | 00000040 a8 90 b3 51 05 21 |...Q.!|" +orderer0.example.com | "2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12f1 0xc000c73a60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [cauthdsl] func1 -> DEBU 12f2 0xc000c73a60 gate 1563590435055006700 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f5 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f7 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.058 UTC [policies] Evaluate -> DEBU 12f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.comm] func1 -> DEBU 109f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10a3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a4 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a5 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" +peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a7 Verify: sig = 00000000 30 44 02 20 54 7a a3 42 c9 28 88 5a 9e dc 61 40 |0D. Tz.B.(.Z..a@| +peer0.org1.example.com | 00000010 15 60 a5 f4 e5 c7 f4 d7 37 be 0d 99 56 96 14 5b |.`......7...V..[| +peer0.org1.example.com | 00000020 cf f2 3f e9 02 20 53 9a 33 29 47 4f cb 41 b1 ea |..?.. S.3)GO.A..| +peer0.org1.example.com | 00000030 6f ea 5e d7 b6 24 9c 62 ac b3 e6 2c ec 98 74 4b |o.^..$.b...,..tK| +peer0.org1.example.com | 00000040 87 ad b6 4e 77 48 |...NwH|" +peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] isSentByMe -> DEBU 10a9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10aa Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10ab Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.comm] func1 -> DEBU 10ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ad Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ae Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b1 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +peer0.org1.example.com | "2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b2 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" +peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.comm] func1 -> DEBU 10b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b8 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b9 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +orderer0.example.com | "2019-07-20 02:40:35.058 UTC [common.deliver] deliverBlocks -> DEBU 12f9 [channel: businesschannel] Received seekInfo (0xc000d154c0) start: > stop: > from 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] Next -> DEBU 12fa Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12fb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fc Remaining bytes=[3991], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fd Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +orderer0.example.com | "2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fe blockbytes [3989] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Delivering block for (0xc000d154c0) for 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 1300 [channel: businesschannel] Done delivering to 172.18.0.9:39232 for (0xc000d154c0)" +orderer0.example.com | "2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1301 Waiting for new SeekInfo from 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1302 Attempting to read seek info message from 172.18.0.9:39232" +orderer0.example.com | "2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1303 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1304 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-07-20 02:40:35.067 UTC [common.deliver] Handle -> WARN 1305 Error reading from 172.18.0.9:39232: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:35.067 UTC [orderer.common.server] func1 -> DEBU 1306 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:35.067 UTC [comm.grpc.server] 1 -> INFO 1307 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39232 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8221ms +orderer0.example.com | "2019-07-20 02:40:35.067 UTC [grpc] infof -> DEBU 1308 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1309 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130a Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +orderer0.example.com | "2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.2µs " +orderer0.example.com | "2019-07-20 02:40:35.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.229 UTC [orderer.common.server] Deliver -> DEBU 130f Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1310 Starting new deliver loop for 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1311 Attempting to read seek info message from 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:35.230 UTC [msp.identity] newIdentity -> DEBU 1318 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func1 -> DEBU 1319 0xc0003727b0 gate 1563590435231243700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131a 0xc0003727b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131b 0xc0003727b0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 131c Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp] Validate -> DEBU 131d MSP OrdererMSP validating identity" +peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" +peer0.org1.example.com | "2019-07-20 02:39:56.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 10ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.discovery] isSentByMe -> DEBU 10bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 10bc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10bd Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [msp] DeserializeIdentity -> DEBU 10be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.318 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10c5 0xc0033ffb60 gate 1563590396319207900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0033ffb60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c7 0xc0033ffb60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c8 0xc0033ffb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0033ffb60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0033ffb60 gate 1563590396319207900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func1 -> DEBU 10ce 0xc0034a23a0 gate 1563590396320080200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10cf 0xc0034a23a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0034a23a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0034a23a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d2 Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| +peer0.org1.example.com | 00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" +peer0.org1.example.com | "2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d3 Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| +peer0.org1.example.com | 00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 10d4 0xc0034a23a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [cauthdsl] func1 -> DEBU 10d5 0xc0034a23a0 gate 1563590396320080200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131e 0xc0003727b0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 131f Verify: digest = 00000000 21 3d 69 43 6a 6e 6b f0 67 21 36 03 79 43 b0 c4 |!=iCjnk.g!6.yC..| +orderer0.example.com | 00000010 00 5a b3 48 51 44 03 c7 11 f8 7a a3 64 02 ec d7 |.Z.HQD....z.d...|" +orderer0.example.com | "2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 1320 Verify: sig = 00000000 30 45 02 21 00 cb 67 74 a4 b1 dc 3a 46 5a ed d1 |0E.!..gt...:FZ..| +orderer0.example.com | 00000010 c0 11 27 6e d2 fc 73 57 a5 16 e7 57 77 2f 31 ad |..'n..sW...Ww/1.| +orderer0.example.com | 00000020 7d 3e fe bb cc 02 20 16 e8 63 82 c0 a8 3b 0f bd |}>.... ..c...;..| +orderer0.example.com | 00000030 25 b8 3b a6 96 d6 8d 4b b7 2b b4 14 7b 36 4b f0 |%.;....K.+..{6K.| +orderer0.example.com | 00000040 93 6a 99 32 d9 6a d9 |.j.2.j.|" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [cauthdsl] func2 -> DEBU 1321 0xc0003727b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [cauthdsl] func1 -> DEBU 1322 0xc0003727b0 gate 1563590435231243700 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1323 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1324 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1325 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1327 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.233 UTC [policies] Evaluate -> DEBU 1328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.233 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: testchainid] Received seekInfo (0xc00121fd40) start: > stop: > from 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.233 UTC [fsblkstorage] Next -> DEBU 132a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:35.233 UTC [fsblkstorage] newBlockfileStream -> DEBU 132b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132c Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132e blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: testchainid] Delivering block for (0xc00121fd40) for 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Done delivering to 172.18.0.9:39234 for (0xc00121fd40)" +orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1331 Waiting for new SeekInfo from 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:39234" +orderer0.example.com | "2019-07-20 02:40:35.240 UTC [common.deliver] Handle -> WARN 1333 Error reading from 172.18.0.9:39234: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:35.240 UTC [orderer.common.server] func1 -> DEBU 1334 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:35.241 UTC [grpc] infof -> DEBU 1336 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:35.240 UTC [comm.grpc.server] 1 -> INFO 1335 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39234 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5766ms +orderer0.example.com | "2019-07-20 02:40:35.387 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func1 -> DEBU 133f 0xc000a9aba0 gate 1563590435389465100 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1340 0xc000a9aba0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1341 0xc000a9aba0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1342 0xc000a9aba0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.389 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 a3 e8 db 37 f6 15 94 6d cc 5b a8 1f fa 58 84 32 |...7...m.[...X.2| +orderer0.example.com | 00000010 9e b6 7b c3 61 44 5b 13 f9 b5 26 72 c7 d1 3e f6 |..{.aD[...&r..>.|" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 44 02 20 6c 05 0c e0 64 52 d7 27 1e d3 5b 00 |0D. l...dR.'..[.| +orderer0.example.com | 00000010 0e 37 3e 87 0d 56 dd cd bc 6a f9 6a c6 9a 7f e3 |.7>..V...j.j....| +orderer0.example.com | 00000020 8d 52 4d e4 02 20 46 45 1f 56 83 eb ea 3a 47 23 |.RM.. FE.V...:G#| +orderer0.example.com | 00000030 80 46 c6 40 d8 6c 3d dc ae dc 82 53 d2 b2 6f c7 |.F.@.l=....S..o.| +orderer0.example.com | 00000040 d4 73 3a 68 8c eb |.s:h..|" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [cauthdsl] func2 -> DEBU 1345 0xc000a9aba0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [cauthdsl] func1 -> DEBU 1346 0xc000a9aba0 gate 1563590435389465100 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1347 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1348 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1349 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10db Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.gossip] handleMessage -> DEBU 10de Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +peer0.org1.example.com | 00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +peer0.org1.example.com | 00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +peer0.org1.example.com | 00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +peer0.org1.example.com | 00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +peer0.org1.example.com | 00000040 f9 ac 47 d7 14 7f 16 |..G....|" +peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] isSentByMe -> DEBU 10e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.323 UTC [msp] DeserializeIdentity -> DEBU 10e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10ed 0xc003510a90 gate 1563590396327540900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ee 0xc003510a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ef 0xc003510a90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f0 0xc003510a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f1 0xc003510a90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10f2 0xc003510a90 gate 1563590396327540900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.391 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: testchainid] Received seekInfo (0xc000d15f40) start: > stop: > from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.391 UTC [fsblkstorage] Next -> DEBU 134e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] newBlockfileStream -> DEBU 134f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1350 Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1351 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1352 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.392 UTC [common.deliver] deliverBlocks -> DEBU 1353 [channel: testchainid] Delivering block for (0xc000d15f40) for 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] deliverBlocks -> DEBU 1354 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000d15f40)" +orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1355 Waiting for new SeekInfo from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1356 Attempting to read seek info message from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1358 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1359 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func1 -> DEBU 135c 0xc00098ce00 gate 1563590435397329000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135d 0xc00098ce00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135e 0xc00098ce00 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135f 0xc00098ce00 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.397 UTC [msp.identity] Verify -> DEBU 1360 Verify: digest = 00000000 68 c4 79 92 c2 31 53 58 65 63 fa cc e1 56 f0 c4 |h.y..1SXec...V..| +orderer0.example.com | 00000010 9d d8 6e 00 df a3 a9 99 e4 54 6f 66 dc 98 8b bb |..n......Tof....|" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [msp.identity] Verify -> DEBU 1361 Verify: sig = 00000000 30 44 02 20 0a 30 2c b9 8b 65 2d bb 3b a0 a8 4f |0D. .0,..e-.;..O| +orderer0.example.com | 00000010 59 46 86 89 be b5 60 b6 1b 99 70 e7 57 b2 9e 05 |YF....`...p.W...| +orderer0.example.com | 00000020 fa 1a af 13 02 20 37 b6 be 8d 11 b7 5f 8c bd ff |..... 7....._...| +orderer0.example.com | 00000030 1c e6 68 15 f4 0b 4b 6e 39 d1 83 1f df 9b 61 57 |..h...Kn9.....aW| +orderer0.example.com | 00000040 1a b3 b6 b9 26 d7 |....&.|" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [cauthdsl] func2 -> DEBU 1362 0xc00098ce00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [cauthdsl] func1 -> DEBU 1363 0xc00098ce00 gate 1563590435397329000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1364 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1366 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1368 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: testchainid] Received seekInfo (0xc000ba6380) start: > stop: > from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] Next -> DEBU 136b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 136c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:35.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136d Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136e Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136f blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1370 [channel: testchainid] Delivering block for (0xc000ba6380) for 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1371 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000ba6380)" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1372 Waiting for new SeekInfo from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1373 Attempting to read seek info message from 172.18.0.9:39236" +orderer0.example.com | "2019-07-20 02:40:35.407 UTC [common.deliver] Handle -> WARN 1374 Error reading from 172.18.0.9:39236: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:35.407 UTC [orderer.common.server] func1 -> DEBU 1375 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:35.407 UTC [comm.grpc.server] 1 -> INFO 1376 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39236 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.797ms +orderer0.example.com | "2019-07-20 02:40:35.407 UTC [grpc] infof -> DEBU 1377 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:35.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1378 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1379 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-07-20 02:40:35.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +orderer0.example.com | "2019-07-20 02:40:35.532 UTC [orderer.common.server] Deliver -> DEBU 137b Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137c Starting new deliver loop for 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137d Attempting to read seek info message from 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.532 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1381 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.533 UTC [cauthdsl] func1 -> DEBU 1383 0xc0003d82d0 gate 1563590435533775300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1384 0xc0003d82d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1385 0xc0003d82d0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003d82d0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1387 Verify: digest = 00000000 5f 0f 4a 9d 65 bf b8 72 3a 23 8b 74 bb 3c eb 0a |_.J.e..r:#.t.<..| +orderer0.example.com | 00000010 5c 83 45 be 21 cb b8 82 64 47 77 dc c3 82 94 b1 |\.E.!...dGw.....|" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1388 Verify: sig = 00000000 30 44 02 20 55 dd fb 5f 82 29 2f 02 b4 96 12 2e |0D. U.._.)/.....| +orderer0.example.com | 00000010 cf 06 87 34 fb 14 87 9e f2 d3 4d e1 9a 41 da 1b |...4......M..A..| +orderer0.example.com | 00000020 e9 6c 31 74 02 20 0e c3 35 48 74 a6 7a ba bc c4 |.l1t. ..5Ht.z...| +orderer0.example.com | 00000030 9d ca 57 36 61 08 e0 86 35 25 85 e0 6a 97 1a f0 |..W6a...5%..j...| +orderer0.example.com | 00000040 5f ca 0b ee ae 2b |_....+|" +orderer0.example.com | "2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1389 0xc0003d82d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.535 UTC [cauthdsl] func1 -> DEBU 138a 0xc0003d82d0 gate 1563590435533775300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.536 UTC [common.deliver] deliverBlocks -> DEBU 1391 [channel: testchainid] Received seekInfo (0xc0011d5300) start: > stop: > from 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] Next -> DEBU 1392 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1393 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1394 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1395 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:35.538 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1396 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1397 [channel: testchainid] Delivering block for (0xc0011d5300) for 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1398 [channel: testchainid] Done delivering to 172.18.0.9:39238 for (0xc0011d5300)" +orderer0.example.com | "2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 1399 Waiting for new SeekInfo from 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 172.18.0.9:39238" +orderer0.example.com | "2019-07-20 02:40:35.548 UTC [common.deliver] Handle -> WARN 139b Error reading from 172.18.0.9:39238: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:35.548 UTC [orderer.common.server] func1 -> DEBU 139c Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:35.548 UTC [comm.grpc.server] 1 -> INFO 139d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39238 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.69ms +orderer0.example.com | "2019-07-20 02:40:35.549 UTC [grpc] infof -> DEBU 139e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-07-20 02:40:35.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-07-20 02:40:35.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 336.3µs " +orderer0.example.com | "2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [orderer.common.server] Deliver -> DEBU 13a5 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a6 Starting new deliver loop for 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a7 Attempting to read seek info message from 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func1 -> DEBU 13ad 0xc00096f690 gate 1563590435702988800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13ae 0xc00096f690 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13af 0xc00096f690 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13b0 0xc00096f690 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 19 14 01 e4 ac 98 0d 33 b0 e7 e6 d9 29 ad da 78 |.......3....)..x| +orderer0.example.com | 00000010 5f 7f d8 63 22 18 6f c2 02 98 d1 16 ec c2 3a 40 |_..c".o.......:@|" +orderer0.example.com | "2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 9a 96 af 90 93 69 2a e6 7c 2d e0 |0E.!......i*.|-.| +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0035112d0 gate 1563590396328506100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0035112d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0035112d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0035112d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| +peer0.org1.example.com | 00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| +peer0.org1.example.com | 00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| +peer0.org1.example.com | 00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| +peer0.org1.example.com | 00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| +peer0.org1.example.com | 00000040 6e d8 65 dc d7 b6 e9 |n.e....|" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [cauthdsl] func2 -> DEBU 10fc 0xc0035112d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0035112d0 gate 1563590396328506100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1100 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1102 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1103 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1104 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +peer0.org1.example.com | 00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +peer0.org1.example.com | "2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +peer0.org1.example.com | 00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +peer0.org1.example.com | 00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +peer0.org1.example.com | 00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +peer0.org1.example.com | 00000040 77 5f b8 b7 06 c1 |w_....|" +peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1107 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1108 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1109 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.gossip] handleMessage -> DEBU 110c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.396 UTC [gossip.pull] HandleMessage -> DEBU 110d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.pull] SendDigest -> DEBU 110e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 110f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1110 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1111 Exiting" +orderer0.example.com | 00000010 82 36 7d 5e 62 6a 40 ee 39 d4 0a 45 3d 05 fc a7 |.6}^bj@.9..E=...| +orderer0.example.com | 00000020 55 06 db 29 a9 02 20 24 38 5d 25 1f af c8 7e 67 |U..).. $8]%...~g| +orderer0.example.com | 00000030 be 9e 81 7e 9a c9 39 f9 28 bb 1e 72 6c 02 55 cf |...~..9.(..rl.U.| +orderer0.example.com | 00000040 3a 80 84 4b b9 48 5e |:..K.H^|" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [cauthdsl] func2 -> DEBU 13b3 0xc00096f690 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [cauthdsl] func1 -> DEBU 13b4 0xc00096f690 gate 1563590435702988800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b7 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [policies] Evaluate -> DEBU 13ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [common.deliver] deliverBlocks -> DEBU 13bb [channel: testchainid] Received seekInfo (0xc0011d5a80) start: > stop: > from 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] Next -> DEBU 13bc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] newBlockfileStream -> DEBU 13bd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13be Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13bf Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:35.706 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c0 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c1 [channel: testchainid] Delivering block for (0xc0011d5a80) for 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c2 [channel: testchainid] Done delivering to 172.18.0.9:39240 for (0xc0011d5a80)" +orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c3 Waiting for new SeekInfo from 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c4 Attempting to read seek info message from 172.18.0.9:39240" +orderer0.example.com | "2019-07-20 02:40:35.713 UTC [grpc] infof -> DEBU 13c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:35.714 UTC [common.deliver] Handle -> WARN 13c6 Error reading from 172.18.0.9:39240: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:35.714 UTC [orderer.common.server] func1 -> DEBU 13c7 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:35.714 UTC [comm.grpc.server] 1 -> INFO 13c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39240 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8108ms +orderer0.example.com | "2019-07-20 02:40:35.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:35.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ca Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +orderer0.example.com | "2019-07-20 02:40:35.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.7µs " +orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cd Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" +orderer0.example.com | "2019-07-20 02:40:36.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.8µs " +orderer0.example.com | "2019-07-20 02:40:36.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619µs " +orderer0.example.com | "2019-07-20 02:40:36.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +orderer0.example.com | "2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " +orderer0.example.com | "2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13dc Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13df Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +orderer0.example.com | "2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61µs " +orderer0.example.com | "2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:37.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1112 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1113 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 30 98 1f 5f 64 29 89 30 5c 59 fd 02 51 76 6f 11 |0.._d).0\Y..Qvo.| +peer0.org1.example.com | 00000010 51 b3 b7 50 f2 ad 2c b0 2d 4c 83 92 45 0e be 49 |Q..P..,.-L..E..I|" +peer0.org1.example.com | "2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 44 02 20 56 d8 b5 99 4c 20 22 6a d7 3a 6b 8d |0D. V...L "j.:k.| +peer0.org1.example.com | 00000010 d4 16 cb 44 f1 6f 70 bc 74 2e dc 24 7a ee 73 4c |...D.op.t..$z.sL| +peer0.org1.example.com | 00000020 55 87 2c d9 02 20 0e ca 61 aa 61 22 3a d5 77 02 |U.,.. ..a.a":.w.| +peer0.org1.example.com | 00000030 f3 0d 26 7e 64 dd db 40 e9 ec 5d 04 e7 30 a6 db |..&~d..@..]..0..| +peer0.org1.example.com | 00000040 61 aa b2 d8 91 4a |a....J|" +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1116 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1117 Verify: sig = 00000000 30 44 02 20 7d 62 a6 cc d7 5f 52 a4 65 41 48 3f |0D. }b..._R.eAH?| +peer0.org1.example.com | 00000010 57 5d 86 7f aa bb ab cc 62 14 9b 0e ef 34 6a a9 |W]......b....4j.| +peer0.org1.example.com | 00000020 4c f0 a6 84 02 20 75 7e 8e 55 ea d1 2d d2 af a3 |L.... u~.U..-...| +peer0.org1.example.com | 00000030 b1 14 f8 02 d7 b5 06 45 61 92 c4 32 7d dc d3 35 |.......Ea..2}..5| +peer0.org1.example.com | 00000040 f1 e6 79 84 c9 f7 |..y...|" +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] handleAliveMessage -> DEBU 1118 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 1119 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 111e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU 111f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [gossip.discovery] sendMemResponse -> DEBU 1120 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] Send -> DEBU 1123 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.discovery] sendMemResponse -> DEBU 1124 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1125 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1126 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.575 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.575 UTC [gossip.gossip] handleMessage -> DEBU 1128 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [gossip.pull] HandleMessage -> DEBU 1129 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.578 UTC [gossip.pull] SendDigest -> DEBU 1130 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:39:56.579 UTC [gossip.gossip] handleMessage -> DEBU 1131 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.581 UTC [gossip.comm] func1 -> DEBU 1132 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1133 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1134 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1135 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1136 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.582 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1138 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1139 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func1 -> DEBU 113e 0xc003647a40 gate 1563590396583810200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 113f 0xc003647a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 1140 0xc003647a40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1141 0xc003647a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1142 0xc003647a40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1143 0xc003647a40 gate 1563590396583810200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1144 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1146 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1147 0xc0036522b0 gate 1563590396584797100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1148 0xc0036522b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 1149 0xc0036522b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114a 0xc0036522b0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:37.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e5 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2019-07-20 02:40:37.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.5µs " +orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e8 Sending msg of 28 bytes to 3 on channel businesschannel took 86.8µs" +orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " +orderer0.example.com | "2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +orderer0.example.com | "2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13eb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ec Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:37.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:37.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ee Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-07-20 02:40:37.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " +orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f1 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +orderer0.example.com | "2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " +orderer0.example.com | "2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f7 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fa Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +orderer0.example.com | "2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.2µs " +orderer0.example.com | "2019-07-20 02:40:38.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fd Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1400 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1401 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1403 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1404 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " +orderer0.example.com | "2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +orderer0.example.com | "2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1406 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1407 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1409 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-07-20 02:40:39.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114b Verify: digest = 00000000 b2 1f d3 c5 78 4e f0 67 c6 95 96 e8 61 8f 1e 7b |....xN.g....a..{| +peer0.org1.example.com | 00000010 8a b5 ce 53 08 01 b1 41 bd 4c 76 92 c5 c2 96 88 |...S...A.Lv.....|" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114c Verify: sig = 00000000 30 45 02 21 00 d2 17 c8 86 38 cd 80 57 2c 8d 1b |0E.!.....8..W,..| +peer0.org1.example.com | 00000010 b2 32 cc 27 04 ec 32 ce 67 fc b4 e6 fd aa 08 42 |.2.'..2.g......B| +peer0.org1.example.com | 00000020 ce 00 ff ff fe 02 20 35 74 64 e9 dc 2c a7 a5 2e |...... 5td..,...| +peer0.org1.example.com | 00000030 f2 23 3e 5f 6b 39 70 2c 9c 79 bb b7 ee 0a 8a 22 |.#>_k9p,.y....."| +peer0.org1.example.com | 00000040 c2 f7 6b 80 ac 07 af |..k....|" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114d 0xc0036522b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [cauthdsl] func1 -> DEBU 114e 0xc0036522b0 gate 1563590396584797100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 114f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 1150 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1151 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1152 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1153 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1154 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1155 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1156 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1157 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1158 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1159 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115a Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [gossip.discovery] sendMemResponse -> DEBU 115b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:39:56.587 UTC [msp] DeserializeIdentity -> DEBU 115c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [gossip.comm] Send -> DEBU 115f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.588 UTC [gossip.discovery] sendMemResponse -> DEBU 1160 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" > alive:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > alive: alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +peer0.org1.example.com | "2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1161 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1162 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1163 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] Send -> DEBU 1165 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1166 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1167 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1168 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1169 Exiting" +orderer0.example.com | "2019-07-20 02:40:39.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +orderer0.example.com | "2019-07-20 02:40:39.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140c Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-07-20 02:40:39.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.5µs " +orderer0.example.com | "2019-07-20 02:40:39.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.5µs " +orderer0.example.com | "2019-07-20 02:40:39.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1410 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.797 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1411 No inactive chains to try to replicate" +orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1413 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1414 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.7µs " +orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1415 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +orderer0.example.com | "2019-07-20 02:40:40.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +orderer0.example.com | "2019-07-20 02:40:40.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.6µs " +orderer0.example.com | "2019-07-20 02:40:40.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1419 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141c Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2019-07-20 02:40:40.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.6µs " +orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +orderer0.example.com | "2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +orderer0.example.com | "2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:40.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1425 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +orderer0.example.com | "2019-07-20 02:40:40.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.9µs " +orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1427 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " +orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " +orderer0.example.com | "2019-07-20 02:40:41.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142e Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +orderer0.example.com | "2019-07-20 02:40:41.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1430 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [gossip.comm] func1 -> DEBU 116c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [gossip.gossip] handleMessage -> DEBU 116d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1172 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.755 UTC [cauthdsl] func1 -> DEBU 1177 0xc0036866d0 gate 1563590396755881700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1178 0xc0036866d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1179 0xc0036866d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117a 0xc0036866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117b 0xc0036866d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 117c 0xc0036866d0 gate 1563590396755881700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 1180 0xc003687030 gate 1563590396757820400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 1181 0xc003687030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1182 0xc003687030 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1183 0xc003687030 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1184 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [gossip.comm] func1 -> DEBU 1185 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.759 UTC [gossip.comm] func1 -> DEBU 1186 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1187 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [cauthdsl] func2 -> DEBU 1188 0xc003687030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1433 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +orderer0.example.com | "2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1434 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1435 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:41.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1437 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" +orderer0.example.com | "2019-07-20 02:40:41.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1438 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +orderer0.example.com | "2019-07-20 02:40:42.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1439 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " +orderer0.example.com | "2019-07-20 02:40:42.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " +orderer0.example.com | "2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1440 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-07-20 02:40:42.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.7µs " +orderer0.example.com | "2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1442 Sending msg of 28 bytes to 3 on channel businesschannel took 128.5µs" +orderer0.example.com | "2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-07-20 02:40:42.756 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.3µs " +orderer0.example.com | "2019-07-20 02:40:42.757 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.8µs " +orderer0.example.com | "2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1446 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1447 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 107.8µs" +orderer0.example.com | "2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +orderer0.example.com | "2019-07-20 02:40:43.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144b Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +orderer0.example.com | "2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +orderer0.example.com | "2019-07-20 02:40:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1450 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1451 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-07-20 02:40:43.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175µs " +orderer0.example.com | "2019-07-20 02:40:43.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 96.5µs" +orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.6µs " +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [gossip.pull] Hello -> DEBU 118b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [msp] DeserializeIdentity -> DEBU 118d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [gossip.comm] Send -> DEBU 118e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.762 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1190 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.766 UTC [gossip.comm] func1 -> DEBU 1191 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.761 UTC [cauthdsl] func1 -> DEBU 1192 0xc003687030 gate 1563590396757820400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1195 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1197 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1198 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 119d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a3 0xc0036b3740 gate 1563590396772180600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0036b3740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0036b3740 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a6 0xc0036b3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a7 0xc0036b3740 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a8 0xc0036b3740 gate 1563590396772180600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +orderer0.example.com | "2019-07-20 02:40:43.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1458 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1459 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145b Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145d Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +orderer0.example.com | "2019-07-20 02:40:44.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1461 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 3 on channel testchainid took 47.5µs" +orderer0.example.com | "2019-07-20 02:40:44.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1465 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1466 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" +orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2019-07-20 02:40:44.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +orderer0.example.com | "2019-07-20 02:40:44.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1469 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.252ms " +orderer0.example.com | "2019-07-20 02:40:44.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:44.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +orderer0.example.com | "2019-07-20 02:40:44.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146e Sending msg of 28 bytes to 3 on channel testchainid took 142.3µs" +orderer0.example.com | "2019-07-20 02:40:45.006 UTC [orderer.common.server] Deliver -> DEBU 146f Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1470 Starting new deliver loop for 172.18.0.9:39242" +orderer0.example.com | "2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1471 Attempting to read seek info message from 172.18.0.9:39242" +orderer0.example.com | "2019-07-20 02:40:45.027 UTC [orderer.common.server] Broadcast -> DEBU 1472 Starting new Broadcast handler" +orderer0.example.com | "2019-07-20 02:40:45.027 UTC [orderer.common.broadcast] Handle -> DEBU 1473 Starting new broadcast loop for 172.18.0.9:39244" +orderer0.example.com | "2019-07-20 02:40:45.028 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1474 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39244" +orderer0.example.com | "2019-07-20 02:40:45.028 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1475 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1476 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1477 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1478 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1479 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 147a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func1 -> DEBU 147b 0xc0008d5e60 gate 1563590445030059300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147c 0xc0008d5e60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147d 0xc0008d5e60 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147e 0xc0008d5e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147f 0xc0008d5e60 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.031 UTC [cauthdsl] func1 -> DEBU 1480 0xc0008d5e60 gate 1563590445030059300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1481 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1482 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0036b3f90 gate 1563590396772895800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11ad 0xc0036b3f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11ae 0xc0036b3f90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11af 0xc0036b3f90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [cauthdsl] func2 -> DEBU 11b2 0xc0036b3f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [cauthdsl] func1 -> DEBU 11b3 0xc0036b3f90 gate 1563590396772895800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.776 UTC [policies] Evaluate -> DEBU 11b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11ba Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11bb Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bc Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bd Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11bf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.778 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0036ea820 gate 1563590396778956200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0036ea820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0036ea820 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0036ea820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0036ea820 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0036ea820 gate 1563590396778956200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cf 0xc0036eb080 gate 1563590396779609200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d0 0xc0036eb080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d1 0xc0036eb080 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d2 0xc0036eb080 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.779 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0036eb080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [cauthdsl] func1 -> DEBU 11d6 0xc0036eb080 gate 1563590396779609200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11db Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11de Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003798b90 gate 1563590396782191100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003798b90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003798b90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003798b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:45.031 UTC [policies] func1 -> DEBU 1483 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1484 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1485 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.033 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func1 -> DEBU 1489 0xc000ff8b60 gate 1563590445034097500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148a 0xc000ff8b60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148b 0xc000ff8b60 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148c 0xc000ff8b60 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 d7 e2 4c 93 ff 7a b3 77 17 51 c6 90 73 4c d0 56 |..L..z.w.Q..sL.V| +orderer0.example.com | 00000010 38 2e 22 82 94 37 ee e8 42 7e db 1a 70 1b 33 b9 |8."..7..B~..p.3.|" +orderer0.example.com | "2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 83 bb 89 24 35 e9 6f 9d ce 34 d2 |0E.!....$5.o..4.| +orderer0.example.com | 00000010 b8 0c 69 a7 39 e5 ba 1c 81 f9 c4 7b 9d a8 bd 53 |..i.9......{...S| +orderer0.example.com | 00000020 ee 9e dd 57 63 02 20 0c e4 bd e5 9c 35 78 1a 06 |...Wc. .....5x..| +orderer0.example.com | 00000030 6c da db e8 5a 85 7e 27 0c 66 30 bb 89 9e b1 8e |l...Z.~'.f0.....| +orderer0.example.com | 00000040 81 d5 3e f4 76 50 e1 |..>.vP.|" +orderer0.example.com | "2019-07-20 02:40:45.036 UTC [cauthdsl] func2 -> DEBU 148f 0xc000ff8b60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:45.036 UTC [cauthdsl] func1 -> DEBU 1490 0xc000ff8b60 gate 1563590445034097500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1491 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1492 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1493 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1494 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1495 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 1499 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149a Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149e Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 149f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a1 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a6 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ac Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ad Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ae Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14af Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b1 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b2 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b3 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b4 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.046 UTC [common.configtx] policyForItem -> DEBU 14b5 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b6 Manager Channel looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11ea 0xc003798b90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11eb 0xc003798b90 gate 1563590396782191100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0037993d0 gate 1563590396783331500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0037993d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0037993d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0037993d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.783 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0037993d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0037993d0 gate 1563590396783331500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [gossip.election] waitForInterrupt -> DEBU 11fb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [gossip.election] IsLeader -> DEBU 11fc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [msp] GetDefaultSigningIdentity -> DEBU 11fd Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:56.785 UTC [msp.identity] Sign -> DEBU 11fe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510041801 " +peer0.org1.example.com | "2019-07-20 02:39:56.786 UTC [msp.identity] Sign -> DEBU 11ff Sign: digest: 3D17F297AE31AB5120D66524527E2DA3C17A877046C3846100F2EEF767D18437 " +peer0.org1.example.com | "2019-07-20 02:39:56.786 UTC [gossip.election] waitForInterrupt -> DEBU 1200 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1201 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.791 UTC [msp.identity] Verify -> DEBU 120a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 120b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120d Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b8 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b9 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14ba Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bb Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bc Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bd Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14be Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] deduplicate -> WARN 14c2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func1 -> DEBU 14c3 0xc0008d80c0 gate 1563590445048642600 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0008d80c0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0008d80c0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0008d80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0008d80c0 processing identity 1 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14c8 Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c9 0xc0008d80c0 principal matched by identity 1" +orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +orderer0.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +orderer0.example.com | "2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +orderer0.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +orderer0.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +orderer0.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +orderer0.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0008d80c0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14cd 0xc0008d80c0 gate 1563590445048642600 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] deduplicate -> WARN 14d1 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14d2 0xc0008d8ba0 gate 1563590445050800500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14d3 0xc0008d8ba0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d4 0xc0008d8ba0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d5 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d6 0xc0008d8ba0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d7 Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +orderer0.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d8 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +orderer0.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +orderer0.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +orderer0.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +orderer0.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" +orderer0.example.com | "2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d9 0xc0008d8ba0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [cauthdsl] func1 -> DEBU 14da 0xc0008d8ba0 gate 1563590445050800500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dd Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14df Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e1 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] verifyDeltaSet -> DEBU 14e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14e9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14ea Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14eb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ec Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ee Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14f0 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f1 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f2 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f3 Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f4 Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fa Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fb Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fe Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.057 UTC [common.channelconfig] NewStandardValues -> DEBU 14ff Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1500 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1501 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1502 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1503 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1504 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] NewStandardValues -> DEBU 1505 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1506 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1507 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 1508 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1509 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 150a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [common.channelconfig] Validate -> DEBU 150c Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [common.channelconfig] validateMSP -> DEBU 150d Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] newBccspMsp -> DEBU 150e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] New -> DEBU 150f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp] Setup -> DEBU 1510 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.060 UTC [msp.identity] newIdentity -> DEBU 1511 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 120e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 120f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1214 0xc0037d9520 gate 1563590396792537900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1215 0xc0037d9520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1216 0xc0037d9520 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1217 0xc0037d9520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1218 0xc0037d9520 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1219 0xc0037d9520 gate 1563590396792537900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 121d 0xc0037d9d60 gate 1563590396792820100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121e 0xc0037d9d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121f 0xc0037d9d60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1220 0xc0037d9d60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [cauthdsl] func2 -> DEBU 1223 0xc0037d9d60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [cauthdsl] func1 -> DEBU 1224 0xc0037d9d60 gate 1563590396792820100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 1229 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.pull] HandleMessage -> DEBU 122b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.915 UTC [gossip.comm] func1 -> DEBU 122d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.915 UTC [gossip.gossip] handleMessage -> DEBU 122e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.916 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.917 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.918 UTC [gossip.gossip] handleMessage -> DEBU 1231 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.928 UTC [gossip.comm] func1 -> DEBU 1232 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.928 UTC [gossip.gossip] handleMessage -> DEBU 1233 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.pull] HandleMessage -> DEBU 1234 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.pull] SendDigest -> DEBU 1235 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:39:56.929 UTC [gossip.gossip] handleMessage -> DEBU 1236 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.comm] func1 -> DEBU 1237 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1238 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1239 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 123a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 123d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:56.951 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1243 0xc00392c970 gate 1563590396952123800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1244 0xc00392c970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1245 0xc00392c970 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1246 0xc00392c970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1247 0xc00392c970 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1248 0xc00392c970 gate 1563590396952123800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1249 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func1 -> DEBU 124c 0xc00392d1b0 gate 1563590396952965700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124d 0xc00392d1b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124e 0xc00392d1b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124f 0xc00392d1b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1250 Verify: digest = 00000000 95 48 f5 b0 d8 da f5 ff de 4d dd b1 47 60 28 a7 |.H.......M..G`(.| +peer0.org1.example.com | 00000010 22 6b b6 c5 89 4e 23 53 d6 fc c3 30 7b 27 42 eb |"k...N#S...0{'B.|" +peer0.org1.example.com | "2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1251 Verify: sig = 00000000 30 44 02 20 28 f2 eb 53 10 3b 2f 51 c3 97 33 b5 |0D. (..S.;/Q..3.| +peer0.org1.example.com | 00000010 f4 59 4f c6 e1 f0 9d c2 e9 ad ae 44 79 ce 6f a7 |.YO........Dy.o.| +peer0.org1.example.com | 00000020 61 5b eb 9a 02 20 59 2c e5 f2 d3 23 32 f6 71 6a |a[... Y,...#2.qj| +peer0.org1.example.com | 00000030 e1 26 97 7a 1c f9 09 ab 6f f0 84 e2 07 66 63 17 |.&.z....o....fc.| +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp.identity] newIdentity -> DEBU 1512 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1513 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.061 UTC [msp] Validate -> DEBU 1514 MSP Org3MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1515 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] hasOURole -> DEBU 1516 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1517 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 1518 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1519 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 151a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 151b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.063 UTC [common.channelconfig] Validate -> DEBU 151c Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.063 UTC [common.channelconfig] validateMSP -> DEBU 151d Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] newBccspMsp -> DEBU 151e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] New -> DEBU 151f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.063 UTC [msp] Setup -> DEBU 1520 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1521 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1522 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.065 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1523 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] Validate -> DEBU 1524 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1525 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] hasOURole -> DEBU 1526 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1527 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1528 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1529 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 152a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 152b Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.067 UTC [common.channelconfig] Validate -> DEBU 152c Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.068 UTC [common.channelconfig] validateMSP -> DEBU 152d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] newBccspMsp -> DEBU 152e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] New -> DEBU 152f Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.068 UTC [msp] Setup -> DEBU 1530 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.069 UTC [msp.identity] newIdentity -> DEBU 1531 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp.identity] newIdentity -> DEBU 1532 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1533 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.070 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1538 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1539 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153a Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153b Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153c Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153d Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153e Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 153f Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1540 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 1541 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1542 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.073 UTC [common.channelconfig] validateMSP -> DEBU 1543 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] newBccspMsp -> DEBU 1544 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] New -> DEBU 1545 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.074 UTC [msp] Setup -> DEBU 1546 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1547 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1548 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.076 UTC [msp] Validate -> DEBU 1549 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154a Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154b MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154c Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154d Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154e Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154f Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1550 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1551 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1552 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1553 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1554 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1555 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1556 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1557 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1558 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1559 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155a Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155b Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155c Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1560 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1561 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1562 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1563 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1564 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1565 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1566 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1569 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156b Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156c Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156d Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156e Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1570 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1576 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1577 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1578 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1580 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1582 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1583 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1584 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1585 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1586 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1589 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158e Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 158f Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1590 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1591 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1592 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1593 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1594 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1595 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1596 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1597 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1598 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1599 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 159a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159b As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159c As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159d Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159e Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 159f Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a0 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a1 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a3 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a4 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a5 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a6 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a7 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a8 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a9 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15aa Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [policies] Manager -> DEBU 15ab Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ad As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ae As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15af As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b0 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b1 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b2 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b3 Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b4 Sign: plaintext: 0AD2060A1B08011A0608ADFEC9E90522...270C6630BB899EB18E81D53EF47650E1 " +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b5 Sign: digest: E65706ACD2876BC2B6927B61ADD89D93F75A2ABE3D407C2904A013785C74D7B8 " +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-07-20 02:40:45.091 UTC [msp] DeserializeIdentity -> DEBU 15bb Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp.identity] newIdentity -> DEBU 15bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func1 -> DEBU 15bd 0xc001062e00 gate 1563590445092476300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15be 0xc001062e00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15bf 0xc001062e00 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c0 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:45.092 UTC [msp] Validate -> DEBU 15c1 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c2 0xc001062e00 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c3 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| +orderer0.example.com | 00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c4 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| +orderer0.example.com | 00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| +orderer0.example.com | 00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| +orderer0.example.com | 00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| +orderer0.example.com | 00000040 63 b0 56 6b 0a |c.Vk.|" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c5 0xc001062e00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [cauthdsl] func1 -> DEBU 15c6 0xc001062e00 gate 1563590445092476300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.093 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cb Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [orderer.common.msgprocessor] Apply -> DEBU 15cd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] NewStandardValues -> DEBU 15ce Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cf Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d0 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d2 Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] NewStandardValues -> DEBU 15d4 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d5 Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d6 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d8 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15da Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] Validate -> DEBU 15db Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [common.channelconfig] validateMSP -> DEBU 15dc Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] newBccspMsp -> DEBU 15dd Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] New -> DEBU 15de Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp] Setup -> DEBU 15df Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.097 UTC [msp.identity] newIdentity -> DEBU 15e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp.identity] newIdentity -> DEBU 15e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15e2 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] Validate -> DEBU 15e3 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.098 UTC [msp] getCertificationChain -> DEBU 15e4 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [msp] hasOURole -> DEBU 15e5 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [msp] getCertificationChain -> DEBU 15e6 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: MSP" +peer0.org1.example.com | 00000040 bd e5 5b cf b3 77 |..[..w|" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [cauthdsl] func2 -> DEBU 1252 0xc00392d1b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [cauthdsl] func1 -> DEBU 1253 0xc00392d1b0 gate 1563590396952965700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1256 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1258 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1259 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125a updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 125f Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.955 UTC [msp] DeserializeIdentity -> DEBU 1260 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1261 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1262 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1263 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1264 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1265 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [gossip.comm] Send -> DEBU 1266 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1267 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] Send -> DEBU 1269 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.comm] func1 -> DEBU 126e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 126f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 1270 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1272 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.959 UTC [gossip.comm] func1 -> DEBU 1273 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1274 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1275 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1277 Exiting" +orderer0.example.com | "2019-07-20 02:40:45.099 UTC [common.channelconfig] Validate -> DEBU 15eb Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [common.channelconfig] validateMSP -> DEBU 15ec Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] newBccspMsp -> DEBU 15ed Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [gossip.comm] func1 -> DEBU 1278 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [gossip.gossip] handleMessage -> DEBU 1279 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.077 UTC [msp] DeserializeIdentity -> DEBU 127a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.080 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.215 UTC [gossip.comm] func1 -> DEBU 127e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.216 UTC [gossip.gossip] handleMessage -> DEBU 127f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1281 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1282 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.219 UTC [gossip.gossip] handleMessage -> DEBU 1283 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.261 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1284 Sleeping 25s" +peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 1285 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1286 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151015 " +peer0.org1.example.com | "2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1287 Sign: digest: 0002FCB77BD293C038C9723707CBBAC6C32ED8A408B1F1A6C0E74FA9D271B781 " +peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp] GetDefaultSigningIdentity -> DEBU 1288 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 1289 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 128a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:39:57.267 UTC [gossip.discovery] periodicalSendAlive -> DEBU 128b Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 1291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] Send -> DEBU 1292 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1294 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1295 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1296 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.401 UTC [gossip.comm] func1 -> DEBU 1299 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.402 UTC [gossip.gossip] handleMessage -> DEBU 129a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.gossip] handleMessage -> DEBU 129b Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.403 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 129d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 b9 dd c8 c7 6d ff 2b 8a 99 ea 11 e3 44 96 78 ff |....m.+.....D.x.| +peer0.org1.example.com | 00000010 d9 76 8b 02 5f 76 6d 63 c6 65 6a 00 4e 95 50 36 |.v.._vmc.ej.N.P6|" +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] New -> DEBU 15ee Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp] Setup -> DEBU 15ef Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15f2 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] Validate -> DEBU 15f3 MSP Org3MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f4 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] hasOURole -> DEBU 15f5 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f6 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f8 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15fa Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] Validate -> DEBU 15fb Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [common.channelconfig] validateMSP -> DEBU 15fc Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] newBccspMsp -> DEBU 15fd Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] New -> DEBU 15fe Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.102 UTC [msp] Setup -> DEBU 15ff Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1601 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 b7 49 ab 36 61 f7 81 6d 69 29 bf |0E.!..I.6a..mi).| +peer0.org1.example.com | 00000010 36 52 9d a6 90 5f 3b a2 30 72 6a d9 de 9c 0a 21 |6R..._;.0rj....!| +peer0.org1.example.com | 00000020 7f ff de 82 c7 02 20 49 95 b5 20 20 97 19 91 63 |...... I.. ...c| +peer0.org1.example.com | 00000030 fa c3 66 a3 99 63 96 08 df 8e 9e c2 7b fb b5 14 |..f..c......{...| +peer0.org1.example.com | 00000040 c3 7d 6d 48 06 16 e2 |.}mH...|" +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a6 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.412 UTC [gossip.comm] func1 -> DEBU 12a8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12a9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12aa Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ac Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.comm] func1 -> DEBU 12ad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12af Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.413 UTC [gossip.comm] Send -> DEBU 12b5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [msp] DeserializeIdentity -> DEBU 12b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] Send -> DEBU 12b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12bb Exiting" +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1602 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] Validate -> DEBU 1603 MSP Org1MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1604 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] hasOURole -> DEBU 1605 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1606 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] NewStandardValues -> DEBU 1607 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1608 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1609 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160a Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160b Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160c Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160d Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 160e Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-07-20 02:39:57.586 UTC [gossip.comm] func1 -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.586 UTC [gossip.gossip] handleMessage -> DEBU 12bd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.gossip] handleMessage -> DEBU 12be Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12c0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12c8 0xc003a8cc90 gate 1563590397587995100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12c9 0xc003a8cc90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12ca 0xc003a8cc90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cb 0xc003a8cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cc 0xc003a8cc90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12cd 0xc003a8cc90 gate 1563590397587995100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12d1 0xc003a8d4d0 gate 1563590397588716100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d2 0xc003a8d4d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d3 0xc003a8d4d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d4 0xc003a8d4d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 83 1d c3 d2 b4 ac 95 19 17 8d fe a1 81 8d 9a e5 |................| +peer0.org1.example.com | 00000010 78 dc 36 0b 00 8c 9a 0e 72 f4 9c f5 4a 9d 7f 0f |x.6.....r...J...|" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 45 02 21 00 9a 40 65 b0 10 da 51 8a f3 ee ac |0E.!..@e...Q....| +peer0.org1.example.com | 00000010 2f 2e 81 a3 c6 f1 57 70 46 e7 e2 5b 12 9d 5a 65 |/.....WpF..[..Ze| +peer0.org1.example.com | 00000020 01 16 95 a8 d3 02 20 37 45 a3 c5 78 bf 84 68 2e |...... 7E..x..h.| +peer0.org1.example.com | 00000030 82 2e 93 c1 30 45 37 59 55 bb b1 42 d7 3d 21 81 |....0E7YU..B.=!.| +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160f Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 1610 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1611 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [common.channelconfig] validateMSP -> DEBU 1612 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [msp] newBccspMsp -> DEBU 1613 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.105 UTC [msp] New -> DEBU 1614 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.106 UTC [msp] Setup -> DEBU 1615 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1616 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1617 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Validate -> DEBU 1618 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 1619 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 161a MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161b Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161e Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161f Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1620 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1621 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1622 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1623 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1624 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1625 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1626 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1627 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1628 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1629 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162a Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162b Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162f Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1630 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1631 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1632 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1633 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1634 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:40:45.113 UTC [policies] NewManagerImpl -> DEBU 1635 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1660 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1661 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1662 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1663 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | 00000040 0c 75 ab 99 6c ad bd |.u..l..|" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d7 0xc003a8d4d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [cauthdsl] func1 -> DEBU 12d8 0xc003a8d4d0 gate 1563590397588716100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12df updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12e3 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12e4 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12ea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12eb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [gossip.comm] Send -> DEBU 12ec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] Send -> DEBU 12ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f0 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.598 UTC [gossip.comm] func1 -> DEBU 12f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f5 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f7 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.comm] func1 -> DEBU 12f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1664 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1665 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1666 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1667 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1668 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1669 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:45.121 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 166a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39244" +orderer0.example.com | "2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] propose -> INFO 166b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 166c Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:45.123 UTC [orderer.consensus.etcdraft] 2 -> DEBU 166d Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:45.124 UTC [common.deliver] Handle -> WARN 166e Error reading from 172.18.0.9:39242: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:45.124 UTC [orderer.common.server] func1 -> DEBU 166f Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1670 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39242 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=118.9084ms +orderer0.example.com | "2019-07-20 02:40:45.125 UTC [grpc] infof -> DEBU 1671 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:45.125 UTC [orderer.common.broadcast] Handle -> WARN 1672 Error reading from 172.18.0.9:39244: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:45.125 UTC [orderer.common.server] func1 -> DEBU 1673 Closing Broadcast stream" +orderer0.example.com | "2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39244 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.4809ms +orderer0.example.com | "2019-07-20 02:40:45.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 34005 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-07-20 02:40:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 34005 bytes to 2 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-07-20 02:40:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1679 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer1.example.com(orderer1.example.com:7050) took 276.9µs " +orderer0.example.com | "2019-07-20 02:40:45.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " +orderer0.example.com | "2019-07-20 02:40:45.131 UTC [grpc] infof -> DEBU 1677 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7105ms " +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167e Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 167f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1680 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1681 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1682 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1683 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1684 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1685 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1686 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1687 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1688 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1689 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168d Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168f Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1690 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1691 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1692 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1693 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1694 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1695 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1696 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169c Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [common.configtx] policyForItem -> DEBU 169d Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169e Manager Channel looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169f Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a0 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a1 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a2 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a4 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a5 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12fa Exiting" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fc Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.comm] func1 -> DEBU 12fd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12ff Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1300 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1301 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:39:59.948 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1303 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1304 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1306 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1307 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func1 -> DEBU 1309 0xc003bb2320 gate 1563590399949786200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130a 0xc003bb2320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130b 0xc003bb2320 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130c 0xc003bb2320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130d 0xc003bb2320 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 130e 0xc003bb2320 gate 1563590399949786200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 130f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 1312 0xc003bb2b90 gate 1563590399950706500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1313 0xc003bb2b90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1314 0xc003bb2b90 processing identity 0 with bytes of 114b950" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a6 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a7 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.138 UTC [cauthdsl] deduplicate -> WARN 16ab De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func1 -> DEBU 16ac 0xc000fa71d0 gate 1563590445139011500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ad 0xc000fa71d0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ae 0xc000fa71d0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16af 0xc000fa71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000fa71d0 processing identity 1 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b1 0xc000fa71d0 principal matched by identity 1" +orderer0.example.com | "2019-07-20 02:40:45.139 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +orderer0.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +orderer0.example.com | "2019-07-20 02:40:45.141 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +orderer0.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +orderer0.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +orderer0.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +orderer0.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" +orderer0.example.com | "2019-07-20 02:40:45.141 UTC [cauthdsl] func2 -> DEBU 16b4 0xc000fa71d0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-07-20 02:40:45.141 UTC [cauthdsl] func1 -> DEBU 16b5 0xc000fa71d0 gate 1563590445139011500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-07-20 02:40:45.143 UTC [cauthdsl] deduplicate -> WARN 16b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-07-20 02:40:45.144 UTC [cauthdsl] func1 -> DEBU 16bb 0xc000fa7890 gate 1563590445144040900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.144 UTC [cauthdsl] func2 -> DEBU 16bc 0xc000fa7890 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-07-20 02:40:45.145 UTC [cauthdsl] func2 -> DEBU 16bd 0xc000fa7890 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.146 UTC [cauthdsl] func2 -> DEBU 16be 0xc000fa7890 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:45.146 UTC [msp.identity] Verify -> DEBU 16bf Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +orderer0.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +orderer0.example.com | "2019-07-20 02:40:45.147 UTC [msp.identity] Verify -> DEBU 16c0 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +orderer0.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +orderer0.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +orderer0.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +orderer0.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" +orderer0.example.com | "2019-07-20 02:40:45.152 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000fa7890 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:45.153 UTC [cauthdsl] func1 -> DEBU 16c2 0xc000fa7890 gate 1563590445144040900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.155 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.155 UTC [common.configtx] verifyDeltaSet -> DEBU 16c7 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16ca Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16cb Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cc Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cd Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16ce Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16cf Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d1 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d8 Setting policy for key Admins to " +orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16d9 Setting policy for key Endorsement to " +orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16da Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16db Setting policy for key Readers to " +orderer0.example.com | "2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16dc Setting policy for key Writers to " +orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16dd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16de Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16df Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e0 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e1 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-07-20 02:40:45.164 UTC [common.channelconfig] NewStandardValues -> DEBU 16e7 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-07-20 02:40:45.164 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e8 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e9 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ea Processing field: OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16eb Processing field: Consortium" +orderer0.example.com | "2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ec Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16ed Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ee Processing field: ACLs" +orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ef Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16f0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f1 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] NewStandardValues -> DEBU 16f2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f3 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] Validate -> DEBU 16f4 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [common.channelconfig] validateMSP -> DEBU 16f5 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.167 UTC [msp] newBccspMsp -> DEBU 16f6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp] New -> DEBU 16f7 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp] Setup -> DEBU 16f8 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.168 UTC [msp.identity] newIdentity -> DEBU 16f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.169 UTC [msp.identity] newIdentity -> DEBU 16fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16fb Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.170 UTC [msp] Validate -> DEBU 16fc MSP Org3MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.170 UTC [msp] getCertificationChain -> DEBU 16fd MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ba Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.171 UTC [msp] hasOURole -> DEBU 16fe MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.171 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.171 UTC [common.channelconfig] NewStandardValues -> DEBU 1700 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] NewStandardValues -> DEBU 1702 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] Validate -> DEBU 1704 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.172 UTC [common.channelconfig] validateMSP -> DEBU 1705 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.172 UTC [msp] newBccspMsp -> DEBU 1706 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp] New -> DEBU 1707 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp] Setup -> DEBU 1708 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.173 UTC [msp.identity] newIdentity -> DEBU 1709 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.174 UTC [msp.identity] newIdentity -> DEBU 170a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 170b Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] Validate -> DEBU 170c MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1315 0xc003bb2b90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| +peer0.org1.example.com | 00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" +peer0.org1.example.com | "2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| +peer0.org1.example.com | 00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| +peer0.org1.example.com | 00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| +peer0.org1.example.com | 00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| +peer0.org1.example.com | 00000040 ad ca ca e5 1e 5a |.....Z|" +peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [cauthdsl] func2 -> DEBU 1318 0xc003bb2b90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [cauthdsl] func1 -> DEBU 1319 0xc003bb2b90 gate 1563590399950706500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:39:59.952 UTC [policies] Evaluate -> DEBU 131a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 131e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 131f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 1320 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1321 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1322 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1323 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1324 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] sendMemResponse -> DEBU 1325 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1327 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1328 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.955 UTC [gossip.comm] Send -> DEBU 1329 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:39:59.956 UTC [gossip.discovery] sendMemResponse -> DEBU 132a Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\031" signature:"0E\002!\000\267I\2536a\367\201mi)\2776R\235\246\220_;\2420rj\331\336\234\n!\177\377\336\202\307\002 I\225\265 \227\031\221c\372\303f\243\231c\226\010\337\216\236\302{\373\265\024\303}mH\006\026\342" > alive: " +peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132c Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.957 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [gossip.pull] HandleMessage -> DEBU 132f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1332 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170d MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] hasOURole -> DEBU 170e MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1710 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1711 Processing field: AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1712 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1713 Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.176 UTC [common.channelconfig] Validate -> DEBU 1714 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-07-20 02:40:45.177 UTC [common.channelconfig] validateMSP -> DEBU 1715 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] newBccspMsp -> DEBU 1716 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] New -> DEBU 1717 Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp] Setup -> DEBU 1718 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.177 UTC [msp.identity] newIdentity -> DEBU 1719 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.178 UTC [msp.identity] newIdentity -> DEBU 171a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [gossip.pull] SendDigest -> DEBU 1336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:39:59.959 UTC [gossip.gossip] handleMessage -> DEBU 1337 Exiting" +peer0.org1.example.com | "2019-07-20 02:39:59.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1338 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 1339 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.comm] Send -> DEBU 133a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 133b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.pull] Hello -> DEBU 133d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 133f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1340 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1341 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1342 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1343 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.276 UTC [gossip.comm] sendToEndpoint -> DEBU 1344 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.276 UTC [gossip.comm] func1 -> DEBU 1345 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1346 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.pull] HandleMessage -> DEBU 1347 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1348 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 1349 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.pull] HandleMessage -> DEBU 134b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 134d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 134e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.178 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 171b Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] Validate -> DEBU 171c MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] hasOURole -> DEBU 171e MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] NewStandardValues -> DEBU 1720 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1721 Processing field: ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1722 Processing field: BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1723 Processing field: BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1724 Processing field: KafkaBrokers" +orderer0.example.com | "2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1725 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1726 Processing field: Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1727 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1728 Processing field: Endpoints" +orderer0.example.com | "2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1729 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-07-20 02:40:45.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172a Processing field: MSP" +orderer0.example.com | "2019-07-20 02:40:45.182 UTC [common.channelconfig] validateMSP -> DEBU 172b Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.182 UTC [msp] newBccspMsp -> DEBU 172c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.183 UTC [msp] New -> DEBU 172d Creating Cache-MSP instance" +orderer0.example.com | "2019-07-20 02:40:45.183 UTC [msp] Setup -> DEBU 172e Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 172f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 1730 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Validate -> DEBU 1731 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1732 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1733 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-07-20 02:40:45.185 UTC [policies] NewManagerImpl -> DEBU 1734 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1735 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1736 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1737 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1738 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1739 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173a Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173b Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173c Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173d Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173e Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1740 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1741 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1744 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1745 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1747 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1748 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.203 UTC [policies] NewManagerImpl -> DEBU 1749 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.204 UTC [policies] NewManagerImpl -> DEBU 174a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1742 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1743 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-07-20 02:40:45.206 UTC [policies] NewManagerImpl -> DEBU 174b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.207 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 174c Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-07-20 02:40:45.207 UTC [orderer.common.cluster.step] sendMessage -> DEBU 174d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174e Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1754 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1755 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1756 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1757 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1758 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1759 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.213 UTC [common.configtx] addToMap -> DEBU 175a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175b Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175c Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.216 UTC [common.configtx] addToMap -> DEBU 175e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 175f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1760 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1761 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1762 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1763 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1764 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 1765 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.223 UTC [common.configtx] addToMap -> DEBU 1766 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 1767 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1768 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.230 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:45.233 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.pull] HandleMessage -> DEBU 134f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 1350 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1351 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1352 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151016 " +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1353 Sign: digest: 11CA326B0DACA229CE2CE81B0CFFF6F167054870B698D3BCC60F2CCD5EECB3F3 " +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1354 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1355 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1356 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 1357 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 1359 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 135a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 135b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.311 UTC [gossip.comm] Send -> DEBU 135f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1360 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1361 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.comm] func1 -> DEBU 1362 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1363 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1364 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1365 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.comm] func1 -> DEBU 1366 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.gossip] handleMessage -> DEBU 1367 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1368 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.314 UTC [msp.identity] Verify -> DEBU 1369 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [msp.identity] Verify -> DEBU 136a Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" +peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.comm] func1 -> DEBU 136b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 136c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.315 UTC [gossip.discovery] isSentByMe -> DEBU 136d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 136e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 136f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1370 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1371 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1373 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1374 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1375 Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1376 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] isSentByMe -> DEBU 1377 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1378 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1379 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.317 UTC [msp] DeserializeIdentity -> DEBU 137a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:45.241 UTC [common.channelconfig] LogSanityChecks -> DEBU 178a As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.242 UTC [common.channelconfig] LogSanityChecks -> DEBU 178b As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178c Manager Channel looking up path [Application]" +orderer0.example.com | "2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178d Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178e Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178f Manager Channel/Application looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1790 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1791 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1792 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1793 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1794 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1795 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-07-20 02:40:45.246 UTC [policies] Manager -> DEBU 1796 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1797 Manager Channel has managers Application" +orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1798 Manager Channel has managers Orderer" +orderer0.example.com | "2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1799 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-07-20 02:40:45.248 UTC [policies] Manager -> DEBU 179a Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179c As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179d As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-07-20 02:40:45.249 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 179f Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 17a0 Channel capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.server] func1 -> DEBU 17a1 Executing callback to update root CAs" +orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.250 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a3 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-07-20 02:40:45.251 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a4 adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-07-20 02:40:45.252 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a5 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a6 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a7 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-07-20 02:40:45.268 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a8 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +orderer0.example.com | "2019-07-20 02:40:45.270 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a9 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +orderer0.example.com | "2019-07-20 02:40:45.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 17aa Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:45.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 17ab Obtaining default signing identity" +orderer0.example.com | "2019-07-20 02:40:45.274 UTC [msp.identity] Sign -> DEBU 17ac Sign: plaintext: 0A020806120B0A090A03010203100418...CAE88F56D183B4805A1EC235F949D7F9 " +orderer0.example.com | "2019-07-20 02:40:45.275 UTC [msp.identity] Sign -> DEBU 17ad Sign: digest: CC6AD12B7A215B899C1845FD388D2A71DF2059FE693C450EC89BAE5083B4D965 " +orderer0.example.com | "2019-07-20 02:40:45.278 UTC [fsblkstorage] indexBlock -> DEBU 17ae Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= +orderer0.example.com | txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +orderer0.example.com | ]" +orderer0.example.com | "2019-07-20 02:40:45.280 UTC [fsblkstorage] updateCheckpoint -> DEBU 17af Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118787], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:45.280 UTC [fsblkstorage] waitForBlock -> DEBU 17b0 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b1 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b2 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:45.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b3 blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:45.284 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.285 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.287 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:45.288 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:45.290 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000a9b000 gate 1563590445290446800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.291 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000a9b000 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000a9b000 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17be 0xc000a9b000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:45.293 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000a9b000 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.293 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000a9b000 gate 1563590445290446800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.293 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.294 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.295 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.295 UTC [cauthdsl] func1 -> DEBU 17c4 0xc00004e4e0 gate 1563590445295605800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.295 UTC [cauthdsl] func2 -> DEBU 17c5 0xc00004e4e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.297 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00004e4e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00004e4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00004e4e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.302 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00004e4e0 gate 1563590445295605800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.303 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:45.303 UTC [cauthdsl] func1 -> DEBU 17cd 0xc00004f270 gate 1563590445303305800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:45.303 UTC [cauthdsl] func2 -> DEBU 17ce 0xc00004f270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:45.304 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00004f270 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:45.304 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d0 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-07-20 02:40:45.304 UTC [msp] Validate -> DEBU 17d1 MSP Org2MSP validating identity" +orderer0.example.com | "2019-07-20 02:40:45.307 UTC [msp] getCertificationChain -> DEBU 17d2 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-07-20 02:40:45.309 UTC [cauthdsl] func2 -> DEBU 17d3 0xc00004f270 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:45.309 UTC [msp.identity] Verify -> DEBU 17d4 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| +orderer0.example.com | 00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" +orderer0.example.com | "2019-07-20 02:40:45.310 UTC [msp.identity] Verify -> DEBU 17d5 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| +orderer0.example.com | 00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| +orderer0.example.com | 00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| +orderer0.example.com | 00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| +orderer0.example.com | 00000040 f0 df 1f af fc f3 dc |.......|" +orderer0.example.com | "2019-07-20 02:40:45.310 UTC [cauthdsl] func2 -> DEBU 17d6 0xc00004f270 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:45.311 UTC [cauthdsl] func1 -> DEBU 17d7 0xc00004f270 gate 1563590445303305800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17da Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1381 0xc003cd45b0 gate 1563590400318472100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1382 0xc003cd45b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1383 0xc003cd45b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1384 0xc003cd45b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1385 0xc003cd45b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1386 0xc003cd45b0 gate 1563590400318472100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func1 -> DEBU 138a 0xc003cd4e10 gate 1563590400319460300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138b 0xc003cd4e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138c 0xc003cd4e10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138d 0xc003cd4e10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.319 UTC [msp.identity] Verify -> DEBU 138e Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| +peer0.org1.example.com | 00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [msp.identity] Verify -> DEBU 138f Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| +peer0.org1.example.com | 00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| +peer0.org1.example.com | 00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| +peer0.org1.example.com | 00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| +peer0.org1.example.com | 00000040 ad ca ca e5 1e 5a |.....Z|" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [cauthdsl] func2 -> DEBU 1390 0xc003cd4e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [cauthdsl] func1 -> DEBU 1391 0xc003cd4e10 gate 1563590400319460300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1394 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1396 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.gossip] handleMessage -> DEBU 139a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1399 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 139b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139c Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +peer0.org1.example.com | 00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +peer0.org1.example.com | "2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139d Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +peer0.org1.example.com | 00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +peer0.org1.example.com | 00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +peer0.org1.example.com | 00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +peer0.org1.example.com | 00000040 4e d6 49 e1 dd 1b |N.I...|" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139f Verify: sig = 00000000 30 44 02 20 58 40 7c 49 09 c6 a4 f9 da 59 12 bf |0D. X@|I.....Y..| +peer0.org1.example.com | 00000010 7a 38 1d fb 5d 95 58 26 92 c8 a0 3b 06 3b 03 68 |z8..].X&...;.;.h| +peer0.org1.example.com | 00000020 bd 29 24 99 02 20 33 53 85 b7 ac 4b ef 99 a3 4f |.)$.. 3S...K...O| +peer0.org1.example.com | 00000030 36 7d d1 08 b7 a3 a8 2c 9a 5e 86 92 2f fa 80 c9 |6}.....,.^../...| +peer0.org1.example.com | 00000040 4f 89 be 1b 47 d5 |O...G.|" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] isSentByMe -> DEBU 13a1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.323 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.395 UTC [gossip.comm] func1 -> DEBU 13a4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.395 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.397 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:40:45.313 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:45.313 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +orderer0.example.com | "2019-07-20 02:40:45.314 UTC [fsblkstorage] waitForBlock -> DEBU 17df Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:45.280 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17e0 [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-07-20 02:40:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e2 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2019-07-20 02:40:45.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.8µs " +orderer0.example.com | "2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" +orderer0.example.com | "2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " +orderer0.example.com | "2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 553.7µs " +orderer0.example.com | "2019-07-20 02:40:45.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:45.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-07-20 02:40:45.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " +orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +orderer0.example.com | "2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +orderer0.example.com | "2019-07-20 02:40:46.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f4 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +orderer0.example.com | "2019-07-20 02:40:46.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-07-20 02:40:46.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " +orderer0.example.com | "2019-07-20 02:40:46.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467µs " +orderer0.example.com | "2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:46.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +orderer0.example.com | "2019-07-20 02:40:46.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545µs " +orderer0.example.com | "2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ff Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +orderer0.example.com | "2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1800 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1801 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +orderer0.example.com | "2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 858.2µs " +orderer0.example.com | "2019-07-20 02:40:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1806 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +orderer0.example.com | "2019-07-20 02:40:47.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1807 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " +orderer0.example.com | "2019-07-20 02:40:47.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1808 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-07-20 02:40:47.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-07-20 02:40:47.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +orderer0.example.com | "2019-07-20 02:40:47.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1809 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.4µs " +orderer0.example.com | "2019-07-20 02:40:47.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:47.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2019-07-20 02:40:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1810 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 856.1µs " +orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1811 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1813 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " +orderer0.example.com | "2019-07-20 02:40:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1812 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " +orderer0.example.com | "2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1815 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1816 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.248 UTC [orderer.common.server] Deliver -> DEBU 1817 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1818 Starting new deliver loop for 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1819 Attempting to read seek info message from 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.250 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:48.251 UTC [msp.identity] newIdentity -> DEBU 1820 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func1 -> DEBU 1821 0xc000416840 gate 1563590448251684300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1822 0xc000416840 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1823 0xc000416840 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1824 0xc000416840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1825 0xc000416840 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.252 UTC [cauthdsl] func1 -> DEBU 1826 0xc000416840 gate 1563590448251684300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1827 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1829 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.253 UTC [cauthdsl] func1 -> DEBU 182a 0xc000417b20 gate 1563590448253612300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.253 UTC [cauthdsl] func2 -> DEBU 182b 0xc000417b20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182c 0xc000417b20 processing identity 0 with bytes of fd0280" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ac Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ad Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13ae Verify: digest = 00000000 b2 df 75 9a c5 cd b4 29 05 05 d3 7e cd ea ba b1 |..u....)...~....| +peer0.org1.example.com | 00000010 29 a8 a9 25 d2 e9 e4 20 b9 cd 4c 96 94 4b 70 bb |)..%... ..L..Kp.|" +peer0.org1.example.com | "2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13af Verify: sig = 00000000 30 45 02 21 00 ae ba 69 b1 18 cb c3 27 ed 1f 1e |0E.!...i....'...| +peer0.org1.example.com | 00000010 ec 78 6e e7 f4 61 a8 c8 c2 ac ec 49 b9 fa b6 40 |.xn..a.....I...@| +peer0.org1.example.com | 00000020 53 2e 97 6c 1e 02 20 48 5e a8 6c ca f8 d1 22 ac |S..l.. H^.l...".| +peer0.org1.example.com | 00000030 ec 63 b2 b0 1c d9 86 3a 93 25 43 35 79 66 77 5d |.c.....:.%C5yfw]| +peer0.org1.example.com | 00000040 9c 50 f7 27 c9 50 6e |.P.'.Pn|" +peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b1 Verify: sig = 00000000 30 44 02 20 64 44 b6 aa 9f f9 b9 e1 0f 65 2b 3e |0D. dD.......e+>| +peer0.org1.example.com | 00000010 e8 a7 42 e8 6f c5 84 00 11 a8 16 cb e4 dd a3 a3 |..B.o...........| +peer0.org1.example.com | 00000020 45 89 e3 36 02 20 17 a3 1e d3 94 25 da e8 b9 3c |E..6. .....%...<| +peer0.org1.example.com | 00000030 34 a2 f3 f9 fd ea a2 aa a9 af 6f 13 dc 62 cf 4c |4.........o..b.L| +peer0.org1.example.com | 00000040 b4 8b 61 7d f0 f7 |..a}..|" +peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [gossip.discovery] sendMemResponse -> DEBU 13ba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] Send -> DEBU 13bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182d 0xc000417b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182e 0xc000417b20 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [cauthdsl] func1 -> DEBU 182f 0xc000417b20 gate 1563590448253612300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1830 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.255 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func1 -> DEBU 1833 0xc00029c6f0 gate 1563590448255311400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1834 0xc00029c6f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1835 0xc00029c6f0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1836 0xc00029c6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1837 0xc00029c6f0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.256 UTC [cauthdsl] func1 -> DEBU 1838 0xc00029c6f0 gate 1563590448255311400 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 1839 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] func1 -> DEBU 183b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.258 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func1 -> DEBU 1841 0xc0001a9070 gate 1563590448258389800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1842 0xc0001a9070 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1843 0xc0001a9070 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-07-20 02:40:48.259 UTC [msp] Validate -> DEBU 1845 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1846 0xc0001a9070 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 43 79 dd b3 45 49 f9 30 dc 8b 58 86 ec 01 dc 4f |Cy..EI.0..X....O| +orderer0.example.com | 00000010 44 eb a3 5f 9c b0 b3 42 ed f8 1f f5 39 9f b5 1f |D.._...B....9...|" +orderer0.example.com | "2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 44 02 20 21 f8 78 31 b1 e9 b0 b5 ac 3c 4d e0 |0D. !.x1.......av.W({*| +orderer0.example.com | 00000030 38 15 f3 3d 0f 71 29 b6 3f 37 8e b2 6c 2f 14 5e |8..=.q).?7..l/.^| +orderer0.example.com | 00000040 13 a1 5c a3 0c cb |..\...|" +orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1849 0xc0001a9070 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:48.261 UTC [cauthdsl] func1 -> DEBU 184a 0xc0001a9070 gate 1563590448258389800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [common.deliver] deliverBlocks -> DEBU 1851 [channel: businesschannel] Received seekInfo (0xc000c51b00) start: > stop: > from 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] Next -> DEBU 1852 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] newBlockfileStream -> DEBU 1853 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1854 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1855 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1856 blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1857 [channel: businesschannel] Delivering block for (0xc000c51b00) for 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1858 [channel: businesschannel] Done delivering to 172.18.0.9:39274 for (0xc000c51b00)" +peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.discovery] sendMemResponse -> DEBU 13be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.577 UTC [gossip.comm] func1 -> DEBU 13c1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.577 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [gossip.pull] HandleMessage -> DEBU 13c3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.pull] SendDigest -> DEBU 13cb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:00.583 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13cd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13d0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 1859 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 185a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185b Waiting for new SeekInfo from 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185c Attempting to read seek info message from 172.18.0.9:39274" +orderer0.example.com | "2019-07-20 02:40:48.268 UTC [common.deliver] Handle -> WARN 185d Error reading from 172.18.0.9:39274: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:48.268 UTC [orderer.common.server] func1 -> DEBU 185e Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:48.270 UTC [comm.grpc.server] 1 -> INFO 185f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39274 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1953ms +orderer0.example.com | "2019-07-20 02:40:48.271 UTC [grpc] infof -> DEBU 1860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:48.393 UTC [orderer.common.server] Deliver -> DEBU 1861 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1862 Starting new deliver loop for 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1863 Attempting to read seek info message from 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.395 UTC [cauthdsl] func1 -> DEBU 1869 0xc000c8c590 gate 1563590448395449600 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.395 UTC [cauthdsl] func2 -> DEBU 186a 0xc000c8c590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186b 0xc000c8c590 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186c 0xc000c8c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186d 0xc000c8c590 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.396 UTC [cauthdsl] func1 -> DEBU 186e 0xc000c8c590 gate 1563590448395449600 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func1 -> DEBU 1872 0xc000c8d110 gate 1563590448397574000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1873 0xc000c8d110 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1874 0xc000c8d110 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1875 0xc000c8d110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c8d110 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [cauthdsl] func1 -> DEBU 1877 0xc000c8d110 gate 1563590448397574000 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 187a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func1 -> DEBU 187b 0xc000c8dac0 gate 1563590448399099800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187c 0xc000c8dac0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187d 0xc000c8dac0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187e 0xc000c8dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.400 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c8dac0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.400 UTC [cauthdsl] func1 -> DEBU 1880 0xc000c8dac0 gate 1563590448399099800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1881 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] func1 -> DEBU 1883 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13d8 0xc003c1dbf0 gate 1563590400585459000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13d9 0xc003c1dbf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13da 0xc003c1dbf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13db 0xc003c1dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003c1dbf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13dd 0xc003c1dbf0 gate 1563590400585459000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func1 -> DEBU 13e1 0xc003de6430 gate 1563590400586238400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e2 0xc003de6430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e3 0xc003de6430 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e4 0xc003de6430 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 86 b9 c7 5f ed e5 be f6 d8 85 e9 e3 f2 09 bd b0 |..._............| +peer0.org1.example.com | 00000010 2f 34 3b 45 e9 01 f4 b7 52 25 1c f6 92 75 21 7f |/4;E....R%...u!.|" +peer0.org1.example.com | "2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 44 02 20 24 c6 14 9d e8 1d 73 3c 83 1a 5e 08 |0D. $.....s<..^.| +peer0.org1.example.com | 00000010 ac 7d f7 5a 94 1a c0 70 a9 5b 20 06 d9 fd ec 3d |.}.Z...p.[ ....=| +peer0.org1.example.com | 00000020 54 30 68 7e 02 20 08 90 da f4 ba 3c 8f 73 53 fa |T0h~. .....<.sS.| +peer0.org1.example.com | 00000030 0e 5b 5b b7 96 90 74 e0 b4 d4 6c 8c 7c d5 ad 4c |.[[...t...l.|..L| +peer0.org1.example.com | 00000040 4b 91 d8 df 33 f5 |K...3.|" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [cauthdsl] func2 -> DEBU 13e7 0xc003de6430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [cauthdsl] func1 -> DEBU 13e8 0xc003de6430 gate 1563590400586238400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13eb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ef updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.discovery] sendMemResponse -> DEBU 13f5 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.588 UTC [gossip.comm] Send -> DEBU 13f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-07-20 02:40:48.402 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func1 -> DEBU 1889 0xc000d6c930 gate 1563590448402309200 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188a 0xc000d6c930 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188b 0xc000d6c930 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188c 0xc000d6c930 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188d Verify: digest = 00000000 76 00 11 52 56 a5 63 2f 81 dc 4f 56 12 a4 66 47 |v..RV.c/..OV..fG| +orderer0.example.com | 00000010 ea 7d 1c 1e 7e 14 7d bb 26 da f2 a4 0f d2 72 3a |.}..~.}.&.....r:|" +peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.discovery] sendMemResponse -> DEBU 13fa Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] Send -> DEBU 13ff Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1404 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1405 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [gossip.comm] func1 -> DEBU 1406 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [gossip.gossip] handleMessage -> DEBU 1407 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.719 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 140b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1411 0xc003e15bd0 gate 1563590400722307300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1412 0xc003e15bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1413 0xc003e15bd0 processing identity 0 with bytes of 114b950" +orderer0.example.com | "2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188e Verify: sig = 00000000 30 45 02 21 00 a6 94 90 ea 98 b6 48 bf f6 1b fb |0E.!.......H....| +orderer0.example.com | 00000010 62 f8 a3 5a ab 34 49 e6 89 d9 46 71 aa 9f f6 65 |b..Z.4I...Fq...e| +orderer0.example.com | 00000020 0e d1 22 4f 6c 02 20 70 f3 4b df 89 d1 e9 f1 da |.."Ol. p.K......| +orderer0.example.com | 00000030 14 5e ee 89 f9 0b ec 0e 8b 97 d6 ff 34 f2 20 a1 |.^..........4. .| +orderer0.example.com | 00000040 af 1d 9c 89 33 ec 95 |....3..|" +orderer0.example.com | "2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188f 0xc000d6c930 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [cauthdsl] func1 -> DEBU 1890 0xc000d6c930 gate 1563590448402309200 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1891 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1892 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1893 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1894 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1895 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.405 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.405 UTC [common.deliver] deliverBlocks -> DEBU 1897 [channel: businesschannel] Received seekInfo (0xc000088d40) start: > stop: > from 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.405 UTC [fsblkstorage] Next -> DEBU 1898 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] newBlockfileStream -> DEBU 1899 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:48.407 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189c blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:48.407 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Delivering block for (0xc000088d40) for 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.408 UTC [common.deliver] deliverBlocks -> DEBU 189e [channel: businesschannel] Done delivering to 172.18.0.9:39276 for (0xc000088d40)" +orderer0.example.com | "2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 189f Waiting for new SeekInfo from 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 18a1 Attempting to read seek info message from 172.18.0.9:39276" +orderer0.example.com | "2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:48.412 UTC [common.deliver] Handle -> WARN 18a3 Error reading from 172.18.0.9:39276: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:48.412 UTC [orderer.common.server] func1 -> DEBU 18a4 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:48.412 UTC [comm.grpc.server] 1 -> INFO 18a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39276 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1313ms +orderer0.example.com | "2019-07-20 02:40:48.413 UTC [grpc] infof -> DEBU 18a6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:48.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18a8 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-07-20 02:40:48.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +orderer0.example.com | "2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18aa Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" +orderer0.example.com | "2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ab Sending msg of 28 bytes to 3 on channel businesschannel took 120.6µs" +orderer0.example.com | "2019-07-20 02:40:48.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.8µs " +orderer0.example.com | "2019-07-20 02:40:48.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18ad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9238ms " +orderer0.example.com | "2019-07-20 02:40:48.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18af Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.849 UTC [orderer.common.server] Deliver -> DEBU 18b0 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b1 Starting new deliver loop for 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b2 Attempting to read seek info message from 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.851 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.853 UTC [policies] Evaluate -> DEBU 18b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.854 UTC [cauthdsl] func1 -> DEBU 18b8 0xc000ff7c50 gate 1563590448854776700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.855 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000ff7c50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18ba 0xc000ff7c50 processing identity 0 with bytes of fd0280" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1414 0xc003e15bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1415 0xc003e15bd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1416 0xc003e15bd0 gate 1563590400722307300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 141a 0xc003e32550 gate 1563590400722785400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141b 0xc003e32550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141c 0xc003e32550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [gossip.comm] func1 -> DEBU 141d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141e 0xc003e32550 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [cauthdsl] func2 -> DEBU 1421 0xc003e32550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.724 UTC [cauthdsl] func1 -> DEBU 1422 0xc003e32550 gate 1563590400722785400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1427 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1428 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1429 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:00.727 UTC [msp.identity] Verify -> DEBU 142a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 142d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bb 0xc000ff7c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bc 0xc000ff7c50 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.857 UTC [cauthdsl] func1 -> DEBU 18bd 0xc000ff7c50 gate 1563590448854776700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.858 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.859 UTC [cauthdsl] func1 -> DEBU 18c1 0xc000bade70 gate 1563590448859499700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000bade70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c3 0xc000bade70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000bade70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000bade70 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.862 UTC [cauthdsl] func1 -> DEBU 18c6 0xc000bade70 gate 1563590448859499700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.862 UTC [policies] Evaluate -> DEBU 18c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.865 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000d5a6b0 gate 1563590448865720200 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000d5a6b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cc 0xc000d5a6b0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cd 0xc000d5a6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18ce 0xc000d5a6b0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.866 UTC [cauthdsl] func1 -> DEBU 18cf 0xc000d5a6b0 gate 1563590448865720200 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] func1 -> DEBU 18d2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d3 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d5b3a0 gate 1563590448868389000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d5b3a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d5b3a0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d5b3a0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dc Verify: digest = 00000000 31 82 70 e0 18 f6 42 43 a0 36 d9 5f 32 fe a1 e1 |1.p...BC.6._2...| +orderer0.example.com | 00000010 8f 05 2b 76 1f 99 e9 8d bb 4f 82 89 3c 22 84 38 |..+v.....O..<".8|" +orderer0.example.com | "2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dd Verify: sig = 00000000 30 44 02 20 5a de 23 c3 fd 33 e3 f3 88 a6 22 89 |0D. Z.#..3....".| +orderer0.example.com | 00000010 4c 2d 66 90 83 7c 65 39 6e 2f 1c 5c 2d 7e 10 33 |L-f..|e9n/.\-~.3| +orderer0.example.com | 00000020 03 44 ec 08 02 20 4b 25 df 2d 2f e6 ab 69 fa 40 |.D... K%.-/..i.@| +orderer0.example.com | 00000030 39 3a 24 68 c5 fc a1 c3 de e8 96 24 ae 93 5d 1b |9:$h.......$..].| +orderer0.example.com | 00000040 17 ba b3 71 53 8a |...qS.|" +orderer0.example.com | "2019-07-20 02:40:48.870 UTC [cauthdsl] func2 -> DEBU 18de 0xc000d5b3a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:48.870 UTC [cauthdsl] func1 -> DEBU 18df 0xc000d5b3a0 gate 1563590448868389000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [common.deliver] deliverBlocks -> DEBU 18e6 [channel: businesschannel] Received seekInfo (0xc000089740) start: > stop: > from 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [fsblkstorage] Next -> DEBU 18e7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:48.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e9 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ea Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ec [channel: businesschannel] Delivering block for (0xc000089740) for 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ed [channel: businesschannel] Done delivering to 172.18.0.9:39278 for (0xc000089740)" +peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1431 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1433 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.pull] Hello -> DEBU 1434 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1435 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1436 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] Send -> DEBU 1437 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1438 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1439 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.738 UTC [gossip.comm] func1 -> DEBU 143a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 143b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.738 UTC [cauthdsl] func1 -> DEBU 143c 0xc003e86d10 gate 1563590400738727800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143e 0xc003e86d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143f 0xc003e86d10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1440 0xc003e86d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1441 0xc003e86d10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [cauthdsl] func1 -> DEBU 1442 0xc003e86d10 gate 1563590400738727800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1443 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func1 -> DEBU 1446 0xc003e87550 gate 1563590400741095900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1447 0xc003e87550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1448 0xc003e87550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1449 0xc003e87550 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:00.743 UTC [cauthdsl] func2 -> DEBU 144c 0xc003e87550 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [cauthdsl] func1 -> DEBU 144d 0xc003e87550 gate 1563590400741095900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.745 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.747 UTC [gossip.gossip] handleMessage -> DEBU 1452 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.748 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1454 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1455 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1456 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1457 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:00.751 UTC [msp] DeserializeIdentity -> DEBU 1458 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.752 UTC [msp] DeserializeIdentity -> DEBU 1459 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ee Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ef Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:48.874 UTC [common.deliver] Handle -> DEBU 18f0 Waiting for new SeekInfo from 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.875 UTC [common.deliver] Handle -> DEBU 18f1 Attempting to read seek info message from 172.18.0.9:39278" +orderer0.example.com | "2019-07-20 02:40:48.880 UTC [grpc] infof -> DEBU 18f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:48.880 UTC [common.deliver] Handle -> WARN 18f2 Error reading from 172.18.0.9:39278: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:48.880 UTC [orderer.common.server] func1 -> DEBU 18f4 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:48.881 UTC [comm.grpc.server] 1 -> INFO 18f5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39278 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.5449ms +orderer0.example.com | "2019-07-20 02:40:48.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:48.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18f7 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2019-07-20 02:40:48.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.6µs " +orderer0.example.com | "2019-07-20 02:40:49.046 UTC [orderer.common.server] Deliver -> DEBU 18f9 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fa Starting new deliver loop for 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fb Attempting to read seek info message from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func1 -> DEBU 1901 0xc001099070 gate 1563590449049272500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1902 0xc001099070 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1903 0xc001099070 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1904 0xc001099070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.050 UTC [cauthdsl] func2 -> DEBU 1905 0xc001099070 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.050 UTC [cauthdsl] func1 -> DEBU 1906 0xc001099070 gate 1563590449049272500 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1907 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.051 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func1 -> DEBU 190a 0xc0010998b0 gate 1563590449051280300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190b 0xc0010998b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190c 0xc0010998b0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190d 0xc0010998b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190e 0xc0010998b0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.052 UTC [cauthdsl] func1 -> DEBU 190f 0xc0010998b0 gate 1563590449051280300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1910 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.053 UTC [cauthdsl] func1 -> DEBU 1913 0xc0011aa0f0 gate 1563590449053843400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1914 0xc0011aa0f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1915 0xc0011aa0f0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1916 0xc0011aa0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1917 0xc0011aa0f0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.054 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011aa0f0 gate 1563590449053843400 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 1919 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] func1 -> DEBU 191b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [cauthdsl] func1 -> DEBU 1921 0xc0011aade0 gate 1563590449056710900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.056 UTC [cauthdsl] func2 -> DEBU 1922 0xc0011aade0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1923 0xc0011aade0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1924 0xc0011aade0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1925 Verify: digest = 00000000 34 6b 9e 1b 7c a1 91 de 2d 1d 2e 67 e6 3a 92 40 |4k..|...-..g.:.@| +orderer0.example.com | 00000010 1e 77 64 63 ea 52 9c 49 ca b2 0f 72 3d dd 69 26 |.wdc.R.I...r=.i&|" +orderer0.example.com | "2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1926 Verify: sig = 00000000 30 44 02 20 71 79 30 fe a8 5b c8 de 4f 05 26 ea |0D. qy0..[..O.&.| +orderer0.example.com | 00000010 d9 78 59 85 f4 7f 27 73 97 ce 18 75 52 a0 36 4e |.xY...'s...uR.6N| +orderer0.example.com | 00000020 2b 4b e7 d7 02 20 09 24 f6 8c 1c 63 9e b4 d3 58 |+K... .$...c...X| +orderer0.example.com | 00000030 f2 f5 92 09 91 ac 7b 02 5e c8 6c 0b 8b 26 bf e0 |......{.^.l..&..| +orderer0.example.com | 00000040 6b 1f 55 fd 57 95 |k.U.W.|" +orderer0.example.com | "2019-07-20 02:40:49.058 UTC [cauthdsl] func2 -> DEBU 1927 0xc0011aade0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.059 UTC [cauthdsl] func1 -> DEBU 1928 0xc0011aade0 gate 1563590449056710900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.059 UTC [policies] Evaluate -> DEBU 1929 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.062 UTC [common.deliver] deliverBlocks -> DEBU 192f [channel: businesschannel] Received seekInfo (0xc000089d40) start: > stop: > from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.062 UTC [fsblkstorage] Next -> DEBU 1930 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.062 UTC [fsblkstorage] newBlockfileStream -> DEBU 1931 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1932 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1933 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:49.064 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1934 blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: businesschannel] Delivering block for (0xc000089d40) for 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1936 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089d40)" +orderer0.example.com | "2019-07-20 02:40:49.065 UTC [fsblkstorage] waitForBlock -> DEBU 1937 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.066 UTC [fsblkstorage] waitForBlock -> DEBU 1938 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 1939 Waiting for new SeekInfo from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 193a Attempting to read seek info message from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.068 UTC [cauthdsl] func1 -> DEBU 1940 0xc0008bc0a0 gate 1563590449068929800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1941 0xc0008bc0a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1942 0xc0008bc0a0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1943 0xc0008bc0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008bc0a0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [cauthdsl] func1 -> DEBU 1945 0xc0008bc0a0 gate 1563590449068929800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1946 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [policies] Evaluate -> DEBU 1948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 1949 0xc0008bc8e0 gate 1563590449070160000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194a 0xc0008bc8e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194b 0xc0008bc8e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194c 0xc0008bc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194d 0xc0008bc8e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 194e 0xc0008bc8e0 gate 1563590449070160000 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 194f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func1 -> DEBU 1952 0xc0008bd120 gate 1563590449071603400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1953 0xc0008bd120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1954 0xc0008bd120 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1955 0xc0008bd120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1956 0xc0008bd120 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [cauthdsl] func1 -> DEBU 1957 0xc0008bd120 gate 1563590449071603400 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.072 UTC [policies] func1 -> DEBU 195a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func1 -> DEBU 1960 0xc0008bde10 gate 1563590449073713400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1961 0xc0008bde10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1962 0xc0008bde10 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.074 UTC [cauthdsl] func2 -> DEBU 1963 0xc0008bde10 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1964 Verify: digest = 00000000 69 c2 20 14 9e bd df 67 ef c6 0e ec 06 ff 4a ea |i. ....g......J.| +orderer0.example.com | 00000010 99 ae 80 c3 73 cd c6 11 95 7f 41 4e 44 c3 49 db |....s.....AND.I.|" +orderer0.example.com | "2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1965 Verify: sig = 00000000 30 44 02 20 70 28 b0 88 ca 7f d9 92 c5 ee 60 3c |0D. p(........`<| +orderer0.example.com | 00000010 7c 7d 73 65 fb ef 23 75 b2 51 72 d0 e3 1e 88 ea ||}se..#u.Qr.....| +orderer0.example.com | 00000020 34 b3 d2 4d 02 20 4c 7f ca d9 a7 9d 44 62 e4 50 |4..M. L.....Db.P| +orderer0.example.com | 00000030 3a 91 d3 6a d7 a1 e4 30 f5 8e 62 b4 ec e2 dc 85 |:..j...0..b.....| +orderer0.example.com | 00000040 e9 56 04 a2 52 d7 |.V..R.|" +orderer0.example.com | "2019-07-20 02:40:49.075 UTC [cauthdsl] func2 -> DEBU 1966 0xc0008bde10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.075 UTC [cauthdsl] func1 -> DEBU 1967 0xc0008bde10 gate 1563590449073713400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.075 UTC [policies] Evaluate -> DEBU 1968 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Received seekInfo (0xc000089f80) start: > stop: > from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [fsblkstorage] Next -> DEBU 196f Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.076 UTC [fsblkstorage] newBlockfileStream -> DEBU 1970 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1971 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1972 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1973 blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.077 UTC [common.deliver] deliverBlocks -> DEBU 1974 [channel: businesschannel] Delivering block for (0xc000089f80) for 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.078 UTC [common.deliver] deliverBlocks -> DEBU 1975 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089f80)" +orderer0.example.com | "2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1976 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.078 UTC [common.deliver] Handle -> DEBU 1977 Waiting for new SeekInfo from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.079 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:39280" +orderer0.example.com | "2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1978 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.085 UTC [common.deliver] Handle -> WARN 197a Error reading from 172.18.0.9:39280: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:49.086 UTC [orderer.common.server] func1 -> DEBU 197b Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:49.086 UTC [comm.grpc.server] 1 -> INFO 197c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.909ms +orderer0.example.com | "2019-07-20 02:40:49.086 UTC [grpc] infof -> DEBU 197d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197e Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +orderer0.example.com | "2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +orderer0.example.com | "2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1982 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.227 UTC [orderer.common.server] Deliver -> DEBU 1984 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1985 Starting new deliver loop for 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1986 Attempting to read seek info message from 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.229 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func1 -> DEBU 198c 0xc000b1a660 gate 1563590449229303900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198d 0xc000b1a660 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198e 0xc000b1a660 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198f 0xc000b1a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.230 UTC [cauthdsl] func2 -> DEBU 1990 0xc000b1a660 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.230 UTC [cauthdsl] func1 -> DEBU 1991 0xc000b1a660 gate 1563590449229303900 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func1 -> DEBU 1995 0xc000b1aea0 gate 1563590449231168100 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1996 0xc000b1aea0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1997 0xc000b1aea0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1998 0xc000b1aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1999 0xc000b1aea0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199a 0xc000b1aea0 gate 1563590449231168100 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199e 0xc000b1b6e0 gate 1563590449232824500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.232 UTC [cauthdsl] func2 -> DEBU 199f 0xc000b1b6e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000b1b6e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000b1b6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000b1b6e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.233 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000b1b6e0 gate 1563590449232824500 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.233 UTC [policies] Evaluate -> DEBU 19a4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] func1 -> DEBU 19a6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a7 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 145a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [policies] Evaluate -> DEBU 145f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func1 -> DEBU 1460 0xc003f4be10 gate 1563590400757245300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1461 0xc003f4be10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1462 0xc003f4be10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1463 0xc003f4be10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [cauthdsl] func2 -> DEBU 1464 0xc003f4be10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [cauthdsl] func1 -> DEBU 1465 0xc003f4be10 gate 1563590400757245300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [policies] Evaluate -> DEBU 1468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [cauthdsl] func1 -> DEBU 1469 0xc003f7c6b0 gate 1563590400759673900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.759 UTC [cauthdsl] func2 -> DEBU 146a 0xc003f7c6b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146b 0xc003f7c6b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146c 0xc003f7c6b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [cauthdsl] func2 -> DEBU 146f 0xc003f7c6b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [cauthdsl] func1 -> DEBU 1470 0xc003f7c6b0 gate 1563590400759673900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1473 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1475 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1476 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000bf03d0 gate 1563590449235502300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000bf03d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000bf03d0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19af 0xc000bf03d0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 82 c0 89 76 a5 fb 20 65 67 01 37 2f b9 6b 34 26 |...v.. eg.7/.k4&| +orderer0.example.com | 00000010 cf 0d 30 1c ea 6c d5 67 19 7b 6e b3 f4 a3 a6 fd |..0..l.g.{n.....|" +orderer0.example.com | "2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 87 0b bd 80 5a 66 e5 87 b0 b5 de |0E.!.....Zf.....| +orderer0.example.com | 00000010 95 3a 3c c0 19 6e f9 1e d9 00 9c df ca ab 34 75 |.:<..n........4u| +orderer0.example.com | 00000020 95 51 8d 93 6a 02 20 44 80 f3 85 2b ba 00 e1 8a |.Q..j. D...+....| +orderer0.example.com | 00000030 59 83 1d 31 c4 76 e2 8a 78 f7 32 2e b5 91 83 5e |Y..1.v..x.2....^| +orderer0.example.com | 00000040 1a 63 0b 11 6b ca 49 |.c..k.I|" +orderer0.example.com | "2019-07-20 02:40:49.237 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000bf03d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.237 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000bf03d0 gate 1563590449235502300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc000ce2840) start: > stop: > from 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.238 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[118787], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [23944] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.239 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block for (0xc000ce2840) for 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.240 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:39282 for (0xc000ce2840)" +orderer0.example.com | "2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c2 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c4 Waiting for new SeekInfo from 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c5 Attempting to read seek info message from 172.18.0.9:39282" +orderer0.example.com | "2019-07-20 02:40:49.247 UTC [common.deliver] Handle -> WARN 19c6 Error reading from 172.18.0.9:39282: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:49.247 UTC [orderer.common.server] func1 -> DEBU 19c7 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:49.247 UTC [comm.grpc.server] 1 -> INFO 19c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3933ms +orderer0.example.com | "2019-07-20 02:40:49.247 UTC [grpc] infof -> DEBU 19c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:49.395 UTC [orderer.common.server] Deliver -> DEBU 19ca Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cb Starting new deliver loop for 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cc Attempting to read seek info message from 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func1 -> DEBU 19d2 0xc001108980 gate 1563590449398077800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d3 0xc001108980 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d4 0xc001108980 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d5 0xc001108980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func2 -> DEBU 19d6 0xc001108980 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19d7 0xc001108980 gate 1563590449398077800 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19db 0xc0011091c0 gate 1563590449399961700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dc 0xc0011091c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dd 0xc0011091c0 processing identity 0 with bytes of fd0280" +peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1477 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1478 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1479 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.763 UTC [policies] Evaluate -> DEBU 147a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.764 UTC [cauthdsl] func1 -> DEBU 147d 0xc003f7de80 gate 1563590400764851600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147e 0xc003f7de80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147f 0xc003f7de80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1480 0xc003f7de80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1481 0xc003f7de80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.765 UTC [cauthdsl] func1 -> DEBU 1482 0xc003f7de80 gate 1563590400764851600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1483 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1484 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1485 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [cauthdsl] func1 -> DEBU 1486 0xc003fc46c0 gate 1563590400766587500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.766 UTC [cauthdsl] func2 -> DEBU 1487 0xc003fc46c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1488 0xc003fc46c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1489 0xc003fc46c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [cauthdsl] func2 -> DEBU 148c 0xc003fc46c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [cauthdsl] func1 -> DEBU 148d 0xc003fc46c0 gate 1563590400766587500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 1490 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [policies] Evaluate -> DEBU 1491 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1492 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1493 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.pull] HandleMessage -> DEBU 1494 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1495 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1496 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.770 UTC [msp] DeserializeIdentity -> DEBU 1497 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1498 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1499 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 149a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.772 UTC [cauthdsl] func1 -> DEBU 14a0 0xc003fe90c0 gate 1563590400772916400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003fe90c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a2 0xc003fe90c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a3 0xc003fe90c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a4 0xc003fe90c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.773 UTC [cauthdsl] func1 -> DEBU 14a5 0xc003fe90c0 gate 1563590400772916400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.774 UTC [cauthdsl] func1 -> DEBU 14a9 0xc003fe9900 gate 1563590400774755500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14aa 0xc003fe9900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ab 0xc003fe9900 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ac 0xc003fe9900 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ad Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ae Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [cauthdsl] func2 -> DEBU 14af 0xc003fe9900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [cauthdsl] func1 -> DEBU 14b0 0xc003fe9900 gate 1563590400774755500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.776 UTC [policies] Evaluate -> DEBU 14b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.777 UTC [msp.identity] Verify -> DEBU 14b5 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp.identity] Verify -> DEBU 14b6 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19de 0xc0011091c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19df 0xc0011091c0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.401 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0011091c0 gate 1563590449399961700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func1 -> DEBU 19e4 0xc001109a00 gate 1563590449401966900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e5 0xc001109a00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e6 0xc001109a00 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e7 0xc001109a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e8 0xc001109a00 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.403 UTC [cauthdsl] func1 -> DEBU 19e9 0xc001109a00 gate 1563590449401966900 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.403 UTC [policies] Evaluate -> DEBU 19ea Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] func1 -> DEBU 19ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ed Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func1 -> DEBU 19f2 0xc000de86f0 gate 1563590449405439300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000de86f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f4 0xc000de86f0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.406 UTC [cauthdsl] func2 -> DEBU 19f5 0xc000de86f0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 8d ef c8 38 dd 25 ee e3 8f e1 10 8f 37 05 1b 07 |...8.%......7...| +orderer0.example.com | 00000010 3a 8c f0 8f a3 05 c2 78 05 48 e8 c1 65 36 9c 6a |:......x.H..e6.j|" +orderer0.example.com | "2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 45 02 21 00 e1 d5 0c 44 50 2f 63 e1 b1 b8 2c |0E.!....DP/c...,| +orderer0.example.com | 00000010 03 a3 c2 a9 8f 29 b6 9d 8c 70 5f 06 42 0c ce 40 |.....)...p_.B..@| +orderer0.example.com | 00000020 66 94 91 e5 43 02 20 20 7f d5 e0 d1 c9 db f2 ef |f...C. ........| +orderer0.example.com | 00000030 28 3e ef a7 08 4a 58 9d cb 54 da bc 4f a7 5e bd |(>...JX..T..O.^.| +orderer0.example.com | 00000040 02 79 a1 1c e7 ca 73 |.y....s|" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000de86f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [cauthdsl] func1 -> DEBU 19f9 0xc000de86f0 gate 1563590449405439300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.407 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: businesschannel] Received seekInfo (0xc000ce2f80) start: > stop: > from 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[94840], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +orderer0.example.com | "2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [23690] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: businesschannel] Delivering block for (0xc000ce2f80) for 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: businesschannel] Done delivering to 172.18.0.9:39284 for (0xc000ce2f80)" +orderer0.example.com | "2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a08 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a09 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.409 UTC [common.deliver] Handle -> DEBU 1a0a Waiting for new SeekInfo from 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.410 UTC [common.deliver] Handle -> DEBU 1a0b Attempting to read seek info message from 172.18.0.9:39284" +orderer0.example.com | "2019-07-20 02:40:49.419 UTC [common.deliver] Handle -> WARN 1a0c Error reading from 172.18.0.9:39284: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:49.419 UTC [orderer.common.server] func1 -> DEBU 1a0e Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:49.419 UTC [grpc] infof -> DEBU 1a0d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:49.419 UTC [comm.grpc.server] 1 -> INFO 1a0f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39284 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9813ms +orderer0.example.com | "2019-07-20 02:40:49.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a11 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" +orderer0.example.com | "2019-07-20 02:40:49.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.5µs " +orderer0.example.com | "2019-07-20 02:40:49.651 UTC [orderer.common.server] Deliver -> DEBU 1a13 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a14 Starting new deliver loop for 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a15 Attempting to read seek info message from 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.652 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.656 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc001146f40 gate 1563590449656634100 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.656 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc001146f40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc001146f40 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc001146f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc001146f40 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.658 UTC [cauthdsl] func1 -> DEBU 1a20 0xc001146f40 gate 1563590449656634100 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.660 UTC [cauthdsl] func1 -> DEBU 1a24 0xc001147780 gate 1563590449660258300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.660 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001147780 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.661 UTC [cauthdsl] func2 -> DEBU 1a26 0xc001147780 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a27 0xc001147780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a28 0xc001147780 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.663 UTC [cauthdsl] func1 -> DEBU 1a29 0xc001147780 gate 1563590449660258300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.665 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.665 UTC [cauthdsl] func1 -> DEBU 1a2d 0xc001147fd0 gate 1563590449665747900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.665 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001147fd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc001147fd0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a30 0xc001147fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a31 0xc001147fd0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.667 UTC [cauthdsl] func1 -> DEBU 1a32 0xc001147fd0 gate 1563590449665747900 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.667 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.668 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.668 UTC [policies] func1 -> DEBU 1a35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.669 UTC [policies] Evaluate -> DEBU 1a36 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.671 UTC [policies] Evaluate -> DEBU 1a39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.672 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.673 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000ad15d0 gate 1563590449673204500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.673 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000ad15d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.674 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000ad15d0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.675 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000ad15d0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a3f Verify: digest = 00000000 6d fd 64 01 29 73 26 c6 8d 78 12 e5 8a 88 92 c4 |m.d.)s&..x......| +orderer0.example.com | 00000010 38 2f 37 72 0e ec 09 0e 08 8a e7 4f be e3 3c e5 |8/7r.......O..<.|" +orderer0.example.com | "2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a40 Verify: sig = 00000000 30 45 02 21 00 c4 23 85 66 3b 16 a3 d1 d7 66 d9 |0E.!..#.f;....f.| +orderer0.example.com | 00000010 55 74 3a 88 0a bc 26 58 b2 c5 82 ae 0e 1a 37 90 |Ut:...&X......7.| +orderer0.example.com | 00000020 4d f1 5f 36 66 02 20 2f 8d 67 0b 81 bf a2 1f 9d |M._6f. /.g......| +orderer0.example.com | 00000030 4c f3 4a 40 63 da db 0e 77 9e f5 c1 94 40 e6 f3 |L.J@c...w....@..| +peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14bb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.780 UTC [cauthdsl] func1 -> DEBU 14bf 0xc003f94080 gate 1563590400780667200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003f94080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003f94080 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c2 0xc003f94080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c3 0xc003f94080 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.781 UTC [cauthdsl] func1 -> DEBU 14c4 0xc003f94080 gate 1563590400780667200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003f948c0 gate 1563590400782561100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003f948c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003f948c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003f948c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003f948c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003f948c0 gate 1563590400782561100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d4 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d5 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +orderer0.example.com | 00000040 64 14 8a e7 6f 9b 49 |d...o.I|" +orderer0.example.com | "2019-07-20 02:40:49.676 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000ad15d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.677 UTC [cauthdsl] func1 -> DEBU 1a42 0xc000ad15d0 gate 1563590449673204500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a43 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a44 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.679 UTC [policies] Evaluate -> DEBU 1a45 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.680 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.682 UTC [common.deliver] deliverBlocks -> DEBU 1a49 [channel: businesschannel] Received seekInfo (0xc000ce3680) start: > stop: > from 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.682 UTC [fsblkstorage] Next -> DEBU 1a4a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.682 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a4b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +orderer0.example.com | "2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4c Remaining bytes=[71147], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4d Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +orderer0.example.com | "2019-07-20 02:40:49.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4e blockbytes [23747] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.684 UTC [common.deliver] deliverBlocks -> DEBU 1a4f [channel: businesschannel] Delivering block for (0xc000ce3680) for 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.690 UTC [common.deliver] deliverBlocks -> DEBU 1a50 [channel: businesschannel] Done delivering to 172.18.0.9:39286 for (0xc000ce3680)" +orderer0.example.com | "2019-07-20 02:40:49.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 2 on channel businesschannel took 73.4µs" +orderer0.example.com | "2019-07-20 02:40:49.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 3 on channel businesschannel took 84.1µs" +orderer0.example.com | "2019-07-20 02:40:49.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +orderer0.example.com | "2019-07-20 02:40:49.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.8µs " +orderer0.example.com | "2019-07-20 02:40:49.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a57 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a58 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a59 Waiting for new SeekInfo from 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a5a Attempting to read seek info message from 172.18.0.9:39286" +orderer0.example.com | "2019-07-20 02:40:49.709 UTC [common.deliver] Handle -> WARN 1a5b Error reading from 172.18.0.9:39286: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:49.710 UTC [orderer.common.server] func1 -> DEBU 1a5c Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:49.710 UTC [comm.grpc.server] 1 -> INFO 1a5d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39286 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=59.4656ms +orderer0.example.com | "2019-07-20 02:40:49.712 UTC [grpc] infof -> DEBU 1a5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:49.887 UTC [orderer.common.server] Deliver -> DEBU 1a5f Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a60 Starting new deliver loop for 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a61 Attempting to read seek info message from 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.890 UTC [policies] Evaluate -> DEBU 1a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.890 UTC [cauthdsl] func1 -> DEBU 1a67 0xc001089ef0 gate 1563590449890604200 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.890 UTC [cauthdsl] func2 -> DEBU 1a68 0xc001089ef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a69 0xc001089ef0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc001089ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc001089ef0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.891 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc001089ef0 gate 1563590449890604200 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.892 UTC [cauthdsl] func1 -> DEBU 1a70 0xc000cd2730 gate 1563590449892826700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000cd2730 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a72 0xc000cd2730 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a73 0xc000cd2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000cd2730 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.893 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000cd2730 gate 1563590449892826700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.894 UTC [cauthdsl] func1 -> DEBU 1a79 0xc000cd2f70 gate 1563590449894533500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.894 UTC [cauthdsl] func2 -> DEBU 1a7a 0xc000cd2f70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc000cd2f70 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc000cd2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:49.896 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc000cd2f70 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.896 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000cd2f70 gate 1563590449894533500 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a7f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] func1 -> DEBU 1a81 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a82 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:49.898 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000cd3c60 gate 1563590449898398500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000cd3c60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000cd3c60 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000cd3c60 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8b Verify: digest = 00000000 cc 24 52 2f d6 08 62 09 9d 80 87 87 59 45 d1 ee |.$R/..b.....YE..| +orderer0.example.com | 00000010 c3 65 25 c7 5d 0d 9d e3 54 97 82 53 a7 80 1c b7 |.e%.]...T..S....|" +orderer0.example.com | "2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8c Verify: sig = 00000000 30 44 02 20 2d 84 b8 36 d3 99 0b c7 07 a0 82 e8 |0D. -..6........| +orderer0.example.com | 00000010 0f ba f1 08 99 d4 29 b7 60 14 25 e1 d7 4e 44 fc |......).`.%..ND.| +orderer0.example.com | 00000020 df ca 36 b9 02 20 2b 9b 61 70 ea 2c 52 08 65 03 |..6.. +.ap.,R.e.| +orderer0.example.com | 00000030 03 5f 46 e8 ed 09 37 dd 46 cb 66 0d 43 62 9f 72 |._F...7.F.f.Cb.r| +orderer0.example.com | 00000040 cf dc 1d d9 9c 61 |.....a|" +orderer0.example.com | "2019-07-20 02:40:49.900 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000cd3c60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:49.900 UTC [cauthdsl] func1 -> DEBU 1a8e 0xc000cd3c60 gate 1563590449898398500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a91 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a93 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [common.deliver] deliverBlocks -> DEBU 1a95 [channel: businesschannel] Received seekInfo (0xc0011d4100) start: > stop: > from 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] Next -> DEBU 1a96 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a97 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a98 Remaining bytes=[47397], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a99 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +orderer0.example.com | "2019-07-20 02:40:49.902 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a9a blockbytes [4527] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9b [channel: businesschannel] Delivering block for (0xc0011d4100) for 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9c [channel: businesschannel] Done delivering to 172.18.0.9:39288 for (0xc0011d4100)" +orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9d Waiting for new SeekInfo from 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9e Attempting to read seek info message from 172.18.0.9:39288" +orderer0.example.com | "2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1a9f Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1aa0 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:49.911 UTC [common.deliver] Handle -> WARN 1aa1 Error reading from 172.18.0.9:39288: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:49.911 UTC [orderer.common.server] func1 -> DEBU 1aa2 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:49.912 UTC [comm.grpc.server] 1 -> INFO 1aa3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39288 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.309ms +orderer0.example.com | "2019-07-20 02:40:49.912 UTC [grpc] infof -> DEBU 1aa4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:49.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:49.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa6 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-07-20 02:40:49.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +orderer0.example.com | "2019-07-20 02:40:50.087 UTC [orderer.common.server] Deliver -> DEBU 1aa8 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aa9 Starting new deliver loop for 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aaa Attempting to read seek info message from 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.090 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0012c81e0 gate 1563590450090542200 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.090 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0012c81e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0012c81e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0012c81e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.092 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0012c81e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.092 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc0012c81e0 gate 1563590450090542200 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.092 UTC [policies] Evaluate -> DEBU 1ab6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func1 -> DEBU 1ab9 0xc0012c8a20 gate 1563590450093382300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0012c8a20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0012c8a20 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abc 0xc0012c8a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.094 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0012c8a20 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.094 UTC [cauthdsl] func1 -> DEBU 1abe 0xc0012c8a20 gate 1563590450093382300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.094 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.095 UTC [cauthdsl] func1 -> DEBU 1ac2 0xc0012c9260 gate 1563590450095879300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc0012c9260 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012c9260 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012c9260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.097 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012c9260 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.097 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0012c9260 gate 1563590450095879300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] func1 -> DEBU 1aca Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acb Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1ace This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.099 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc0012c9f50 gate 1563590450099718300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.099 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc0012c9f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc0012c9f50 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc0012c9f50 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.100 UTC [msp.identity] Verify -> DEBU 1ad4 Verify: digest = 00000000 32 b0 1f 4e 4f 77 71 8c 45 cf a1 1a db 81 73 9b |2..NOwq.E.....s.| +orderer0.example.com | 00000010 14 26 fa 8f a0 33 a0 d5 a4 aa 21 20 77 f3 cb fb |.&...3....! w...|" +orderer0.example.com | "2019-07-20 02:40:50.101 UTC [msp.identity] Verify -> DEBU 1ad5 Verify: sig = 00000000 30 45 02 21 00 fe 90 97 76 f4 f4 19 51 c7 be 69 |0E.!....v...Q..i| +orderer0.example.com | 00000010 b1 0e ae c8 cc ba 84 29 c4 52 79 92 6c ff 4d d1 |.......).Ry.l.M.| +orderer0.example.com | 00000020 7c 21 72 25 8c 02 20 7f 29 7a 69 a3 f6 3e 0b ae ||!r%.. .)zi..>..| +orderer0.example.com | 00000030 8a 5d 38 a7 5b b5 46 02 ea ac 96 62 97 00 96 82 |.]8.[.F....b....| +orderer0.example.com | 00000040 4c 11 ff 0c 60 0d d4 |L...`..|" +orderer0.example.com | "2019-07-20 02:40:50.102 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc0012c9f50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.102 UTC [cauthdsl] func1 -> DEBU 1ad7 0xc0012c9f50 gate 1563590450099718300 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1ada Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.103 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Received seekInfo (0xc0011d52c0) start: > stop: > from 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] Next -> DEBU 1adf Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ae0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" +orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae1 Remaining bytes=[42868], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae2 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +orderer0.example.com | "2019-07-20 02:40:50.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae3 blockbytes [3992] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae4 [channel: businesschannel] Delivering block for (0xc0011d52c0) for 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae5 [channel: businesschannel] Done delivering to 172.18.0.9:39290 for (0xc0011d52c0)" +orderer0.example.com | "2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae6 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae8 Waiting for new SeekInfo from 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae9 Attempting to read seek info message from 172.18.0.9:39290" +orderer0.example.com | "2019-07-20 02:40:50.114 UTC [common.deliver] Handle -> WARN 1aea Error reading from 172.18.0.9:39290: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.114 UTC [orderer.common.server] func1 -> DEBU 1aeb Closing Deliver stream" +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:00.783 UTC [gossip.gossip] handleMessage -> DEBU 14d6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.comm] func1 -> DEBU 14d7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14d8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14d9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14da Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14db Exiting" +peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.comm] func1 -> DEBU 14dc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.gossip] handleMessage -> DEBU 14dd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:00.894 UTC [gossip.pull] HandleMessage -> DEBU 14de GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-07-20 02:40:50.114 UTC [comm.grpc.server] 1 -> INFO 1aec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39290 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1555ms +orderer0.example.com | "2019-07-20 02:40:50.115 UTC [grpc] infof -> DEBU 1aed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aee Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aef Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-07-20 02:40:50.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " +orderer0.example.com | "2019-07-20 02:40:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.8µs " +orderer0.example.com | "2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.242 UTC [orderer.common.server] Deliver -> DEBU 1af4 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af5 Starting new deliver loop for 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af6 Attempting to read seek info message from 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.245 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.245 UTC [cauthdsl] func1 -> DEBU 1afc 0xc00116c710 gate 1563590450245746300 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00116c710 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00116c710 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00116c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.247 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00116c710 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.247 UTC [cauthdsl] func1 -> DEBU 1b01 0xc00116c710 gate 1563590450245746300 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func1 -> DEBU 1b05 0xc00116cf50 gate 1563590450249209100 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b06 0xc00116cf50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:00.895 UTC [gossip.pull] SendDigest -> DEBU 14df Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:00.895 UTC [gossip.gossip] handleMessage -> DEBU 14e0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.043 UTC [gossip.comm] func1 -> DEBU 14e1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.044 UTC [gossip.gossip] handleMessage -> DEBU 14e2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.044 UTC [msp] DeserializeIdentity -> DEBU 14e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.046 UTC [gossip.gossip] handleMessage -> DEBU 14e6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.182 UTC [gossip.comm] func1 -> DEBU 14e7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [gossip.gossip] handleMessage -> DEBU 14e8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14ea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.184 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.184 UTC [gossip.gossip] handleMessage -> DEBU 14ec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [gossip.election] waitForInterrupt -> DEBU 14ed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [gossip.election] IsLeader -> DEBU 14ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [msp] GetDefaultSigningIdentity -> DEBU 14ef Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:01.752 UTC [msp.identity] Sign -> DEBU 14f0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510051801 " +peer0.org1.example.com | "2019-07-20 02:40:01.753 UTC [msp.identity] Sign -> DEBU 14f1 Sign: digest: E591A4CF9EA32E358DCA63E1CA940EE9984AD1C9CC3264A0DA2FF9495EA9026B " +peer0.org1.example.com | "2019-07-20 02:40:01.753 UTC [gossip.election] waitForInterrupt -> DEBU 14f2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:01.759 UTC [msp] DeserializeIdentity -> DEBU 14f3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.761 UTC [gossip.comm] Send -> DEBU 14f7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.comm] func1 -> DEBU 14fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1500 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:01.918 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b07 0xc00116cf50 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b08 0xc00116cf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.250 UTC [cauthdsl] func2 -> DEBU 1b09 0xc00116cf50 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.251 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc00116cf50 gate 1563590450249209100 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.251 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.252 UTC [cauthdsl] func1 -> DEBU 1b0e 0xc00116d790 gate 1563590450252617400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.252 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc00116d790 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b10 0xc00116d790 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b11 0xc00116d790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b12 0xc00116d790 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.253 UTC [cauthdsl] func1 -> DEBU 1b13 0xc00116d790 gate 1563590450252617400 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b14 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.254 UTC [policies] func1 -> DEBU 1b16 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b17 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.256 UTC [policies] Evaluate -> DEBU 1b1b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func1 -> DEBU 1b1c 0xc00117c480 gate 1563590450256362000 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc00117c480 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc00117c480 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.257 UTC [cauthdsl] func2 -> DEBU 1b1f 0xc00117c480 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.257 UTC [msp.identity] Verify -> DEBU 1b20 Verify: digest = 00000000 ad 6d 6e 6f fb 90 19 a4 92 1d 11 87 3f 22 bc a5 |.mno........?"..| +orderer0.example.com | 00000010 da cd cf 6c e4 3c 34 dc fa 7b 28 ce 6c 77 a0 49 |...l.<4..{(.lw.I|" +orderer0.example.com | "2019-07-20 02:40:50.258 UTC [msp.identity] Verify -> DEBU 1b21 Verify: sig = 00000000 30 45 02 21 00 b1 59 d2 0e 97 76 c6 47 00 47 38 |0E.!..Y...v.G.G8| +orderer0.example.com | 00000010 0a d5 e3 9e 61 ef 45 09 c4 7a fb 0d 57 1e 04 84 |....a.E..z..W...| +orderer0.example.com | 00000020 32 7a 3f 5d 34 02 20 0f d3 a3 bd 1e a2 e6 0b 9b |2z?]4. .........| +orderer0.example.com | 00000030 65 ea 40 ae 08 d8 7c d5 0e b7 6c 7e 92 7b cb 08 |e.@...|...l~.{..| +orderer0.example.com | 00000040 fc 9e 2e 0b d2 ff fe |.......|" +orderer0.example.com | "2019-07-20 02:40:50.258 UTC [cauthdsl] func2 -> DEBU 1b22 0xc00117c480 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.259 UTC [cauthdsl] func1 -> DEBU 1b23 0xc00117c480 gate 1563590450256362000 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b24 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b26 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b28 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.261 UTC [common.deliver] deliverBlocks -> DEBU 1b2a [channel: businesschannel] Received seekInfo (0xc0011d57c0) start: > stop: > from 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] Next -> DEBU 1b2b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b2c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2d Remaining bytes=[38874], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2e Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +orderer0.example.com | "2019-07-20 02:40:50.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2f blockbytes [3989] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b30 [channel: businesschannel] Delivering block for (0xc0011d57c0) for 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b31 [channel: businesschannel] Done delivering to 172.18.0.9:39292 for (0xc0011d57c0)" +orderer0.example.com | "2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b32 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b33 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:50.263 UTC [common.deliver] Handle -> DEBU 1b34 Waiting for new SeekInfo from 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.264 UTC [common.deliver] Handle -> DEBU 1b35 Attempting to read seek info message from 172.18.0.9:39292" +orderer0.example.com | "2019-07-20 02:40:50.268 UTC [common.deliver] Handle -> WARN 1b36 Error reading from 172.18.0.9:39292: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.269 UTC [orderer.common.server] func1 -> DEBU 1b37 Closing Deliver stream" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func1 -> DEBU 1508 0xc0029ef890 gate 1563590401919773100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 1509 0xc0029ef890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 150a 0xc0029ef890 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150b 0xc0029ef890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150c 0xc0029ef890 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 150d 0xc0029ef890 gate 1563590401919773100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1511 0xc0032980d0 gate 1563590401920244600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1512 0xc0032980d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1513 0xc0032980d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1514 0xc0032980d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1515 Verify: digest = 00000000 01 6e a2 f4 56 9e 32 2d 9f 4d 9e 02 c5 6d e9 28 |.n..V.2-.M...m.(| +peer0.org1.example.com | 00000010 82 4c 1a 7d a9 37 3b a0 a1 d0 24 8e 58 10 7e 72 |.L.}.7;...$.X.~r|" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1516 Verify: sig = 00000000 30 45 02 21 00 ae 66 68 23 a1 f5 68 b8 52 0a 95 |0E.!..fh#..h.R..| +peer0.org1.example.com | 00000010 38 01 2f 29 74 0a ec cf 66 5c b3 e2 e4 4a 07 b6 |8./)t...f\...J..| +peer0.org1.example.com | 00000020 83 43 09 a6 8b 02 20 24 4b 00 91 b7 55 5a 4f fd |.C.... $K...UZO.| +peer0.org1.example.com | 00000030 b0 04 1f d7 42 9d 48 c6 53 0c 2e 60 c7 b9 42 8d |....B.H.S..`..B.| +peer0.org1.example.com | 00000040 60 b0 80 44 f4 c2 73 |`..D..s|" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1517 0xc0032980d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1518 0xc0032980d0 gate 1563590401920244600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1519 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 151a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 151d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151f updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1520 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1521 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1522 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 1523 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1524 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1525 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1526 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1527 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1529 Obtaining identity" +orderer0.example.com | "2019-07-20 02:40:50.269 UTC [comm.grpc.server] 1 -> INFO 1b38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39292 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0425ms +orderer0.example.com | "2019-07-20 02:40:50.270 UTC [grpc] infof -> DEBU 1b39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.424 UTC [orderer.common.server] Deliver -> DEBU 1b3a Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3b Starting new deliver loop for 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3c Attempting to read seek info message from 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.424 UTC [policies] Evaluate -> DEBU 1b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.425 UTC [cauthdsl] func1 -> DEBU 1b42 0xc000c8cf80 gate 1563590450425970900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000c8cf80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b44 0xc000c8cf80 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000c8cf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000c8cf80 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000c8cf80 gate 1563590450425970900 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc000c8d870 gate 1563590450427863700 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.428 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc000c8d870 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc000c8d870 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc000c8d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.430 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc000c8d870 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.430 UTC [cauthdsl] func1 -> DEBU 1b50 0xc000c8d870 gate 1563590450427863700 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func1 -> DEBU 1b54 0xc0002664e0 gate 1563590450431281500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0002664e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0002664e0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b57 0xc0002664e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b58 0xc0002664e0 principal evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.432 UTC [cauthdsl] func1 -> DEBU 1b59 0xc0002664e0 gate 1563590450431281500 evaluation fails" +orderer0.example.com | "2019-07-20 02:40:50.432 UTC [policies] Evaluate -> DEBU 1b5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] func1 -> DEBU 1b5c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000267480 gate 1563590450436160900 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000267480 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b64 0xc000267480 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b65 0xc000267480 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b66 Verify: digest = 00000000 ba d9 a9 0b b2 e1 ef 9e e4 d8 a4 81 20 d2 5f 9a |............ ._.| +orderer0.example.com | 00000010 7a ec 35 c6 f3 41 58 f0 8f 89 6e c2 da 51 22 17 |z.5..AX...n..Q".|" +orderer0.example.com | "2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b67 Verify: sig = 00000000 30 45 02 21 00 bd 6d c8 49 f3 f8 36 2d cd 65 b6 |0E.!..m.I..6-.e.| +orderer0.example.com | 00000010 f3 cf 80 28 9d a4 fb 93 4a d0 da 3c c8 18 c9 33 |...(....J..<...3| +orderer0.example.com | 00000020 7e c4 1c 3c 28 02 20 29 7b cc f8 2f f9 c8 e4 0d |~..<(. ){../....| +orderer0.example.com | 00000030 13 bd de 1c 1c c1 4d ea ad 83 a6 aa 2e 29 7d 6b |......M......)}k| +orderer0.example.com | 00000040 25 11 ec 4a 56 ff 9e |%..JV..|" +orderer0.example.com | "2019-07-20 02:40:50.437 UTC [cauthdsl] func2 -> DEBU 1b68 0xc000267480 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.437 UTC [cauthdsl] func1 -> DEBU 1b69 0xc000267480 gate 1563590450436160900 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Received seekInfo (0xc000b09180) start: > stop: > from 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [fsblkstorage] Next -> DEBU 1b71 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-07-20 02:40:50.440 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b72 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 Remaining bytes=[34883], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b74 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +orderer0.example.com | "2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b75 blockbytes [34880] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b76 [channel: businesschannel] Delivering block for (0xc000b09180) for 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b77 [channel: businesschannel] Done delivering to 172.18.0.9:39294 for (0xc000b09180)" +orderer0.example.com | "2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b78 Waiting for new SeekInfo from 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b79 Attempting to read seek info message from 172.18.0.9:39294" +orderer0.example.com | "2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-07-20 02:40:50.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.443 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2019-07-20 02:40:50.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-07-20 02:40:50.450 UTC [grpc] infof -> DEBU 1b7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.452 UTC [common.deliver] Handle -> WARN 1b80 Error reading from 172.18.0.9:39294: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.453 UTC [orderer.common.server] func1 -> DEBU 1b81 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:50.454 UTC [comm.grpc.server] 1 -> INFO 1b82 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39294 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.2687ms +orderer0.example.com | "2019-07-20 02:40:50.598 UTC [orderer.common.server] Deliver -> DEBU 1b83 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b84 Starting new deliver loop for 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b85 Attempting to read seek info message from 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func1 -> DEBU 1b8b 0xc000416ad0 gate 1563590450601392800 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc000416ad0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc000416ad0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc000416ad0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b8f Verify: digest = 00000000 18 75 b6 fe 13 b8 0d a3 28 ca 3a 8e 58 a0 8f 5d |.u......(.:.X..]| +orderer0.example.com | 00000010 cf 0a a1 93 8d 44 2a 8d 85 57 7d c7 0b 3f 79 70 |.....D*..W}..?yp|" +orderer0.example.com | "2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b90 Verify: sig = 00000000 30 44 02 20 5b 5f 71 aa fc cf 80 3b db ae e2 b2 |0D. [_q....;....| +orderer0.example.com | 00000010 68 8b a1 8c 4a 99 0a f9 48 80 d5 15 3e 2e 4f 84 |h...J...H...>.O.| +orderer0.example.com | 00000020 86 aa d1 a0 02 20 34 b6 2b ff 5f 55 74 08 13 e6 |..... 4.+._Ut...| +orderer0.example.com | 00000030 8d f1 eb a0 e8 83 e1 fe 7c 3f 35 02 ab 30 ef 55 |........|?5..0.U| +orderer0.example.com | 00000040 66 88 19 a7 b8 d9 |f.....|" +orderer0.example.com | "2019-07-20 02:40:50.602 UTC [cauthdsl] func2 -> DEBU 1b91 0xc000416ad0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.603 UTC [cauthdsl] func1 -> DEBU 1b92 0xc000416ad0 gate 1563590450601392800 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b95 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b97 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.604 UTC [common.deliver] deliverBlocks -> DEBU 1b99 [channel: testchainid] Received seekInfo (0xc000986440) start: > stop: > from 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] Next -> DEBU 1b9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 152a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.922 UTC [gossip.comm] Send -> DEBU 152b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] Send -> DEBU 152e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 152f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1530 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1531 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.924 UTC [gossip.comm] sendToEndpoint -> DEBU 1532 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.927 UTC [gossip.comm] func1 -> DEBU 1533 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1534 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1535 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1536 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1537 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.comm] func1 -> DEBU 1538 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 1539 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 153d Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151017 " +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153f Sign: digest: 52DA398D25C6952AA335AE471E2837386B978F542632A147D2426BCCA07AF961 " +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1540 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1541 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1542 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:02.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1543 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1544 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1546 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 1547 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [msp] DeserializeIdentity -> DEBU 1548 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 154a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1549 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] Send -> DEBU 154b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:50.605 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9c Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9e blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.606 UTC [common.deliver] deliverBlocks -> DEBU 1b9f [channel: testchainid] Delivering block for (0xc000986440) for 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.607 UTC [common.deliver] deliverBlocks -> DEBU 1ba0 [channel: testchainid] Done delivering to 172.18.0.9:39296 for (0xc000986440)" +orderer0.example.com | "2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba1 Waiting for new SeekInfo from 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba2 Attempting to read seek info message from 172.18.0.9:39296" +orderer0.example.com | "2019-07-20 02:40:50.612 UTC [grpc] warningf -> DEBU 1ba3 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39296: read: connection reset by peer" +orderer0.example.com | "2019-07-20 02:40:50.613 UTC [common.deliver] Handle -> WARN 1ba4 Error reading from 172.18.0.9:39296: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.613 UTC [orderer.common.server] func1 -> DEBU 1ba5 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:50.613 UTC [comm.grpc.server] 1 -> INFO 1ba6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0914ms +orderer0.example.com | "2019-07-20 02:40:50.614 UTC [grpc] infof -> DEBU 1ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.1µs " +orderer0.example.com | "2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.5µs " +orderer0.example.com | "2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.737 UTC [orderer.common.server] Deliver -> DEBU 1bae Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1baf Starting new deliver loop for 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1bb0 Attempting to read seek info message from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000c72da0 gate 1563590450739121400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000c72da0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000c72da0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000c72da0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.739 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 0a 85 05 b7 b3 00 17 04 99 c7 db af d2 c3 fa 54 |...............T| +orderer0.example.com | 00000010 fb e6 80 c8 ad 25 fd 29 1b 75 cd 1f 1a 28 6b 5c |.....%.).u...(k\|" +orderer0.example.com | "2019-07-20 02:40:50.740 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 44 02 20 76 30 8c 8a 34 aa cc 19 da a5 39 84 |0D. v0..4.....9.| +orderer0.example.com | 00000010 6f b6 91 5d 30 19 1c e3 79 62 1d b3 c8 4f 17 fe |o..]0...yb...O..| +orderer0.example.com | 00000020 bd 35 7f a0 02 20 3e 11 e1 63 74 50 df e6 34 0a |.5... >..ctP..4.| +orderer0.example.com | 00000030 28 7f 32 7f ee 06 3b 84 5e 93 73 d7 11 bd da 30 |(.2...;.^.s....0| +orderer0.example.com | 00000040 2c 92 62 a0 ec bc |,.b...|" +orderer0.example.com | "2019-07-20 02:40:50.740 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000c72da0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.740 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000c72da0 gate 1563590450739121400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.742 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.742 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: testchainid] Received seekInfo (0xc000b09b40) start: > stop: > from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.742 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:50.742 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.743 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: testchainid] Delivering block for (0xc000b09b40) for 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.744 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000b09b40)" +orderer0.example.com | "2019-07-20 02:40:50.744 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.745 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.747 UTC [policies] Evaluate -> DEBU 1bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc000bad5a0 gate 1563590450749082200 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc000bad5a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc000bad5a0 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000bad5a0 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.749 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 24 51 1f a6 fb 56 50 01 c8 df 3b 5d b8 cd bc 4a |$Q...VP...;]...J| +orderer0.example.com | 00000010 39 ed 4d b5 2d ef 5f 2f 5c 7f 3e 53 e0 d5 57 40 |9.M.-._/\.>S..W@|" +orderer0.example.com | "2019-07-20 02:40:50.750 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 45 02 21 00 f6 d1 cd 4c cc bc 03 bc 7d 3b 55 |0E.!....L....};U| +orderer0.example.com | 00000010 04 a9 aa 70 45 43 74 f5 8a 5e af 01 fa 0e 60 4e |...pECt..^....`N| +orderer0.example.com | 00000020 d3 bc c0 90 c7 02 20 2d d3 23 31 73 65 16 d9 6d |...... -.#1se..m| +orderer0.example.com | 00000030 f6 da 22 90 64 ee d6 00 b2 bf 3b 9f 6b 12 59 73 |..".d.....;.k.Ys| +orderer0.example.com | 00000040 97 36 5e 6c 8e fb 12 |.6^l...|" +orderer0.example.com | "2019-07-20 02:40:50.750 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000bad5a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.750 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000bad5a0 gate 1563590450749082200 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.750 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1be0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.752 UTC [common.deliver] deliverBlocks -> DEBU 1be1 [channel: testchainid] Received seekInfo (0xc000986b00) start: > stop: > from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] Next -> DEBU 1be2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] newBlockfileStream -> DEBU 1be3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be4 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:50.753 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be6 blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be7 [channel: testchainid] Delivering block for (0xc000986b00) for 172.18.0.9:39298" +peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 154f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1550 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.364 UTC [gossip.comm] func1 -> DEBU 1551 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.364 UTC [gossip.gossip] handleMessage -> DEBU 1552 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.gossip] handleMessage -> DEBU 1553 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1554 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1555 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1556 Verify: digest = 00000000 12 ed 66 37 d8 7d 6d 4a af f4 3b c5 b5 74 a3 82 |..f7.}mJ..;..t..| +peer0.org1.example.com | 00000010 a4 55 75 f0 db 21 d1 0a 5c ed 2f 80 93 fb 4d 92 |.Uu..!..\./...M.|" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1557 Verify: sig = 00000000 30 44 02 20 55 29 6a d6 d7 c4 9a 7a 22 63 cb 7c |0D. U)j....z"c.|| +peer0.org1.example.com | 00000010 4c 8e 6a 15 40 46 b6 56 87 cb 42 22 ef 19 fa 5d |L.j.@F.V..B"...]| +peer0.org1.example.com | 00000020 ec a2 10 6b 02 20 32 94 4a 8d f1 90 5b e8 6c 72 |...k. 2.J...[.lr| +peer0.org1.example.com | 00000030 18 3b 32 78 3d db e9 e2 44 4c 4c bc 78 f0 f3 4d |.;2x=...DLL.x..M| +peer0.org1.example.com | 00000040 a4 ba 04 56 60 f2 |...V`.|" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 1558 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 1559 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 155e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 155f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1560 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1561 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1562 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1563 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1564 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1565 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1569 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.comm] func1 -> DEBU 156a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be8 [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000986b00)" +orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1be9 Waiting for new SeekInfo from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1bea Attempting to read seek info message from 172.18.0.9:39298" +orderer0.example.com | "2019-07-20 02:40:50.761 UTC [common.deliver] Handle -> WARN 1beb Error reading from 172.18.0.9:39298: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.761 UTC [orderer.common.server] func1 -> DEBU 1bec Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:50.761 UTC [comm.grpc.server] 1 -> INFO 1bed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39298 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7807ms +orderer0.example.com | "2019-07-20 02:40:50.762 UTC [grpc] infof -> DEBU 1bee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.852 UTC [orderer.common.server] Deliver -> DEBU 1bef Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf0 Starting new deliver loop for 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf1 Attempting to read seek info message from 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc0001c8150 gate 1563590450854258500 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0001c8150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0001c8150 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0001c8150 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:50.854 UTC [msp.identity] Verify -> DEBU 1bfb Verify: digest = 00000000 5f 0c 1b 58 f8 c4 de 8f 3c ff 81 9e cb f7 02 e0 |_..X....<.......| +orderer0.example.com | 00000010 72 2e bd 2a 6e 32 fe 5a 5a 13 92 3c 69 3f 43 26 |r..*n2.ZZ.. DEBU 1bfc Verify: sig = 00000000 30 45 02 21 00 a4 ea 63 e2 8a c8 03 41 c9 75 59 |0E.!...c....A.uY| +orderer0.example.com | 00000010 dc 1c df 93 8b 21 60 2c f7 37 e1 df ae b8 e4 52 |.....!`,.7.....R| +orderer0.example.com | 00000020 8a f4 c7 ba 44 02 20 7a 7c 9d 5b 85 fa d6 86 57 |....D. z|.[....W| +orderer0.example.com | 00000030 0f 89 8e c0 86 35 4d 32 04 29 5d 28 3b 7c f4 06 |.....5M2.)](;|..| +orderer0.example.com | 00000040 71 52 90 03 1d 86 9b |qR.....|" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0001c8150 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc0001c8150 gate 1563590450854258500 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c03 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [policies] Evaluate -> DEBU 1c04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [common.deliver] deliverBlocks -> DEBU 1c05 [channel: testchainid] Received seekInfo (0xc000ce2280) start: > stop: > from 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] Next -> DEBU 1c06 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 Remaining bytes=[44254], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c09 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-07-20 02:40:50.857 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c0a blockbytes [18416] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:50.857 UTC [common.deliver] deliverBlocks -> DEBU 1c0b [channel: testchainid] Delivering block for (0xc000ce2280) for 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] deliverBlocks -> DEBU 1c0c [channel: testchainid] Done delivering to 172.18.0.9:39300 for (0xc000ce2280)" +orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.9:39300" +orderer0.example.com | "2019-07-20 02:40:50.866 UTC [common.deliver] Handle -> WARN 1c0f Error reading from 172.18.0.9:39300: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:50.866 UTC [orderer.common.server] func1 -> DEBU 1c10 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:50.866 UTC [comm.grpc.server] 1 -> INFO 1c11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39300 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8498ms +orderer0.example.com | "2019-07-20 02:40:50.867 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:50.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c13 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:50.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c14 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-07-20 02:40:50.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +orderer0.example.com | "2019-07-20 02:40:51.035 UTC [orderer.common.server] Deliver -> DEBU 1c16 Starting new Deliver handler" +orderer0.example.com | "2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c17 Starting new deliver loop for 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c18 Attempting to read seek info message from 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc000373230 gate 1563590451037212400 evaluation starts" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc000373230 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c20 0xc000373230 processing identity 0 with bytes of fd0280" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000373230 principal matched by identity 0" +orderer0.example.com | "2019-07-20 02:40:51.037 UTC [msp.identity] Verify -> DEBU 1c22 Verify: digest = 00000000 ec 0b 12 ab db e7 5a c0 3b 3a 4e 1d 14 80 ee 96 |......Z.;:N.....| +orderer0.example.com | 00000010 ec c8 cd 83 92 dd 48 1f a3 8f f4 e2 62 c9 83 30 |......H.....b..0|" +orderer0.example.com | "2019-07-20 02:40:51.038 UTC [msp.identity] Verify -> DEBU 1c23 Verify: sig = 00000000 30 45 02 21 00 cf ad e9 8e 60 13 07 9a cb 59 40 |0E.!.....`....Y@| +orderer0.example.com | 00000010 ce 5a 42 f8 df 96 f6 5f b3 a6 76 32 77 dd 56 db |.ZB...._..v2w.V.| +orderer0.example.com | 00000020 ac 94 17 4c 1b 02 20 1e 45 13 53 e0 a6 7e 1d 55 |...L.. .E.S..~.U| +orderer0.example.com | 00000030 65 3d 08 38 dd 63 ff b1 e8 a3 1a 7c 58 52 1a 25 |e=.8.c.....|XR.%| +orderer0.example.com | 00000040 14 16 ee 56 dc fd 44 |...V..D|" +orderer0.example.com | "2019-07-20 02:40:51.038 UTC [cauthdsl] func2 -> DEBU 1c24 0xc000373230 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-07-20 02:40:51.038 UTC [cauthdsl] func1 -> DEBU 1c25 0xc000373230 gate 1563590451037212400 evaluation succeeds" +orderer0.example.com | "2019-07-20 02:40:51.038 UTC [policies] Evaluate -> DEBU 1c26 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.comm] func1 -> DEBU 156f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1570 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1571 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1573 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.comm] func1 -> DEBU 1574 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1575 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1576 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1578 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func1 -> DEBU 1580 0xc00350b830 gate 1563590402547835300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1581 0xc00350b830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1582 0xc00350b830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1583 0xc00350b830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:51.040 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-07-20 02:40:51.040 UTC [common.deliver] deliverBlocks -> DEBU 1c2c [channel: testchainid] Received seekInfo (0xc000ce2c40) start: > stop: > from 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.041 UTC [fsblkstorage] Next -> DEBU 1c2d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-07-20 02:40:51.041 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c2e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c2f Remaining bytes=[25835], Going to peek [8] bytes" +orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c30 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +orderer0.example.com | "2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c31 blockbytes [25832] read from file [0]" +orderer0.example.com | "2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c32 [channel: testchainid] Delivering block for (0xc000ce2c40) for 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c33 [channel: testchainid] Done delivering to 172.18.0.9:39302 for (0xc000ce2c40)" +orderer0.example.com | "2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c34 Waiting for new SeekInfo from 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c35 Attempting to read seek info message from 172.18.0.9:39302" +orderer0.example.com | "2019-07-20 02:40:51.050 UTC [common.deliver] Handle -> WARN 1c36 Error reading from 172.18.0.9:39302: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-07-20 02:40:51.050 UTC [orderer.common.server] func1 -> DEBU 1c37 Closing Deliver stream" +orderer0.example.com | "2019-07-20 02:40:51.051 UTC [comm.grpc.server] 1 -> INFO 1c38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39302 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9191ms +orderer0.example.com | "2019-07-20 02:40:51.052 UTC [grpc] infof -> DEBU 1c39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " +orderer0.example.com | "2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " +orderer0.example.com | "2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c41 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2019-07-20 02:40:51.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.1µs " +orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +orderer0.example.com | "2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +orderer0.example.com | "2019-07-20 02:40:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c47 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4a Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +orderer0.example.com | "2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4c Sending msg of 28 bytes to 2 on channel businesschannel took 36.4µs" +orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-07-20 02:40:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.2µs " +orderer0.example.com | "2019-07-20 02:40:52.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3487ms " +orderer0.example.com | "2019-07-20 02:40:52.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c50 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1584 0xc00350b830 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1585 0xc00350b830 gate 1563590402547835300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1589 0xc0036da070 gate 1563590402548125100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158a 0xc0036da070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158b 0xc0036da070 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158c 0xc0036da070 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 d6 76 c2 ed a9 5d aa 5d 9f 67 c5 7e 78 4f be 32 |.v...].].g.~xO.2| +peer0.org1.example.com | 00000010 55 06 f7 08 6d fc ce 81 17 8b 24 37 0e 6a 35 2b |U...m.....$7.j5+|" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 87 a0 1c 2d c8 14 12 6c 23 2e fb |0E.!....-...l#..| +peer0.org1.example.com | 00000010 88 f7 be 3d b8 e4 ce df 25 55 26 31 97 5b 85 91 |...=....%U&1.[..| +peer0.org1.example.com | 00000020 8d 2c 57 61 ee 02 20 72 cc c4 a2 95 38 a3 ca d1 |.,Wa.. r....8...| +peer0.org1.example.com | 00000030 df c2 50 9d 3b 01 f7 f3 9f 82 90 1a 72 57 89 80 |..P.;.......rW..| +peer0.org1.example.com | 00000040 24 92 e5 d3 b9 72 a6 |$....r.|" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158f 0xc0036da070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1590 0xc0036da070 gate 1563590402548125100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1595 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1596 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1597 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1598 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1599 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 159a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 159b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.555 UTC [msp] DeserializeIdentity -> DEBU 159d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.comm] func1 -> DEBU 15ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-07-20 02:40:52.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c51 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:52.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:52.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c53 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-07-20 02:40:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.5µs " +orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c55 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-07-20 02:40:52.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.8µs " +orderer0.example.com | "2019-07-20 02:40:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.8µs " +orderer0.example.com | "2019-07-20 02:40:52.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c59 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:52.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:52.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:52.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5c Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +orderer0.example.com | "2019-07-20 02:40:52.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " +orderer0.example.com | "2019-07-20 02:40:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5e Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +orderer0.example.com | "2019-07-20 02:40:53.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-07-20 02:40:53.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.4µs " +orderer0.example.com | "2019-07-20 02:40:53.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c61 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5291ms " +orderer0.example.com | "2019-07-20 02:40:53.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c64 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 3 on channel testchainid took 740µs" +orderer0.example.com | "2019-07-20 02:40:53.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +orderer0.example.com | "2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c67 Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" +orderer0.example.com | "2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +orderer0.example.com | "2019-07-20 02:40:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 225µs " +orderer0.example.com | "2019-07-20 02:40:53.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.8µs " +orderer0.example.com | "2019-07-20 02:40:53.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6e Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +orderer0.example.com | "2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " +orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c70 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " +orderer0.example.com | "2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +orderer0.example.com | "2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c74 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c75 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c77 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.8µs " +orderer0.example.com | "2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " +orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c83 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " +orderer0.example.com | "2019-07-20 02:40:55.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c89 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8c Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +orderer0.example.com | "2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +orderer0.example.com | "2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:55.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c92 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2019-07-20 02:40:55.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " +orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c94 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c95 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.7µs " +orderer0.example.com | "2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.1µs " +orderer0.example.com | "2019-07-20 02:40:56.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2019-07-20 02:40:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9d Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" +orderer0.example.com | "2019-07-20 02:40:56.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9e Sending msg of 28 bytes to 3 on channel businesschannel took 47.3µs" +orderer0.example.com | "2019-07-20 02:40:56.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.9µs " +orderer0.example.com | "2019-07-20 02:40:56.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " +orderer0.example.com | "2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca4 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.9µs " +orderer0.example.com | "2019-07-20 02:40:57.197 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-07-20 02:40:57.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.3µs " +orderer0.example.com | "2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.4µs " +orderer0.example.com | "2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cab Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cad Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2019-07-20 02:40:57.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +orderer0.example.com | "2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " +orderer0.example.com | "2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb6 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +orderer0.example.com | "2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 61.8µs" +orderer0.example.com | "2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +orderer0.example.com | "2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192µs " +orderer0.example.com | "2019-07-20 02:40:58.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbf Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" +orderer0.example.com | "2019-07-20 02:40:58.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.1µs " +orderer0.example.com | "2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +orderer0.example.com | "2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-07-20 02:40:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +orderer0.example.com | "2019-07-20 02:40:58.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 535.4µs " +orderer0.example.com | "2019-07-20 02:40:58.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:58.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-07-20 02:40:58.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3711ms " +orderer0.example.com | "2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +orderer0.example.com | "2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " +orderer0.example.com | "2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +orderer0.example.com | "2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ccf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +orderer0.example.com | "2019-07-20 02:40:59.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +orderer0.example.com | "2019-07-20 02:40:59.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-07-20 02:40:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3069ms " +orderer0.example.com | "2019-07-20 02:40:59.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:40:59.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cda Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2019-07-20 02:40:59.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0973ms " +orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdd Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-07-20 02:41:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2019-07-20 02:41:00.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.5µs " +orderer0.example.com | "2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +orderer0.example.com | "2019-07-20 02:41:00.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 156.7µs" +orderer0.example.com | "2019-07-20 02:41:00.660 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 279.6µs " +orderer0.example.com | "2019-07-20 02:41:00.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.8µs " +orderer0.example.com | "2019-07-20 02:41:00.662 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 769.5µs" +orderer0.example.com | "2019-07-20 02:41:00.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:00.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cec Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-07-20 02:41:00.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.032ms " +orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cef Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" +orderer0.example.com | "2019-07-20 02:41:01.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +orderer0.example.com | "2019-07-20 02:41:01.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.7µs " +orderer0.example.com | "2019-07-20 02:41:01.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf5 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2019-07-20 02:41:01.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " +orderer0.example.com | "2019-07-20 02:41:01.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " +orderer0.example.com | "2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:01.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfe Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2019-07-20 02:41:01.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +orderer0.example.com | "2019-07-20 02:41:02.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " +orderer0.example.com | "2019-07-20 02:41:02.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " +orderer0.example.com | "2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d04 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d05 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d07 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +orderer0.example.com | "2019-07-20 02:41:02.404 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.7µs " +orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d09 Sending msg of 28 bytes to 2 on channel businesschannel took 65.9µs" +orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0a Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.4µs " +orderer0.example.com | "2019-07-20 02:41:02.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93µs " +orderer0.example.com | "2019-07-20 02:41:02.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:02.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d10 Sending msg of 28 bytes to 3 on channel testchainid took 262.6µs" +orderer0.example.com | "2019-07-20 02:41:02.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 355.9µs " +orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d12 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2019-07-20 02:41:03.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.1µs " +orderer0.example.com | "2019-07-20 02:41:03.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.7µs " +orderer0.example.com | "2019-07-20 02:41:03.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d16 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d17 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.404 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d19 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" +orderer0.example.com | "2019-07-20 02:41:03.405 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395µs " +orderer0.example.com | "2019-07-20 02:41:03.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-07-20 02:41:03.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-07-20 02:41:03.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-07-20 02:41:03.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.5µs " +orderer0.example.com | "2019-07-20 02:41:03.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d22 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-07-20 02:41:03.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.3µs " +peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ac Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ad Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.comm] func1 -> DEBU 15b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.914 UTC [gossip.comm] func1 -> DEBU 15b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.914 UTC [gossip.gossip] handleMessage -> DEBU 15b6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.915 UTC [gossip.gossip] handleMessage -> DEBU 15b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b9 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [cauthdsl] func1 -> DEBU 15c1 0xc0037e93a0 gate 1563590403917788500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:03.917 UTC [cauthdsl] func2 -> DEBU 15c2 0xc0037e93a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c3 0xc0037e93a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c4 0xc0037e93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c5 0xc0037e93a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15c6 0xc0037e93a0 gate 1563590403917788500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15ca 0xc0037e9be0 gate 1563590403918507600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cb 0xc0037e9be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cc 0xc0037e9be0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0037e9be0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| +peer0.org1.example.com | 00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" +peer0.org1.example.com | "2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| +peer0.org1.example.com | 00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| +peer0.org1.example.com | 00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| +peer0.org1.example.com | 00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| +peer0.org1.example.com | 00000040 c0 28 b6 d6 5d 37 |.(..]7|" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0037e9be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0037e9be0 gate 1563590403918507600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d8 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15da Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15db Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15dd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15de Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] Send -> DEBU 15e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15e3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\033" signature:"0D\002 U)j\326\327\304\232z\"c\313|L\216j\025@F\266V\207\313B\"\357\031\372]\354\242\020k\002 2\224J\215\361\220[\350lr\030;2x=\333\351\342DLL\274x\360\363M\244\272\004V`\362" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.comm] func1 -> DEBU 15e6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.gossip] handleMessage -> DEBU 15e7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [gossip.pull] HandleMessage -> DEBU 15e8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15eb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ec Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:03.924 UTC [gossip.pull] SendDigest -> DEBU 15ef Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:03.924 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.gossip] handleMessage -> DEBU 1600 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fe Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15ff Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.pull] HandleMessage -> DEBU 1601 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1603 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.pull] HandleMessage -> DEBU 1604 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1605 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1606 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.246 UTC [gossip.pull] HandleMessage -> DEBU 1607 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.246 UTC [gossip.gossip] handleMessage -> DEBU 1608 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1609 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151018 " +peer0.org1.example.com | "2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160b Sign: digest: 93D1F13605203EFCFEF67678C6420F3747E27FD1936093D97526EA62CD9AE28D " +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 160c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 160f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1611 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1613 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1614 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1615 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 161a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 161b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 161c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161d Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161e Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 161f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] isSentByMe -> DEBU 1620 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1622 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [msp] DeserializeIdentity -> DEBU 1623 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1625 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1626 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1627 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1628 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1629 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162a 0xc003e0ba00 gate 1563590404281511600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162b 0xc003e0ba00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162c 0xc003e0ba00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162d 0xc003e0ba00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162e 0xc003e0ba00 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162f 0xc003e0ba00 gate 1563590404281511600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1630 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1631 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 1633 0xc003f84240 gate 1563590404281840000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1634 0xc003f84240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1635 0xc003f84240 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1636 0xc003f84240 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1637 Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| +peer0.org1.example.com | 00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1638 Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| +peer0.org1.example.com | 00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| +peer0.org1.example.com | 00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| +peer0.org1.example.com | 00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| +peer0.org1.example.com | 00000040 c0 28 b6 d6 5d 37 |.(..]7|" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1639 0xc003f84240 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [cauthdsl] func1 -> DEBU 163a 0xc003f84240 gate 1563590404281840000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 163f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1640 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1641 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.comm] func1 -> DEBU 1642 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1643 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1644 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1646 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1647 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1648 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" +peer0.org1.example.com | "2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1649 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] isSentByMe -> DEBU 164a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 164b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.280 UTC [gossip.comm] sendToEndpoint -> DEBU 164d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.284 UTC [gossip.comm] sendToEndpoint -> DEBU 164e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.comm] func1 -> DEBU 164f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1650 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1651 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1652 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1653 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +peer0.org1.example.com | 00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +peer0.org1.example.com | "2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +peer0.org1.example.com | 00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +peer0.org1.example.com | 00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +peer0.org1.example.com | 00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +peer0.org1.example.com | 00000040 5a b2 a9 7e 27 67 |Z..~'g|" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1656 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1657 Verify: sig = 00000000 30 45 02 21 00 c1 8e d2 c4 0a a7 e6 72 3d a6 38 |0E.!........r=.8| +peer0.org1.example.com | 00000010 0f ed 4d f7 c8 ec bd 0a 7f 2d 0e 1f 54 d9 70 6e |..M......-..T.pn| +peer0.org1.example.com | 00000020 76 b4 c6 ca 9b 02 20 0d c8 ac 59 5e 61 b8 a8 d2 |v..... ...Y^a...| +peer0.org1.example.com | 00000030 d5 11 5d f8 4a c1 95 66 ba 70 72 58 ce 1d 8c 1e |..].J..f.prX....| +peer0.org1.example.com | 00000040 26 8a bc 78 94 f0 33 |&..x..3|" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 1658 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] isSentByMe -> DEBU 1659 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 165a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.comm] func1 -> DEBU 165c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 165d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.pull] HandleMessage -> DEBU 165e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.pull] SendDigest -> DEBU 165f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 1660 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.363 UTC [gossip.comm] func1 -> DEBU 1661 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.364 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.365 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1664 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1665 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.366 UTC [msp.identity] Verify -> DEBU 1666 Verify: digest = 00000000 30 9c 61 33 0d 39 d2 88 0b 7d 64 96 99 e0 6f 00 |0.a3.9...}d...o.| +peer0.org1.example.com | 00000010 a6 8d 29 70 ab 8e a8 ef d6 2f d8 b6 8b 78 a4 ac |..)p...../...x..|" +peer0.org1.example.com | "2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1667 Verify: sig = 00000000 30 44 02 20 66 67 dc 1d 84 59 fd 04 16 c6 d1 2a |0D. fg...Y.....*| +peer0.org1.example.com | 00000010 56 a8 c8 ec f2 6b 9d f0 c1 44 a3 35 1f 7e be 31 |V....k...D.5.~.1| +peer0.org1.example.com | 00000020 87 c0 51 9c 02 20 69 67 b6 4d 54 b7 80 c8 00 48 |..Q.. ig.MT....H| +peer0.org1.example.com | 00000030 87 18 f4 2a 54 93 fb cf a2 9d 1d ee a2 47 cd 75 |...*T........G.u| +peer0.org1.example.com | 00000040 d7 40 36 01 9e 5d |.@6..]|" +peer0.org1.example.com | "2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1668 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:04.369 UTC [msp.identity] Verify -> DEBU 1669 Verify: sig = 00000000 30 45 02 21 00 d7 a7 57 78 82 88 75 6e 35 1a 0b |0E.!...Wx..un5..| +peer0.org1.example.com | 00000010 ce 35 8a 83 35 96 a8 d0 ca f2 f0 70 9f 21 0b 28 |.5..5......p.!.(| +peer0.org1.example.com | 00000020 03 ca 0b 36 18 02 20 61 8a 8b 77 39 f4 77 9c 86 |...6.. a..w9.w..| +peer0.org1.example.com | 00000030 09 f2 3c a7 e0 5f 73 56 4c 38 99 d1 b7 25 d0 6a |..<.._sVL8...%.j| +peer0.org1.example.com | 00000040 93 11 2e 59 e1 fa e1 |...Y...|" +peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 166a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 1670 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [gossip.discovery] sendMemResponse -> DEBU 1672 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1673 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.comm] Send -> DEBU 1675 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.discovery] sendMemResponse -> DEBU 1676 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:04.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.374 UTC [gossip.comm] sendToEndpoint -> DEBU 1678 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.comm] func1 -> DEBU 1679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 167a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.pull] HandleMessage -> DEBU 167b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1680 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.pull] SendDigest -> DEBU 1682 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 1683 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.547 UTC [gossip.comm] func1 -> DEBU 1684 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1685 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1686 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1687 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1688 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 168a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [policies] Evaluate -> DEBU 168f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [cauthdsl] func1 -> DEBU 1690 0xc0030b0240 gate 1563590404551482900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.551 UTC [cauthdsl] func2 -> DEBU 1691 0xc0030b0240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1692 0xc0030b0240 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1693 0xc0030b0240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1694 0xc0030b0240 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.552 UTC [cauthdsl] func1 -> DEBU 1695 0xc0030b0240 gate 1563590404551482900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1696 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1697 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.553 UTC [cauthdsl] func1 -> DEBU 1699 0xc0030b0a80 gate 1563590404553822100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169a 0xc0030b0a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169b 0xc0030b0a80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169c 0xc0030b0a80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 9a 13 10 4b 51 eb b5 b0 d6 3e 7e d2 f8 2c 85 f6 |...KQ....>~..,..| +peer0.org1.example.com | 00000010 c2 e2 82 51 f4 47 c9 85 c8 16 41 f8 c6 cf 4f 52 |...Q.G....A...OR|" +peer0.org1.example.com | "2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 49 d9 c5 d5 a7 f6 d5 1c ea ec 58 44 |0D. I.........XD| +peer0.org1.example.com | 00000010 d8 21 7c 49 ea cc ab d9 3d 7b 34 06 c3 87 6f e9 |.!|I....={4...o.| +peer0.org1.example.com | 00000020 a7 24 6a 4d 02 20 7e e0 73 cb 60 73 7b 79 03 58 |.$jM. ~.s.`s{y.X| +peer0.org1.example.com | 00000030 b7 8d fd d8 62 61 30 cb 2d d1 76 bb 03 a6 27 77 |....ba0.-.v...'w| +peer0.org1.example.com | 00000040 ea 97 9e 04 9f af |......|" +peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [cauthdsl] func2 -> DEBU 169f 0xc0030b0a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [cauthdsl] func1 -> DEBU 16a0 0xc0030b0a80 gate 1563590404553822100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.557 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a7 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16ac Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [gossip.discovery] sendMemResponse -> DEBU 16ad Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:04.559 UTC [msp] DeserializeIdentity -> DEBU 16ae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16b0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.comm] Send -> DEBU 16b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.discovery] sendMemResponse -> DEBU 16b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:04.560 UTC [gossip.comm] sendToEndpoint -> DEBU 16b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 16b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] Send -> DEBU 16b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16ba Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [gossip.gossip] handleMessage -> DEBU 16c0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [msp] DeserializeIdentity -> DEBU 16c2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.720 UTC [gossip.comm] func1 -> DEBU 16c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16bf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.722 UTC [policies] Evaluate -> DEBU 16c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.723 UTC [cauthdsl] func1 -> DEBU 16cb 0xc00333b930 gate 1563590404723377000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cc 0xc00333b930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cd 0xc00333b930 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16ce 0xc00333b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16cf 0xc00333b930 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [cauthdsl] func1 -> DEBU 16d0 0xc00333b930 gate 1563590404723377000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func1 -> DEBU 16d4 0xc0033ec170 gate 1563590404729020200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d5 0xc0033ec170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0033ec170 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0033ec170 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.729 UTC [msp.identity] Verify -> DEBU 16d8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [msp.identity] Verify -> DEBU 16d9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [cauthdsl] func2 -> DEBU 16da 0xc0033ec170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [cauthdsl] func1 -> DEBU 16db 0xc0033ec170 gate 1563590404729020200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.730 UTC [policies] Evaluate -> DEBU 16dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16de Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e0 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e1 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.733 UTC [gossip.pull] Hello -> DEBU 16e4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] Send -> DEBU 16e7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.735 UTC [gossip.comm] func1 -> DEBU 16ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.735 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:04.736 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:04.737 UTC [msp] DeserializeIdentity -> DEBU 16ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [msp] DeserializeIdentity -> DEBU 16ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.739 UTC [policies] Evaluate -> DEBU 16f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func1 -> DEBU 16f5 0xc003976780 gate 1563590404741004700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f6 0xc003976780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f7 0xc003976780 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f8 0xc003976780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [cauthdsl] func2 -> DEBU 16f9 0xc003976780 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [cauthdsl] func1 -> DEBU 16fa 0xc003976780 gate 1563590404741004700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.742 UTC [policies] Evaluate -> DEBU 16fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func1 -> DEBU 16fe 0xc003976fc0 gate 1563590404743984100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 16ff 0xc003976fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 1700 0xc003976fc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.745 UTC [cauthdsl] func2 -> DEBU 1701 0xc003976fc0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.745 UTC [msp.identity] Verify -> DEBU 1702 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:04.746 UTC [msp.identity] Verify -> DEBU 1703 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [cauthdsl] func2 -> DEBU 1704 0xc003976fc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [cauthdsl] func1 -> DEBU 1705 0xc003976fc0 gate 1563590404743984100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.747 UTC [policies] Evaluate -> DEBU 1706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1708 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.748 UTC [gossip.gossip] handleMessage -> DEBU 170a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [gossip.gossip] handleMessage -> DEBU 170b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.750 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 170f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1711 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.753 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1713 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1714 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func1 -> DEBU 1715 0xc003a36ad0 gate 1563590404754449500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1716 0xc003a36ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1717 0xc003a36ad0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1718 0xc003a36ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1719 0xc003a36ad0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [cauthdsl] func1 -> DEBU 171a 0xc003a36ad0 gate 1563590404754449500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func1 -> DEBU 171e 0xc003a37310 gate 1563590404756180200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 171f 0xc003a37310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1720 0xc003a37310 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1721 0xc003a37310 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.757 UTC [msp.identity] Verify -> DEBU 1722 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [msp.identity] Verify -> DEBU 1723 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [cauthdsl] func2 -> DEBU 1724 0xc003a37310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [cauthdsl] func1 -> DEBU 1725 0xc003a37310 gate 1563590404756180200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.758 UTC [policies] Evaluate -> DEBU 1726 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 172e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 172f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1730 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1731 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1732 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [policies] Evaluate -> DEBU 1733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func1 -> DEBU 1734 0xc003a81200 gate 1563590404762213800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1735 0xc003a81200 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1736 0xc003a81200 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1737 0xc003a81200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [cauthdsl] func2 -> DEBU 1738 0xc003a81200 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [cauthdsl] func1 -> DEBU 1739 0xc003a81200 gate 1563590404762213800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func1 -> DEBU 173d 0xc003a81a40 gate 1563590404764229700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173e 0xc003a81a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173f 0xc003a81a40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 1740 0xc003a81a40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1741 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1742 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:04.766 UTC [cauthdsl] func2 -> DEBU 1743 0xc003a81a40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [cauthdsl] func1 -> DEBU 1744 0xc003a81a40 gate 1563590404764229700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1745 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1746 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1747 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.768 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174d Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174f Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp.identity] Verify -> DEBU 1750 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1754 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1755 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.773 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.774 UTC [policies] Evaluate -> DEBU 1757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [policies] Evaluate -> DEBU 1758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [cauthdsl] func1 -> DEBU 1759 0xc003dfe9b0 gate 1563590404775612700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.775 UTC [cauthdsl] func2 -> DEBU 175a 0xc003dfe9b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175b 0xc003dfe9b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175c 0xc003dfe9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175d 0xc003dfe9b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 175e 0xc003dfe9b0 gate 1563590404775612700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 175f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 1762 0xc003dff1f0 gate 1563590404777929000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1763 0xc003dff1f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1764 0xc003dff1f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1765 0xc003dff1f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.778 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [cauthdsl] func2 -> DEBU 1768 0xc003dff1f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [cauthdsl] func1 -> DEBU 1769 0xc003dff1f0 gate 1563590404777929000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.779 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1771 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1772 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1775 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.783 UTC [cauthdsl] func1 -> DEBU 1776 0xc003f6e9c0 gate 1563590404783062200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.783 UTC [cauthdsl] func2 -> DEBU 1777 0xc003f6e9c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1778 0xc003f6e9c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1779 0xc003f6e9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 177a 0xc003f6e9c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [cauthdsl] func1 -> DEBU 177b 0xc003f6e9c0 gate 1563590404783062200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:04.787 UTC [policies] Evaluate -> DEBU 177c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func1 -> DEBU 177f 0xc003f6f200 gate 1563590404788468000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1780 0xc003f6f200 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1781 0xc003f6f200 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1782 0xc003f6f200 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1783 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1784 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [cauthdsl] func2 -> DEBU 1785 0xc003f6f200 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:04.789 UTC [cauthdsl] func1 -> DEBU 1786 0xc003f6f200 gate 1563590404788468000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1787 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1788 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1789 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 178a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.791 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.791 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [gossip.comm] func1 -> DEBU 178f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [gossip.gossip] handleMessage -> DEBU 1790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.877 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.878 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:04.878 UTC [gossip.gossip] handleMessage -> DEBU 1793 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:04.895 UTC [gossip.comm] func1 -> DEBU 1794 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.895 UTC [gossip.gossip] handleMessage -> DEBU 1795 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.pull] HandleMessage -> DEBU 1796 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.pull] SendDigest -> DEBU 1797 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:04.896 UTC [gossip.gossip] handleMessage -> DEBU 1798 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [gossip.comm] func1 -> DEBU 1799 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [gossip.gossip] handleMessage -> DEBU 179a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.043 UTC [gossip.gossip] handleMessage -> DEBU 179e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [gossip.comm] func1 -> DEBU 179f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [gossip.gossip] handleMessage -> DEBU 17a0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:05.182 UTC [msp] DeserializeIdentity -> DEBU 17a1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:05.183 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.753 UTC [gossip.election] waitForInterrupt -> DEBU 17a5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.754 UTC [gossip.election] IsLeader -> DEBU 17a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:06.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a7 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510061801 " +peer0.org1.example.com | "2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a9 Sign: digest: 0A2417D6F32F0145DB5A6AD97AF07578F0DC3B14FDE2F95001B604A62A4FEC0B " +peer0.org1.example.com | "2019-07-20 02:40:06.756 UTC [gossip.election] waitForInterrupt -> DEBU 17aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] Send -> DEBU 17af Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.912 UTC [gossip.comm] func1 -> DEBU 17b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c0 0xc00285b7b0 gate 1563590406916398500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c1 0xc00285b7b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c2 0xc00285b7b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c3 0xc00285b7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c4 0xc00285b7b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00285b7b0 gate 1563590406916398500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00285bff0 gate 1563590406917178300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00285bff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00285bff0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00285bff0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 ab 03 83 d7 43 bb 1b 61 cb e1 88 ca 40 df 51 86 |....C..a....@.Q.| +peer0.org1.example.com | 00000010 59 ab 66 81 d9 42 04 49 40 b1 0d cc a6 19 ef 83 |Y.f..B.I@.......|" +peer0.org1.example.com | "2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 44 02 20 47 1b 2a a9 f8 00 a5 85 82 52 d9 32 |0D. G.*......R.2| +peer0.org1.example.com | 00000010 00 d7 35 a3 07 ab 35 92 0a 14 ed 05 56 99 32 2f |..5...5.....V.2/| +peer0.org1.example.com | 00000020 1a 0e 68 72 02 20 44 ca ce 45 de f0 b2 32 75 65 |..hr. D..E...2ue| +peer0.org1.example.com | 00000030 d3 aa 99 f7 5c f2 f4 64 d2 51 4b 03 8c 4d d3 a2 |....\..d.QK..M..| +peer0.org1.example.com | 00000040 e6 f9 a9 92 f0 a0 |......|" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00285bff0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00285bff0 gate 1563590406917178300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 17d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d7 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17da Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 17db Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17dc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.comm] func1 -> DEBU 17dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17de Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17e8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ef Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.928 UTC [gossip.comm] func1 -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f1 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f5 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151019 " +peer0.org1.example.com | "2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f7 Sign: digest: A5E5D6E64F8F6C1FAA2BC3C99B4B9AF3B3BA328A9870DDA72718709F7712B546 " +peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f8 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:07.234 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17fb Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:07.237 UTC [msp] DeserializeIdentity -> DEBU 17fc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.238 UTC [msp] DeserializeIdentity -> DEBU 17fd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.238 UTC [gossip.comm] Send -> DEBU 17fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [msp] DeserializeIdentity -> DEBU 17ff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [gossip.comm] Send -> DEBU 1801 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1800 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1802 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [msp] DeserializeIdentity -> DEBU 1803 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.240 UTC [gossip.comm] Send -> DEBU 1804 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1805 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1806 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1807 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1808 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.comm] func1 -> DEBU 1809 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 180c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 180d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:07.365 UTC [msp.identity] Verify -> DEBU 180e Verify: digest = 00000000 2b 9e 49 fe 26 11 78 34 3b 01 7f 16 c9 58 7f 1e |+.I.&.x4;....X..| +peer0.org1.example.com | 00000010 3a 8e 0c 07 25 a0 b2 47 0a 25 8f d9 76 80 4b df |:...%..G.%..v.K.|" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [msp.identity] Verify -> DEBU 180f Verify: sig = 00000000 30 44 02 20 68 82 53 1c d9 3b 2c 2e a0 79 ec 11 |0D. h.S..;,..y..| +peer0.org1.example.com | 00000010 ec 2f d5 58 98 b9 1f de 94 04 05 19 9e 95 f6 94 |./.X............| +peer0.org1.example.com | 00000020 3d b3 48 6e 02 20 19 5a 3d 37 bc 13 93 03 49 4b |=.Hn. .Z=7....IK| +peer0.org1.example.com | 00000030 e8 10 46 6b 7a f1 a2 2b 74 55 96 04 95 17 34 4b |..Fkz..+tU....4K| +peer0.org1.example.com | 00000040 e4 f9 7b ba 1c fa |..{...|" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1810 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1814 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1815 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1816 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [gossip.comm] Send -> DEBU 181b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] Send -> DEBU 181d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1820 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.369 UTC [gossip.comm] func1 -> DEBU 1822 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.369 UTC [gossip.gossip] handleMessage -> DEBU 1823 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.gossip] handleMessage -> DEBU 1824 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1825 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1826 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1829 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.comm] func1 -> DEBU 182c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1830 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [msp] DeserializeIdentity -> DEBU 1831 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1832 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1833 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1834 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.544 UTC [cauthdsl] func1 -> DEBU 1838 0xc0037cfbc0 gate 1563590407544965200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1839 0xc0037cfbc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183a 0xc0037cfbc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183b 0xc0037cfbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183c 0xc0037cfbc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 183d 0xc0037cfbc0 gate 1563590407544965200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1841 0xc003dda400 gate 1563590407545389000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1842 0xc003dda400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1843 0xc003dda400 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1844 0xc003dda400 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1845 Verify: digest = 00000000 89 ef ec b6 d9 de 0e eb ae 8e 81 ef af 84 9e ee |................| +peer0.org1.example.com | 00000010 36 ac a6 04 33 0e 2b 52 4d b9 2c 34 25 7e 0a 7c |6...3.+RM.,4%~.||" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1846 Verify: sig = 00000000 30 45 02 21 00 ce e7 5e 5d de 20 4b c4 44 7d 85 |0E.!...^]. K.D}.| +peer0.org1.example.com | 00000010 7a a7 49 0c 59 30 fe f8 b8 99 6b 30 a8 dd de 6a |z.I.Y0....k0...j| +peer0.org1.example.com | 00000020 eb 3f 63 a1 7b 02 20 4b 7d d1 a3 68 c7 5b e9 06 |.?c.{. K}..h.[..| +peer0.org1.example.com | 00000030 e1 73 36 2b 25 f4 4e a5 b0 84 a6 e8 65 63 83 b1 |.s6+%.N.....ec..| +peer0.org1.example.com | 00000040 c6 dc 03 7b 71 3b a0 |...{q;.|" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1847 0xc003dda400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1848 0xc003dda400 gate 1563590407545389000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 1849 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 184d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184f updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.comm] func1 -> DEBU 1850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1852 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1853 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1854 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1855 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1856 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.gossip] handleMessage -> DEBU 1857 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1858 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1859 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.557 UTC [gossip.comm] func1 -> DEBU 185a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.558 UTC [gossip.gossip] handleMessage -> DEBU 185c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.559 UTC [gossip.gossip] handleMessage -> DEBU 185d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.557 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.569 UTC [msp] DeserializeIdentity -> DEBU 185e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1861 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1864 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1865 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1866 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1867 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1868 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 1869 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 186a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.915 UTC [gossip.comm] func1 -> DEBU 186d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1870 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1871 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [msp] DeserializeIdentity -> DEBU 1872 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1879 0xc0004f5660 gate 1563590407917042800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187a 0xc0004f5660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187b 0xc0004f5660 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187c 0xc0004f5660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187d 0xc0004f5660 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 187e 0xc0004f5660 gate 1563590407917042800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 187f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1881 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1882 0xc0004f5ea0 gate 1563590407917520700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1883 0xc0004f5ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1884 0xc0004f5ea0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1885 0xc0004f5ea0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1886 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| +peer0.org1.example.com | 00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1887 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| +peer0.org1.example.com | 00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| +peer0.org1.example.com | 00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| +peer0.org1.example.com | 00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| +peer0.org1.example.com | 00000040 bf 3b 9d dd 7b 8e |.;..{.|" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1888 0xc0004f5ea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1889 0xc0004f5ea0 gate 1563590407917520700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 188e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 188f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1890 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1891 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1892 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1893 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 1894 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1895 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 1896 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.comm] Send -> DEBU 189a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 189b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\035" signature:"0D\002 h\202S\034\331;,.\240y\354\021\354/\325X\230\271\037\336\224\004\005\031\236\225\366\224=\263Hn\002 \031Z=7\274\023\223\003IK\350\020Fkz\361\242+tU\226\004\225\0274K\344\371{\272\034\372" > alive: " +peer0.org1.example.com | "2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:07.923 UTC [gossip.comm] func1 -> DEBU 189e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.923 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:07.925 UTC [gossip.pull] SendDigest -> DEBU 18a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:07.926 UTC [gossip.gossip] handleMessage -> DEBU 18a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.pull] Hello -> DEBU 18a9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] Send -> DEBU 18aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ac Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.243 UTC [gossip.pull] Hello -> DEBU 18ad Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:08.243 UTC [gossip.comm] Send -> DEBU 18ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.245 UTC [gossip.comm] func1 -> DEBU 18b1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.246 UTC [gossip.gossip] handleMessage -> DEBU 18b3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.247 UTC [gossip.pull] HandleMessage -> DEBU 18b4 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.246 UTC [gossip.comm] func1 -> DEBU 18b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.244 UTC [gossip.pull] Hello -> DEBU 18b5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.comm] Send -> DEBU 18b6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.gossip] handleMessage -> DEBU 18b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 18b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.comm] sendToEndpoint -> DEBU 18b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18ba Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.pull] HandleMessage -> DEBU 18bb GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.250 UTC [gossip.comm] func1 -> DEBU 18bc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18bd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18be Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.pull] HandleMessage -> DEBU 18bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c1 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101A " +peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c3 Sign: digest: 15F5DB7AEF8341246A2BBC7FC964B30DB177647422188189177BD277A67DE900 " +peer0.org1.example.com | "2019-07-20 02:40:08.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c4 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:08.283 UTC [gossip.comm] Send -> DEBU 18c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.284 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.285 UTC [gossip.comm] Send -> DEBU 18cb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.285 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.comm] func1 -> DEBU 18cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d4 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +peer0.org1.example.com | "2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d5 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" +peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] Send -> DEBU 18d6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 44 02 20 74 eb 3c 0c 7c c3 90 9e 45 15 01 99 |0D. t.<.|...E...| +peer0.org1.example.com | 00000010 dd 06 cc c3 60 41 fa 97 b9 82 48 9d f4 11 28 00 |....`A....H...(.| +peer0.org1.example.com | 00000020 b5 48 cc 08 02 20 5a 13 df a9 89 2f b2 65 11 ea |.H... Z..../.e..| +peer0.org1.example.com | 00000030 a4 39 33 13 0d 1b ba ac 0e 2a 1d 37 dc e0 c6 4d |.93......*.7...M| +peer0.org1.example.com | 00000040 d5 14 8c 44 a2 85 |...D..|" +peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] isSentByMe -> DEBU 18dd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18de Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.293 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [gossip.comm] func1 -> DEBU 18e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.294 UTC [msp.identity] Verify -> DEBU 18e5 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [msp.identity] Verify -> DEBU 18e6 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.gossip] handleMessage -> DEBU 18e7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] isSentByMe -> DEBU 18e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ed Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func1 -> DEBU 18f6 0xc0039e1d20 gate 1563590408297550800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f7 0xc0039e1d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f8 0xc0039e1d20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18f9 0xc0039e1d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18fa 0xc0039e1d20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [cauthdsl] func1 -> DEBU 18fb 0xc0039e1d20 gate 1563590408297550800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003b9a560 gate 1563590408299015200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1900 0xc003b9a560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1901 0xc003b9a560 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1902 0xc003b9a560 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1903 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| +peer0.org1.example.com | 00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" +peer0.org1.example.com | "2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1904 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| +peer0.org1.example.com | 00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| +peer0.org1.example.com | 00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| +peer0.org1.example.com | 00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| +peer0.org1.example.com | 00000040 bf 3b 9d dd 7b 8e |.;..{.|" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [cauthdsl] func2 -> DEBU 1905 0xc003b9a560 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [cauthdsl] func1 -> DEBU 1906 0xc003b9a560 gate 1563590408299015200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1907 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1909 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 190a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.301 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +peer0.org1.example.com | 00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +peer0.org1.example.com | 00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +peer0.org1.example.com | 00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +peer0.org1.example.com | 00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +peer0.org1.example.com | 00000040 57 8d 5b 84 9d 85 |W.[...|" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1910 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] isSentByMe -> DEBU 1911 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1912 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.363 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.363 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.364 UTC [gossip.pull] HandleMessage -> DEBU 1916 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.365 UTC [gossip.pull] SendDigest -> DEBU 1917 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:08.365 UTC [gossip.gossip] handleMessage -> DEBU 1918 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.comm] func1 -> DEBU 1919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 191d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191e Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +peer0.org1.example.com | "2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191f Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" +peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1920 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1921 Verify: sig = 00000000 30 45 02 21 00 83 3b 64 33 c2 24 ca 8f 63 e9 05 |0E.!..;d3.$..c..| +peer0.org1.example.com | 00000010 e8 18 37 56 ba a0 c0 14 82 44 d6 2d 8b 04 25 94 |..7V.....D.-..%.| +peer0.org1.example.com | 00000020 71 1d a3 86 33 02 20 51 61 00 a2 7a 14 09 e7 60 |q...3. Qa..z...`| +peer0.org1.example.com | 00000030 3e c7 9d 10 99 cb 0d 88 9d 11 94 58 4e 25 ef e5 |>..........XN%..| +peer0.org1.example.com | 00000040 0b 09 5f c7 9c 27 cb |.._..'.|" +peer0.org1.example.com | "2019-07-20 02:40:08.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 1922 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1923 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1924 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1925 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1926 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1927 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 1928 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1929 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.374 UTC [gossip.discovery] sendMemResponse -> DEBU 192a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:08.374 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [gossip.comm] Send -> DEBU 192d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.375 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.376 UTC [gossip.comm] sendToEndpoint -> DEBU 192f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.376 UTC [gossip.discovery] sendMemResponse -> DEBU 1930 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1931 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1932 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1933 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1934 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.gossip] handleMessage -> DEBU 1935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.pull] HandleMessage -> DEBU 1937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1939 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1936 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [gossip.pull] SendDigest -> DEBU 193e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [gossip.gossip] handleMessage -> DEBU 193f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.554 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1940 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [msp] DeserializeIdentity -> DEBU 1941 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1942 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1943 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1944 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1946 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1947 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func1 -> DEBU 1948 0xc00377da70 gate 1563590408557288200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 1949 0xc00377da70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 194a 0xc00377da70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194b 0xc00377da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194c 0xc00377da70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.558 UTC [cauthdsl] func1 -> DEBU 194d 0xc00377da70 gate 1563590408557288200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [cauthdsl] func1 -> DEBU 1951 0xc002a002b0 gate 1563590408559753700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.559 UTC [cauthdsl] func2 -> DEBU 1952 0xc002a002b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1953 0xc002a002b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1954 0xc002a002b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.560 UTC [msp.identity] Verify -> DEBU 1955 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| +peer0.org1.example.com | 00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" +peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [msp.identity] Verify -> DEBU 1956 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| +peer0.org1.example.com | 00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| +peer0.org1.example.com | 00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| +peer0.org1.example.com | 00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| +peer0.org1.example.com | 00000040 73 b2 78 be 11 5f 01 |s.x.._.|" +peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [cauthdsl] func2 -> DEBU 1957 0xc002a002b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.561 UTC [cauthdsl] func1 -> DEBU 1958 0xc002a002b0 gate 1563590408559753700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 1959 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 195a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195f updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1960 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1961 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1962 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.565 UTC [gossip.discovery] handleAliveMessage -> DEBU 1963 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1964 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1965 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1968 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.comm] Send -> DEBU 1969 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 196a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1976 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.721 UTC [gossip.comm] func1 -> DEBU 1977 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1978 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.723 UTC [msp.identity] Verify -> DEBU 197a Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:08.724 UTC [msp.identity] Verify -> DEBU 197b Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197c Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197d Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1980 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1981 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1982 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1984 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func1 -> DEBU 1986 0xc0034afbb0 gate 1563590408731275000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1987 0xc0034afbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1988 0xc0034afbb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 1989 0xc0034afbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 198a 0xc0034afbb0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.732 UTC [cauthdsl] func1 -> DEBU 198b 0xc0034afbb0 gate 1563590408731275000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.734 UTC [policies] Evaluate -> DEBU 198e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.734 UTC [cauthdsl] func1 -> DEBU 198f 0xc0039d43f0 gate 1563590408734954700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1990 0xc0039d43f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1991 0xc0039d43f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1993 0xc0039d43f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [gossip.pull] Hello -> DEBU 1995 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1997 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.737 UTC [msp] DeserializeIdentity -> DEBU 1999 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] Send -> DEBU 199a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [cauthdsl] func2 -> DEBU 199c 0xc0039d43f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [cauthdsl] func1 -> DEBU 199d 0xc0039d43f0 gate 1563590408734954700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.739 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [gossip.comm] func1 -> DEBU 19a1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.742 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.742 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func1 -> DEBU 19ac 0xc0039d5be0 gate 1563590408746044200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0039d5be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0039d5be0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.749 UTC [cauthdsl] func2 -> DEBU 19af 0xc0039d5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0039d5be0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0039d5be0 gate 1563590408746044200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.751 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.751 UTC [cauthdsl] func1 -> DEBU 19b5 0xc002940420 gate 1563590408751898400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b6 0xc002940420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b7 0xc002940420 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b8 0xc002940420 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19b9 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19ba Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [cauthdsl] func2 -> DEBU 19bb 0xc002940420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [cauthdsl] func1 -> DEBU 19bc 0xc002940420 gate 1563590408751898400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.753 UTC [policies] Evaluate -> DEBU 19bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [cauthdsl] func1 -> DEBU 19cc 0xc002941f30 gate 1563590408757681600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.757 UTC [cauthdsl] func2 -> DEBU 19cd 0xc002941f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19ce 0xc002941f30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19cf 0xc002941f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19d0 0xc002941f30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [cauthdsl] func1 -> DEBU 19d1 0xc002941f30 gate 1563590408757681600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.758 UTC [policies] Evaluate -> DEBU 19d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [cauthdsl] func1 -> DEBU 19d5 0xc002a7c770 gate 1563590408759598600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.759 UTC [cauthdsl] func2 -> DEBU 19d6 0xc002a7c770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d7 0xc002a7c770 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d8 0xc002a7c770 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19d9 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19da Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:08.762 UTC [cauthdsl] func2 -> DEBU 19db 0xc002a7c770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.762 UTC [cauthdsl] func1 -> DEBU 19dc 0xc002a7c770 gate 1563590408759598600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e1 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e2 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:08.765 UTC [msp.identity] Verify -> DEBU 19e3 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:08.768 UTC [msp.identity] Verify -> DEBU 19e4 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:08.768 UTC [msp] DeserializeIdentity -> DEBU 19e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func1 -> DEBU 19ed 0xc002ef4d80 gate 1563590408771180700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ee 0xc002ef4d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ef 0xc002ef4d80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19f0 0xc002ef4d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [cauthdsl] func2 -> DEBU 19f1 0xc002ef4d80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [cauthdsl] func1 -> DEBU 19f2 0xc002ef4d80 gate 1563590408771180700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func1 -> DEBU 19f6 0xc002ef55c0 gate 1563590408773095200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f7 0xc002ef55c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f8 0xc002ef55c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f9 0xc002ef55c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.773 UTC [msp.identity] Verify -> DEBU 19fa Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [msp.identity] Verify -> DEBU 19fb Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [cauthdsl] func2 -> DEBU 19fc 0xc002ef55c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [cauthdsl] func1 -> DEBU 19fd 0xc002ef55c0 gate 1563590408773095200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a00 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a02 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a03 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.775 UTC [msp] DeserializeIdentity -> DEBU 1a04 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a05 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a06 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a08 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a09 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a0d 0xc0038b70d0 gate 1563590408779421800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0038b70d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0038b70d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0038b70d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0038b70d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0038b70d0 gate 1563590408779421800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a16 0xc0038b7910 gate 1563590408780043400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a17 0xc0038b7910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0038b7910 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0038b7910 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0038b7910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0038b7910 gate 1563590408780043400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a20 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:08.784 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.785 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a26 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a27 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a28 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func1 -> DEBU 1a2c 0xc003b1b800 gate 1563590408787939000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc003b1b800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc003b1b800 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc003b1b800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [cauthdsl] func2 -> DEBU 1a30 0xc003b1b800 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [cauthdsl] func1 -> DEBU 1a31 0xc003b1b800 gate 1563590408787939000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:08.789 UTC [policies] Evaluate -> DEBU 1a32 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [cauthdsl] func1 -> DEBU 1a35 0xc003c2c040 gate 1563590408790644700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:08.790 UTC [cauthdsl] func2 -> DEBU 1a36 0xc003c2c040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003c2c040 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003c2c040 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.791 UTC [msp.identity] Verify -> DEBU 1a39 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [msp.identity] Verify -> DEBU 1a3a Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc003c2c040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [cauthdsl] func1 -> DEBU 1a3c 0xc003c2c040 gate 1563590408790644700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:08.792 UTC [policies] Evaluate -> DEBU 1a3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.796 UTC [policies] Evaluate -> DEBU 1a40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:08.796 UTC [msp.identity] Verify -> DEBU 1a41 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:08.797 UTC [msp.identity] Verify -> DEBU 1a42 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:08.797 UTC [gossip.gossip] handleMessage -> DEBU 1a43 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.pull] HandleMessage -> DEBU 1a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [gossip.gossip] handleMessage -> DEBU 1a48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a4a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:08.881 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:08.898 UTC [gossip.comm] func1 -> DEBU 1a4c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.898 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.pull] HandleMessage -> DEBU 1a4e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.pull] SendDigest -> DEBU 1a4f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:08.899 UTC [gossip.gossip] handleMessage -> DEBU 1a50 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:09.042 UTC [gossip.comm] func1 -> DEBU 1a51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:09.042 UTC [gossip.gossip] handleMessage -> DEBU 1a52 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a53 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a54 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.044 UTC [msp] DeserializeIdentity -> DEBU 1a55 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.044 UTC [gossip.gossip] handleMessage -> DEBU 1a56 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:09.181 UTC [gossip.comm] func1 -> DEBU 1a57 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:09.181 UTC [gossip.gossip] handleMessage -> DEBU 1a58 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a59 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:09.186 UTC [gossip.gossip] handleMessage -> DEBU 1a5c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.757 UTC [gossip.election] waitForInterrupt -> DEBU 1a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.757 UTC [gossip.election] IsLeader -> DEBU 1a5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a5f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a60 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510071801 " +peer0.org1.example.com | "2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a61 Sign: digest: F32453B093A8FCF0DB1ACDFCB1A2A453D65AA6A20827F5C70258714B6F5C027F " +peer0.org1.example.com | "2019-07-20 02:40:11.759 UTC [gossip.election] waitForInterrupt -> DEBU 1a62 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:11.760 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a66 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [gossip.comm] Send -> DEBU 1a67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a68 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.918 UTC [gossip.comm] func1 -> DEBU 1a6c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.919 UTC [gossip.comm] func1 -> DEBU 1a6d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.919 UTC [gossip.gossip] handleMessage -> DEBU 1a6e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a71 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:11.921 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a75 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a76 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0007176f0 gate 1563590411924029300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0007176f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0007176f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0007176f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0007176f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc0007176f0 gate 1563590411924029300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000717f30 gate 1563590411925987300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000717f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000717f30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:11.927 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000717f30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:11.927 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 50 6e 7f af 28 57 0b 0c 11 6e 47 2f e1 0f dc 57 |Pn..(W...nG/...W| +peer0.org1.example.com | 00000010 cc 63 30 d8 ae 7d 4d b3 63 dc 69 a5 59 4b 3d 58 |.c0..}M.c.i.YK=X|" +peer0.org1.example.com | "2019-07-20 02:40:11.928 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 30 3b da be 0a 27 22 9d b7 14 c7 49 |0D. 0;...'"....I| +peer0.org1.example.com | 00000010 2f 7c 84 d0 d8 8b 25 f3 7c 6d 8a 46 4b 3a 47 97 |/|....%.|m.FK:G.| +peer0.org1.example.com | 00000020 f1 91 20 77 02 20 7e 62 fe 43 56 ab 37 87 cd bf |.. w. ~b.CV.7...| +peer0.org1.example.com | 00000030 21 7b d2 24 5e 56 76 9a d9 b2 c7 19 33 8b 6c 46 |!{.$^Vv.....3.lF| +peer0.org1.example.com | 00000040 e2 11 bc 09 bb 1a |......|" +peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000717f30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [cauthdsl] func1 -> DEBU 1a8a 0xc000717f30 gate 1563590411925987300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:11.931 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.932 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.932 UTC [gossip.comm] func1 -> DEBU 1a8d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [gossip.comm] func1 -> DEBU 1a8e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a91 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a92 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a93 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a94 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a95 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a96 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a97 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a98 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a99 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a9a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a9b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a9c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:11.938 UTC [gossip.comm] func1 -> DEBU 1a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.937 UTC [msp] DeserializeIdentity -> DEBU 1a9e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:11.940 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.941 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:11.942 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000745fe0 gate 1563590411943047600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000745fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000745fe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000745fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:11.944 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000745fe0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:11.944 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000745fe0 gate 1563590411943047600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aaf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.948 UTC [msp] DeserializeIdentity -> DEBU 1ab2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [gossip.comm] Send -> DEBU 1ab4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [policies] Evaluate -> DEBU 1ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [gossip.comm] Send -> DEBU 1aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:11.953 UTC [gossip.comm] sendToEndpoint -> DEBU 1abb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.952 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0028aa820 gate 1563590411952008400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [gossip.comm] sendToEndpoint -> DEBU 1abc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0028aa820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0028aa820 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0028aa820 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| +peer0.org1.example.com | 00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" +peer0.org1.example.com | "2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| +peer0.org1.example.com | 00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| +peer0.org1.example.com | 00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| +peer0.org1.example.com | 00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| +peer0.org1.example.com | 00000040 86 a4 e1 59 be af ec |...Y...|" +peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0028aa820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0028aa820 gate 1563590411952008400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.958 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acb Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ace Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.discovery] sendMemResponse -> DEBU 1ad3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ad8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [gossip.pull] HandleMessage -> DEBU 1ad9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ada Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1add Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [gossip.comm] Send -> DEBU 1adf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.pull] SendDigest -> DEBU 1ae3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:11.964 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.973 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:11.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:11.969 UTC [gossip.gossip] handleMessage -> DEBU 1ae8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ae9 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:12.234 UTC [msp.identity] Sign -> DEBU 1aea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101B " +peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aeb Sign: digest: CE2B4F1AA88EC06B4B4F6D52277AAB84EFF3B9035584D68F654AC7DBFF895133 " +peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1aec Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aed Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aee Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:12.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1aef Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.241 UTC [gossip.comm] Send -> DEBU 1af3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [msp] DeserializeIdentity -> DEBU 1af4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1afd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1aff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1b01 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b02 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] sendToEndpoint -> DEBU 1b08 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.252 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.253 UTC [gossip.pull] HandleMessage -> DEBU 1b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.252 UTC [gossip.comm] func1 -> DEBU 1b0b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.254 UTC [gossip.gossip] handleMessage -> DEBU 1b0e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.255 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.255 UTC [gossip.pull] HandleMessage -> DEBU 1b10 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b11 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.257 UTC [gossip.pull] HandleMessage -> DEBU 1b13 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.257 UTC [gossip.gossip] handleMessage -> DEBU 1b14 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b15 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101C " +peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b17 Sign: digest: C3F5706A375F12EA1C08F465EF91D9C4D06CEAE01B18956347B9FBEA6DE181AD " +peer0.org1.example.com | "2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b18 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b19 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b1a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] Send -> DEBU 1b1f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b23 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b27 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b28 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b2a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] isSentByMe -> DEBU 1b2e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b30 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [msp] DeserializeIdentity -> DEBU 1b31 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] sendToEndpoint -> DEBU 1b32 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.295 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b34 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b35 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [gossip.comm] func1 -> DEBU 1b37 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [gossip.gossip] handleMessage -> DEBU 1b38 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [policies] Evaluate -> DEBU 1b3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [cauthdsl] func1 -> DEBU 1b3b 0xc003719970 gate 1563590412298571800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.298 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003719970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc003719970 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc003719970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc003719970 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.299 UTC [cauthdsl] func1 -> DEBU 1b40 0xc003719970 gate 1563590412298571800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func1 -> DEBU 1b44 0xc002a0a1b0 gate 1563590412300947700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b45 0xc002a0a1b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b46 0xc002a0a1b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [cauthdsl] func2 -> DEBU 1b47 0xc002a0a1b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b48 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| +peer0.org1.example.com | 00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" +peer0.org1.example.com | "2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b49 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| +peer0.org1.example.com | 00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| +peer0.org1.example.com | 00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| +peer0.org1.example.com | 00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| +peer0.org1.example.com | 00000040 73 b2 78 be 11 5f 01 |s.x.._.|" +peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [cauthdsl] func2 -> DEBU 1b4a 0xc002a0a1b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc002a0a1b0 gate 1563590412300947700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b50 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b51 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b52 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.305 UTC [msp.identity] Verify -> DEBU 1b53 Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [msp.identity] Verify -> DEBU 1b54 Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" +peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b55 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b56 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.306 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b57 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b5b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b5a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +peer0.org1.example.com | 00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +peer0.org1.example.com | 00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +peer0.org1.example.com | 00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +peer0.org1.example.com | 00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +peer0.org1.example.com | 00000040 d6 7b d1 42 f8 2d |.{.B.-|" +peer0.org1.example.com | "2019-07-20 02:40:12.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.309 UTC [msp.identity] Verify -> DEBU 1b61 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +peer0.org1.example.com | "2019-07-20 02:40:12.310 UTC [msp.identity] Verify -> DEBU 1b62 Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" +peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] isSentByMe -> DEBU 1b64 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b65 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b69 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b6a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.314 UTC [cauthdsl] func1 -> DEBU 1b6e 0xc00354dc50 gate 1563590412314160000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.314 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00354dc50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b70 0xc00354dc50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b71 0xc00354dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00354dc50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [cauthdsl] func1 -> DEBU 1b73 0xc00354dc50 gate 1563590412314160000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func1 -> DEBU 1b77 0xc00357a490 gate 1563590412317137700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b78 0xc00357a490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b79 0xc00357a490 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc00357a490 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7b Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| +peer0.org1.example.com | 00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" +peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7c Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| +peer0.org1.example.com | 00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| +peer0.org1.example.com | 00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| +peer0.org1.example.com | 00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| +peer0.org1.example.com | 00000040 86 a4 e1 59 be af ec |...Y...|" +peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [cauthdsl] func2 -> DEBU 1b7d 0xc00357a490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.318 UTC [cauthdsl] func1 -> DEBU 1b7e 0xc00357a490 gate 1563590412317137700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b84 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b85 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [gossip.gossip] handleMessage -> DEBU 1b87 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b88 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.321 UTC [msp.identity] Verify -> DEBU 1b89 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +peer0.org1.example.com | 00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8a Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +peer0.org1.example.com | 00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +peer0.org1.example.com | 00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +peer0.org1.example.com | 00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +peer0.org1.example.com | 00000040 7f 1e c1 c8 ad 63 |.....c|" +peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 44 02 20 54 2e 65 d6 93 d7 c1 d0 66 50 bb 01 |0D. T.e.....fP..| +peer0.org1.example.com | 00000010 53 9c 76 4e 3a a7 3d ea de 4f 2e 55 3f 96 b0 eb |S.vN:.=..O.U?...| +peer0.org1.example.com | 00000020 06 cb 91 62 02 20 16 5c 55 3b 21 dc e0 72 c6 fd |...b. .\U;!..r..| +peer0.org1.example.com | 00000030 b5 c0 af 55 79 1e f7 77 3d e7 90 d7 5a cb 4b 4a |...Uy..w=...Z.KJ| +peer0.org1.example.com | 00000040 1f 38 45 26 f6 1a |.8E&..|" +peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] isSentByMe -> DEBU 1b8e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b90 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b91 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b92 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.pull] HandleMessage -> DEBU 1b94 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.pull] SendDigest -> DEBU 1b95 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b96 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.365 UTC [gossip.gossip] handleMessage -> DEBU 1b98 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b99 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9b Verify: digest = 00000000 23 57 6d cb 67 c3 2b 1d 54 04 2e 4e ff d1 34 7d |#Wm.g.+.T..N..4}| +peer0.org1.example.com | 00000010 d7 e7 66 fa 16 70 4b fa 68 e1 8c b2 cc 2a 6e fa |..f..pK.h....*n.|" +peer0.org1.example.com | "2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9c Verify: sig = 00000000 30 45 02 21 00 c8 5c 77 c3 da f1 17 ec 7e fc e2 |0E.!..\w.....~..| +peer0.org1.example.com | 00000010 d5 59 46 ce e0 e9 46 ac 65 e4 3b ee 86 b2 1a a9 |.YF...F.e.;.....| +peer0.org1.example.com | 00000020 0f 53 c5 f4 28 02 20 13 84 7b 1c bb 4a 9a ec d8 |.S..(. ..{..J...| +peer0.org1.example.com | 00000030 f6 85 ac 6d 5f 6a 69 59 cc bc b0 a3 b5 56 de 70 |...m_jiY.....V.p| +peer0.org1.example.com | 00000040 99 97 b9 75 f0 27 d7 |...u.'.|" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ba3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.comm] func1 -> DEBU 1ba5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.369 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1baa Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +peer0.org1.example.com | "2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1bab Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" +peer0.org1.example.com | "2019-07-20 02:40:12.371 UTC [msp.identity] Verify -> DEBU 1bac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 44 02 20 7a 2f 52 da 3d 89 6f 10 c3 4f de e2 |0D. z/R.=.o..O..| +peer0.org1.example.com | 00000010 0b 43 6f c1 1f 1f ec b9 c8 f5 85 ce c8 0f f8 16 |.Co.............| +peer0.org1.example.com | 00000020 ee 50 27 2b 02 20 06 b4 ca fc 1f a1 09 20 95 71 |.P'+. ....... .q| +peer0.org1.example.com | 00000030 9e 98 3d 8d 6b 01 1b d5 c0 cc 02 26 78 e3 c3 66 |..=.k......&x..f| +peer0.org1.example.com | 00000040 ee 82 e2 40 c7 fe |...@..|" +peer0.org1.example.com | "2019-07-20 02:40:12.374 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb1 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1bad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.374 UTC [gossip.gossip] handleMessage -> DEBU 1bb2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.372 UTC [msp] DeserializeIdentity -> DEBU 1bae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1baf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.376 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.380 UTC [gossip.comm] Send -> DEBU 1bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.385 UTC [gossip.discovery] sendMemResponse -> DEBU 1bce Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:12.385 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.386 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd1 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.pull] HandleMessage -> DEBU 1bd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd8 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bdb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bd9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bdd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.556 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [gossip.comm] func1 -> DEBU 1bde Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.555 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.557 UTC [policies] Evaluate -> DEBU 1be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [policies] Evaluate -> DEBU 1be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func1 -> DEBU 1be4 0xc00055fac0 gate 1563590412558214000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be5 0xc00055fac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be6 0xc00055fac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [msp] DeserializeIdentity -> DEBU 1be7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be8 0xc00055fac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1be9 0xc00055fac0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bea 0xc00055fac0 gate 1563590412558214000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1beb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bee 0xc003730300 gate 1563590412559502000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003730300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003730300 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc003730300 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| +peer0.org1.example.com | 00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| +peer0.org1.example.com | 00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| +peer0.org1.example.com | 00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| +peer0.org1.example.com | 00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| +peer0.org1.example.com | 00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" +peer0.org1.example.com | "2019-07-20 02:40:12.559 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc003730300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc003730300 gate 1563590412559502000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bfc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfe updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bff Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c00 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c01 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.560 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c02 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c04 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.discovery] sendMemResponse -> DEBU 1c05 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c06 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c07 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c08 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.565 UTC [gossip.comm] Send -> DEBU 1c09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.565 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0a Exiting, replying with alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive: " +peer0.org1.example.com | "2019-07-20 02:40:12.563 UTC [gossip.pull] SendDigest -> DEBU 1c03 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:12.566 UTC [gossip.comm] func1 -> DEBU 1c0c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.567 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.568 UTC [gossip.comm] func1 -> DEBU 1c0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.567 UTC [gossip.gossip] handleMessage -> DEBU 1c0f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c10 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c11 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c13 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c14 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:12.570 UTC [msp] DeserializeIdentity -> DEBU 1c15 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c17 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.573 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.575 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc003353c60 gate 1563590412575447700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003353c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003353c60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003353c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.577 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003353c60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [cauthdsl] func1 -> DEBU 1c21 0xc003353c60 gate 1563590412575447700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [policies] Evaluate -> DEBU 1c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [cauthdsl] func1 -> DEBU 1c25 0xc003a0e4a0 gate 1563590412579715600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.579 UTC [cauthdsl] func2 -> DEBU 1c26 0xc003a0e4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003a0e4a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003a0e4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c29 Verify: digest = 00000000 66 b2 e9 33 b3 06 f3 39 07 4d 86 da 59 b0 71 77 |f..3...9.M..Y.qw| +peer0.org1.example.com | 00000010 7d 39 cd ea 94 b5 78 5d 7f cf 90 72 ef 81 fd 1b |}9....x]...r....|" +peer0.org1.example.com | "2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c2a Verify: sig = 00000000 30 45 02 21 00 f6 4b 80 fe 8f dd 13 d4 75 98 e8 |0E.!..K......u..| +peer0.org1.example.com | 00000010 62 4c 0a 3f a4 40 ce 0e a6 37 f3 07 a8 12 7b 89 |bL.?.@...7....{.| +peer0.org1.example.com | 00000020 71 8e c3 08 97 02 20 68 c8 a5 95 a0 9a ea 4a b9 |q..... h......J.| +peer0.org1.example.com | 00000030 49 c3 90 cb d1 bc ea cc e4 de 8d aa 91 fd a0 ac |I...............| +peer0.org1.example.com | 00000040 4f 98 d6 d9 41 a2 3d |O...A.=|" +peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc003a0e4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [cauthdsl] func1 -> DEBU 1c2c 0xc003a0e4a0 gate 1563590412579715600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.581 UTC [policies] Evaluate -> DEBU 1c2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c32 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 29 but got ts: inc_num:1563590372570532900 seq_num:28 " +peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c34 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c35 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c37 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c36 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c38 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c3b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c40 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c42 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] Send -> DEBU 1c43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c46 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] Send -> DEBU 1c47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c49 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.717 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.718 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.718 UTC [gossip.comm] Send -> DEBU 1c4c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c51 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c50 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.720 UTC [gossip.comm] func1 -> DEBU 1c52 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.comm] func1 -> DEBU 1c53 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [gossip.gossip] handleMessage -> DEBU 1c55 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.722 UTC [msp] DeserializeIdentity -> DEBU 1c56 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c57 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c58 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c59 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003be0760 gate 1563590412724456500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003be0760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003be0760 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003be0760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c63 0xc003be0760 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c64 0xc003be0760 gate 1563590412724456500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.725 UTC [cauthdsl] func1 -> DEBU 1c68 0xc003be0fa0 gate 1563590412725972500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c69 0xc003be0fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc003be0fa0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc003be0fa0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6c Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6d Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [cauthdsl] func2 -> DEBU 1c6e 0xc003be0fa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [cauthdsl] func1 -> DEBU 1c6f 0xc003be0fa0 gate 1563590412725972500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:12.730 UTC [msp.identity] Verify -> DEBU 1c76 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:12.730 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.731 UTC [msp] DeserializeIdentity -> DEBU 1c78 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.729 UTC [gossip.comm] func1 -> DEBU 1c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.732 UTC [policies] Evaluate -> DEBU 1c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.733 UTC [cauthdsl] func1 -> DEBU 1c7f 0xc000676470 gate 1563590412733754100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000676470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c81 0xc000676470 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c82 0xc000676470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c83 0xc000676470 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.734 UTC [cauthdsl] func1 -> DEBU 1c84 0xc000676470 gate 1563590412733754100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.735 UTC [cauthdsl] func1 -> DEBU 1c88 0xc000676cb0 gate 1563590412735845900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000676cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc000676cb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000676cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.736 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000676cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.737 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000676cb0 gate 1563590412735845900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c92 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.739 UTC [gossip.pull] Hello -> DEBU 1c96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c98 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.742 UTC [gossip.comm] func1 -> DEBU 1c9d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c9e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:12.743 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [gossip.gossip] handleMessage -> DEBU 1ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca3 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.747 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [cauthdsl] func1 -> DEBU 1cad 0xc002ee5c20 gate 1563590412748635200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.748 UTC [cauthdsl] func2 -> DEBU 1cae 0xc002ee5c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1caf 0xc002ee5c20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb0 0xc002ee5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb1 0xc002ee5c20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.749 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc002ee5c20 gate 1563590412748635200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.750 UTC [cauthdsl] func1 -> DEBU 1cb6 0xc003106460 gate 1563590412750893400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003106460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc003106460 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc003106460 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cba Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cbb Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:12.752 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc003106460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc003106460 gate 1563590412750893400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func1 -> DEBU 1cca 0xc003107c30 gate 1563590412757102400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc003107c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc003107c30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc003107c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [cauthdsl] func2 -> DEBU 1cce 0xc003107c30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc003107c30 gate 1563590412757102400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func1 -> DEBU 1cd3 0xc003202470 gate 1563590412759144400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd4 0xc003202470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd5 0xc003202470 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd6 0xc003202470 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:12.760 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc003202470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [cauthdsl] func1 -> DEBU 1cda 0xc003202470 gate 1563590412759144400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cdd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1ce0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.762 UTC [msp] DeserializeIdentity -> DEBU 1ce1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ce4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.764 UTC [policies] Evaluate -> DEBU 1ce7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func1 -> DEBU 1cea 0xc003203f80 gate 1563590412766367800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc003203f80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1cec 0xc003203f80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1ced 0xc003203f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1cee 0xc003203f80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [cauthdsl] func1 -> DEBU 1cef 0xc003203f80 gate 1563590412766367800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.767 UTC [policies] Evaluate -> DEBU 1cf0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [cauthdsl] func1 -> DEBU 1cf3 0xc0032127c0 gate 1563590412768604100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.768 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc0032127c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc0032127c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc0032127c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf7 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf8 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:12.770 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc0032127c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.770 UTC [cauthdsl] func1 -> DEBU 1cfa 0xc0032127c0 gate 1563590412768604100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.772 UTC [msp.identity] Verify -> DEBU 1cff Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d00 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d01 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d02 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:12.774 UTC [msp] DeserializeIdentity -> DEBU 1d03 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [msp] DeserializeIdentity -> DEBU 1d04 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d06 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d07 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:12.775 UTC [policies] Evaluate -> DEBU 1d08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func1 -> DEBU 1d0b 0xc003968dd0 gate 1563590412777229200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003968dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0d 0xc003968dd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc003968dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc003968dd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [cauthdsl] func1 -> DEBU 1d10 0xc003968dd0 gate 1563590412777229200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:12.778 UTC [policies] Evaluate -> DEBU 1d11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func1 -> DEBU 1d14 0xc003969610 gate 1563590412779480700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d15 0xc003969610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d16 0xc003969610 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [cauthdsl] func2 -> DEBU 1d17 0xc003969610 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d18 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d19 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc003969610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [cauthdsl] func1 -> DEBU 1d1b 0xc003969610 gate 1563590412779480700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d20 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.783 UTC [gossip.pull] HandleMessage -> DEBU 1d22 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.783 UTC [gossip.gossip] handleMessage -> DEBU 1d23 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.878 UTC [gossip.comm] func1 -> DEBU 1d24 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d26 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:12.880 UTC [gossip.gossip] handleMessage -> DEBU 1d28 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:12.899 UTC [gossip.comm] func1 -> DEBU 1d29 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.899 UTC [gossip.gossip] handleMessage -> DEBU 1d2a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.pull] HandleMessage -> DEBU 1d2b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.pull] SendDigest -> DEBU 1d2c Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:12.900 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [gossip.comm] func1 -> DEBU 1d2e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [gossip.gossip] handleMessage -> DEBU 1d2f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:13.047 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d31 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d32 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.048 UTC [gossip.gossip] handleMessage -> DEBU 1d33 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:13.181 UTC [gossip.comm] func1 -> DEBU 1d34 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:13.184 UTC [gossip.gossip] handleMessage -> DEBU 1d35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d36 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d37 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d38 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:13.185 UTC [gossip.gossip] handleMessage -> DEBU 1d39 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.752 UTC [chaincode.platform.util] DockerBuild -> DEBU 1d3a Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-111193500/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-111193500/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +peer0.org1.example.com | "2019-07-20 02:40:15.921 UTC [gossip.comm] func1 -> DEBU 1d3b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d3e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:15.922 UTC [msp] DeserializeIdentity -> DEBU 1d40 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d42 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d43 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d45 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func1 -> DEBU 1d47 0xc003fc5100 gate 1563590415925224500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d48 0xc003fc5100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d49 0xc003fc5100 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc003fc5100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc003fc5100 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [cauthdsl] func1 -> DEBU 1d4c 0xc003fc5100 gate 1563590415925224500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:15.927 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003fc5940 gate 1563590415927346400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:15.927 UTC [cauthdsl] func2 -> DEBU 1d51 0xc003fc5940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:15.929 UTC [cauthdsl] func2 -> DEBU 1d52 0xc003fc5940 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [cauthdsl] func2 -> DEBU 1d53 0xc003fc5940 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d54 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| +peer0.org1.example.com | 00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" +peer0.org1.example.com | "2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d55 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| +peer0.org1.example.com | 00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| +peer0.org1.example.com | 00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| +peer0.org1.example.com | 00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| +peer0.org1.example.com | 00000040 e1 ea 1b 14 b1 d0 68 |......h|" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [cauthdsl] func2 -> DEBU 1d56 0xc003fc5940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [cauthdsl] func1 -> DEBU 1d57 0xc003fc5940 gate 1563590415927346400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:15.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5e updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d60 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d61 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d62 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d63 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [gossip.discovery] sendMemResponse -> DEBU 1d64 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:15.934 UTC [msp] DeserializeIdentity -> DEBU 1d65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d66 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d67 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.935 UTC [gossip.comm] Send -> DEBU 1d68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:15.937 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.comm] func1 -> DEBU 1d6c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.gossip] handleMessage -> DEBU 1d6d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [gossip.pull] HandleMessage -> DEBU 1d6e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d6f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d72 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d74 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [gossip.pull] SendDigest -> DEBU 1d75 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:15.940 UTC [gossip.gossip] handleMessage -> DEBU 1d76 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.250 UTC [gossip.pull] Hello -> DEBU 1d77 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d78 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d79 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d7b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d80 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.254 UTC [gossip.comm] sendToEndpoint -> DEBU 1d82 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.comm] func1 -> DEBU 1d83 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.pull] HandleMessage -> DEBU 1d85 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d86 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.comm] func1 -> DEBU 1d87 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1d88 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.256 UTC [gossip.pull] HandleMessage -> DEBU 1d89 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.comm] func1 -> DEBU 1d8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.257 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.258 UTC [gossip.gossip] handleMessage -> DEBU 1d8e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d8f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d90 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101D " +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d91 Sign: digest: EAF7A22AF5CA8E0579A0B66E67EF7FD85BB66BB3C7E606070BF191AB7011B33B " +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d92 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d94 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [gossip.comm] Send -> DEBU 1d95 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.292 UTC [msp] DeserializeIdentity -> DEBU 1d96 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d97 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [msp] DeserializeIdentity -> DEBU 1d98 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.comm] func1 -> DEBU 1da0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da5 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +peer0.org1.example.com | "2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da6 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" +peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] isSentByMe -> DEBU 1da8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1daa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.299 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dad Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dae Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1daf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1db0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.301 UTC [policies] Evaluate -> DEBU 1db1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db2 0xc003e15250 gate 1563590416301899900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db3 0xc003e15250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db4 0xc003e15250 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db5 0xc003e15250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db6 0xc003e15250 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003e15250 gate 1563590416301899900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1dba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1dbb 0xc003e15bc0 gate 1563590416302711000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbc 0xc003e15bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003e15bc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc003e15bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dbf Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| +peer0.org1.example.com | 00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dc0 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| +peer0.org1.example.com | 00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| +peer0.org1.example.com | 00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| +peer0.org1.example.com | 00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| +peer0.org1.example.com | 00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [cauthdsl] func2 -> DEBU 1dc1 0xc003e15bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [cauthdsl] func1 -> DEBU 1dc2 0xc003e15bc0 gate 1563590416302711000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dca Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dcb Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcc Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.comm] func1 -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd4 Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +peer0.org1.example.com | 00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd5 Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +peer0.org1.example.com | 00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +peer0.org1.example.com | 00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +peer0.org1.example.com | 00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +peer0.org1.example.com | 00000040 29 a8 53 68 a7 11 7c |).Sh..||" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dd9 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dda Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" +peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] isSentByMe -> DEBU 1ddc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dde Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [msp] DeserializeIdentity -> DEBU 1ddf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func1 -> DEBU 1de6 0xc003dc1ac0 gate 1563590416308814200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de7 0xc003dc1ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de8 0xc003dc1ac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1de9 0xc003dc1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1dea 0xc003dc1ac0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1deb 0xc003dc1ac0 gate 1563590416308814200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1def 0xc003d44300 gate 1563590416309552900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1df0 0xc003d44300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df1 0xc003d44300 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df2 0xc003d44300 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df3 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| +peer0.org1.example.com | 00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" +peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df4 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| +peer0.org1.example.com | 00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| +peer0.org1.example.com | 00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| +peer0.org1.example.com | 00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| +peer0.org1.example.com | 00000040 e1 ea 1b 14 b1 d0 68 |......h|" +peer0.org1.example.com | "2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df5 0xc003d44300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [cauthdsl] func1 -> DEBU 1df6 0xc003d44300 gate 1563590416309552900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1dfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dfd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.comm] func1 -> DEBU 1dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1dff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e01 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e02 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e03 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +peer0.org1.example.com | 00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +peer0.org1.example.com | "2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e04 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +peer0.org1.example.com | 00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +peer0.org1.example.com | 00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +peer0.org1.example.com | 00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +peer0.org1.example.com | 00000040 ef b1 c2 24 bf d1 2d |...$..-|" +peer0.org1.example.com | "2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e05 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e06 Verify: sig = 00000000 30 44 02 20 7f f1 98 24 6f 3d ca 92 29 ba d5 f2 |0D. ...$o=..)...| +peer0.org1.example.com | 00000010 f7 19 e4 f9 b8 9a 6d 7e 18 4c 64 f1 11 1b be 71 |......m~.Ld....q| +peer0.org1.example.com | 00000020 5f 69 1e ba 02 20 42 95 c2 21 f1 b1 c1 dd b2 5c |_i... B..!.....\| +peer0.org1.example.com | 00000030 5b ba f5 ff 92 bc f2 b8 98 ee 4d b5 db 17 fd 8c |[.........M.....| +peer0.org1.example.com | 00000040 22 a4 3f 78 a3 a7 |".?x..|" +peer0.org1.example.com | "2019-07-20 02:40:16.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e07 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.315 UTC [gossip.discovery] isSentByMe -> DEBU 1e08 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e09 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.374 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.374 UTC [gossip.pull] HandleMessage -> DEBU 1e0e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.pull] SendDigest -> DEBU 1e0f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e10 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e11 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e12 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e13 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e14 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e15 Verify: digest = 00000000 d4 88 79 4c ab ef ec 5b 4c fc 3a 9e ed 6b 4d 0b |..yL...[L.:..kM.| +peer0.org1.example.com | 00000010 78 12 ce 61 78 05 ed 1e ea 74 26 40 4f 96 7f 21 |x..ax....t&@O..!|" +peer0.org1.example.com | "2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e16 Verify: sig = 00000000 30 45 02 21 00 ff 6b 12 d9 6e bc fe cb 4e a6 87 |0E.!..k..n...N..| +peer0.org1.example.com | 00000010 1a a3 8c 53 e7 1b f2 4e 35 a5 5e fb 70 03 cf cd |...S...N5.^.p...| +peer0.org1.example.com | 00000020 df 98 12 fc 8c 02 20 6f 81 c0 48 ae 61 09 d7 fe |...... o..H.a...| +peer0.org1.example.com | 00000030 d2 5e eb 81 bd 02 12 a4 9e 76 ab d0 1d ed 52 40 |.^.......v....R@| +peer0.org1.example.com | 00000040 be 83 ab ee 51 8a e3 |....Q..|" +peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e17 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e18 Verify: sig = 00000000 30 45 02 21 00 c5 1a 8f 3f 40 5f c4 67 33 2a eb |0E.!....?@_.g3*.| +peer0.org1.example.com | 00000010 ca 9d 80 53 5b a8 d3 3e 03 44 07 ca 3a 73 4e 75 |...S[..>.D..:sNu| +peer0.org1.example.com | 00000020 d4 02 79 a9 95 02 20 07 d6 08 69 cf f9 09 4e ab |..y... ...i...N.| +peer0.org1.example.com | 00000030 a8 83 77 48 68 7b e5 86 58 5c d3 b8 53 d1 0d 6f |..wHh{..X\..S..o| +peer0.org1.example.com | 00000040 67 44 ae d0 62 a0 d9 |gD..b..|" +peer0.org1.example.com | "2019-07-20 02:40:16.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e19 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.381 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.382 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e20 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.382 UTC [gossip.discovery] sendMemResponse -> DEBU 1e21 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e22 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e23 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] Send -> DEBU 1e24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.discovery] sendMemResponse -> DEBU 1e25 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e27 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.551 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.554 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.554 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.555 UTC [gossip.comm] func1 -> DEBU 1e33 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e34 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e36 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.556 UTC [msp] DeserializeIdentity -> DEBU 1e38 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc003c5c0b0 gate 1563590416557187600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003c5c0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e41 0xc003c5c0b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e42 0xc003c5c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [cauthdsl] func2 -> DEBU 1e43 0xc003c5c0b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [cauthdsl] func1 -> DEBU 1e44 0xc003c5c0b0 gate 1563590416557187600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.558 UTC [policies] Evaluate -> DEBU 1e45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e48 0xc003c5c900 gate 1563590416559132400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e49 0xc003c5c900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc003c5c900 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc003c5c900 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4c Verify: digest = 00000000 61 a3 4c 02 09 c8 78 79 d5 52 cf cd c1 b5 88 0d |a.L...xy.R......| +peer0.org1.example.com | 00000010 9c 8e b8 05 37 19 ef af 13 62 ce ee 3d 5b f8 dd |....7....b..=[..|" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4d Verify: sig = 00000000 30 44 02 20 0f cb ae d7 9d 43 db d7 6b 83 72 5b |0D. .....C..k.r[| +peer0.org1.example.com | 00000010 30 9c ae d6 c3 a9 46 c1 82 2c 7e 40 77 7b c0 44 |0.....F..,~@w{.D| +peer0.org1.example.com | 00000020 62 c5 a3 ab 02 20 2b 76 9d f6 21 dd e2 da f0 c7 |b.... +v..!.....| +peer0.org1.example.com | 00000030 ea 69 d3 40 25 84 b9 cb 68 43 69 26 c2 39 b8 2e |.i.@%...hCi&.9..| +peer0.org1.example.com | 00000040 2a bb af f6 89 1e |*.....|" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc003c5c900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e4f 0xc003c5c900 gate 1563590416559132400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e52 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e59 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:16.561 UTC [msp] DeserializeIdentity -> DEBU 1e5d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] Send -> DEBU 1e60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1e61 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e63 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e68 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e6f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e73 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e74 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e78 0xc003bb2470 gate 1563590416726517700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e79 0xc003bb2470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc003bb2470 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc003bb2470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7c 0xc003bb2470 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e7d 0xc003bb2470 gate 1563590416726517700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e81 0xc003bb2cd0 gate 1563590416727128300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e82 0xc003bb2cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e83 0xc003bb2cd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003bb2cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e85 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e86 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e87 0xc003bb2cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e88 0xc003bb2cd0 gate 1563590416727128300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8d Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8e Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e90 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e91 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e92 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e94 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e95 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e99 0xc003b67400 gate 1563590416730027400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9a 0xc003b67400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9b 0xc003b67400 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc003b67400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9d 0xc003b67400 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc003b67400 gate 1563590416730027400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1ea2 0xc003b67c40 gate 1563590416730842400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea3 0xc003b67c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea4 0xc003b67c40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc003b67c40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea6 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea7 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc003b67c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc003b67c40 gate 1563590416730842400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1eac Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.comm] func1 -> DEBU 1eaf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.733 UTC [msp] DeserializeIdentity -> DEBU 1eb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.736 UTC [msp] DeserializeIdentity -> DEBU 1eb2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.737 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.739 UTC [policies] Evaluate -> DEBU 1eb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1eba 0xc003aa58d0 gate 1563590416742339500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebb 0xc003aa58d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebc 0xc003aa58d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebd 0xc003aa58d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebe 0xc003aa58d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1ebf 0xc003aa58d0 gate 1563590416742339500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.747 UTC [policies] Evaluate -> DEBU 1ec0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.pull] Hello -> DEBU 1ec5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] Send -> DEBU 1ec8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1ec9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1eca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [gossip.comm] func1 -> DEBU 1ecb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.748 UTC [cauthdsl] func1 -> DEBU 1ecc 0xc003a8c110 gate 1563590416748113900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecd 0xc003a8c110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ece 0xc003a8c110 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc003a8c110 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [cauthdsl] func2 -> DEBU 1ed2 0xc003a8c110 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [cauthdsl] func1 -> DEBU 1ed3 0xc003a8c110 gate 1563590416748113900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed8 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed9 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1eda Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1edb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1edd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ede Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.755 UTC [policies] Evaluate -> DEBU 1edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.756 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc0039c2b00 gate 1563590416756518800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee3 0xc0039c2b00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee4 0xc0039c2b00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee5 0xc0039c2b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [cauthdsl] func2 -> DEBU 1ee6 0xc0039c2b00 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc0039c2b00 gate 1563590416756518800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.759 UTC [policies] Evaluate -> DEBU 1eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.760 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc0039c3340 gate 1563590416760566000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.760 UTC [cauthdsl] func2 -> DEBU 1eec 0xc0039c3340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eed 0xc0039c3340 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eee 0xc0039c3340 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.761 UTC [msp.identity] Verify -> DEBU 1eef Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc0039c3340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [cauthdsl] func1 -> DEBU 1ef2 0xc0039c3340 gate 1563590416760566000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef7 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1ef9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1efa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efc Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efd Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efe Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1eff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1f00 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f02 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f03 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.770 UTC [policies] Evaluate -> DEBU 1f04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.772 UTC [policies] Evaluate -> DEBU 1f05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.773 UTC [policies] Evaluate -> DEBU 1f06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func1 -> DEBU 1f07 0xc0039382d0 gate 1563590416774009200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f08 0xc0039382d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f09 0xc0039382d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f0a 0xc0039382d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f0b 0xc0039382d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f0c 0xc0039382d0 gate 1563590416774009200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f10 0xc003938b10 gate 1563590416775804700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f11 0xc003938b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f12 0xc003938b10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f13 0xc003938b10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f14 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f15 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f16 0xc003938b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [cauthdsl] func1 -> DEBU 1f17 0xc003938b10 gate 1563590416775804700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f1a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00392c2f0 gate 1563590416778246900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00392c2f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00392c2f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00392c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00392c2f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00392c2f0 gate 1563590416778246900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc00392cb40 gate 1563590416778963500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc00392cb40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc00392cb40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f30 0xc00392cb40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f33 0xc00392cb40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [cauthdsl] func1 -> DEBU 1f34 0xc00392cb40 gate 1563590416778963500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.gossip] handleMessage -> DEBU 1f39 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.election] waitForInterrupt -> DEBU 1f3a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.781 UTC [gossip.election] IsLeader -> DEBU 1f3c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:16.781 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f3d Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510081801 " +peer0.org1.example.com | "2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3f Sign: digest: 72C061B50037B049C617D6280701E32A01DAC65D803A3817D50E2C07CBCF1128 " +peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.election] waitForInterrupt -> DEBU 1f40 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:16.780 UTC [gossip.comm] func1 -> DEBU 1f3b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.gossip] handleMessage -> DEBU 1f41 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.783 UTC [gossip.pull] HandleMessage -> DEBU 1f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.784 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.791 UTC [msp] DeserializeIdentity -> DEBU 1f44 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f45 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f46 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f47 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [gossip.comm] Send -> DEBU 1f48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f49 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f4a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [gossip.comm] func1 -> DEBU 1f4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [gossip.gossip] handleMessage -> DEBU 1f4e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.881 UTC [msp] DeserializeIdentity -> DEBU 1f4f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.882 UTC [msp] DeserializeIdentity -> DEBU 1f50 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.882 UTC [gossip.gossip] handleMessage -> DEBU 1f51 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.comm] func1 -> DEBU 1f52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f53 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.pull] HandleMessage -> DEBU 1f54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.pull] SendDigest -> DEBU 1f55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f56 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.comm] func1 -> DEBU 1f57 Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f58 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f59 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5c Verify: digest = 00000000 cc 35 f5 ac a4 a9 a4 14 67 4a 65 c3 39 7e 1b 4c |.5......gJe.9~.L| +peer0.org1.example.com | 00000010 b4 ca 28 e0 ed 43 61 87 bf c3 02 2b dc 47 31 8b |..(..Ca....+.G1.|" +peer0.org1.example.com | "2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5d Verify: sig = 00000000 30 44 02 20 1b 0b b3 f9 28 4a 21 28 f9 0a f6 a7 |0D. ....(J!(....| +peer0.org1.example.com | 00000010 6b 49 ef 9c dc 3e 3d 78 e7 49 de 89 55 7b cc ac |kI...>=x.I..U{..| +peer0.org1.example.com | 00000020 40 7e b3 42 02 20 03 55 3c 12 32 0a 46 ef c1 3e |@~.B. .U<.2.F..>| +peer0.org1.example.com | 00000030 76 89 d8 1f c4 21 6f 41 32 da 89 db 40 98 0e 19 |v....!oA2...@...| +peer0.org1.example.com | 00000040 83 ac 72 d8 de 1a |..r...|" +peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5f Verify: sig = 00000000 30 44 02 20 59 aa 69 60 a2 b7 28 11 ed 8e c6 e0 |0D. Y.i`..(.....| +peer0.org1.example.com | 00000010 9d 39 d7 71 f5 7a 50 15 2e ff 79 5b 2c 82 76 c3 |.9.q.zP...y[,.v.| +peer0.org1.example.com | 00000020 44 9d 41 10 02 20 08 02 8e a9 c9 63 76 d1 a3 9b |D.A.. .....cv...| +peer0.org1.example.com | 00000030 1d d8 aa ff c3 c1 1d 85 be 4a 0b 7b ad 3d 2b f2 |.........J.{.=+.| +peer0.org1.example.com | 00000040 f0 a1 ae 0e d6 80 |......|" +peer0.org1.example.com | "2019-07-20 02:40:16.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f60 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.919 UTC [gossip.discovery] sendMemResponse -> DEBU 1f61 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f62 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f63 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] Send -> DEBU 1f64 Entering, sending GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1f65 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f66 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f67 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.923 UTC [gossip.comm] func1 -> DEBU 1f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.923 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [msp] DeserializeIdentity -> DEBU 1f6d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:16.924 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f74 0xc0037d9190 gate 1563590416925101500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f75 0xc0037d9190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f76 0xc0037d9190 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f77 0xc0037d9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f78 0xc0037d9190 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0037d9190 gate 1563590416925101500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f7d 0xc0037d9b00 gate 1563590416926021500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0037d9b00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc0037d9b00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f80 0xc0037d9b00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f81 Verify: digest = 00000000 6f 20 d1 54 54 e5 8d cd 14 6f 29 8a b0 8d 95 d0 |o .TT....o).....| +peer0.org1.example.com | 00000010 79 06 49 40 e2 b7 79 61 a1 4e e7 45 b0 b6 63 94 |y.I@..ya.N.E..c.|" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f82 Verify: sig = 00000000 30 44 02 20 0d fd 3d 30 79 8b 3f 71 79 fe 7e c4 |0D. ..=0y.?qy.~.| +peer0.org1.example.com | 00000010 f5 8b 90 0f 6d 3d ba cb dd 7e 38 02 35 f8 00 7c |....m=...~8.5..|| +peer0.org1.example.com | 00000020 44 13 d1 5a 02 20 2d 08 29 5e 88 60 a5 df 74 42 |D..Z. -.)^.`..tB| +peer0.org1.example.com | 00000030 d5 86 92 f6 b4 c1 56 80 49 14 fe 08 f8 5d ac 40 |......V.I....].@| +peer0.org1.example.com | 00000040 58 94 67 ac 1a 38 |X.g..8|" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f83 0xc0037d9b00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f84 0xc0037d9b00 gate 1563590416926021500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f87 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f89 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8b updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f90 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f92 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f93 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f95 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.comm] func1 -> DEBU 1f96 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f98 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1f9f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [msp] DeserializeIdentity -> DEBU 1fa3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.057 UTC [gossip.comm] func1 -> DEBU 1fa9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.058 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.058 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.060 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [gossip.comm] func1 -> DEBU 1faf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.183 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.183 UTC [gossip.gossip] handleMessage -> DEBU 1fb4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.comm] func1 -> DEBU 1fb5 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb8 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:17.198 UTC [msp] DeserializeIdentity -> DEBU 1fba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc0036c4420 gate 1563590417199586800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc2 0xc0036c4420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc3 0xc0036c4420 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc0036c4420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc0036c4420 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc6 0xc0036c4420 gate 1563590417199586800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fca 0xc0036c4c70 gate 1563590417200134700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcb 0xc0036c4c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcc 0xc0036c4c70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcd 0xc0036c4c70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fce Verify: digest = 00000000 ed 7b 4d 70 98 46 1b c4 26 38 67 46 2b e8 f7 ee |.{Mp.F..&8gF+...| +peer0.org1.example.com | 00000010 e9 fe bf f7 97 9c fb 5c 5d 41 75 7d 10 21 3c 16 |.......\]Au}.!<.|" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fcf Verify: sig = 00000000 30 45 02 21 00 ee 7f 00 3b f4 4c 90 d6 03 4f 4e |0E.!....;.L...ON| +peer0.org1.example.com | 00000010 e3 33 89 44 c6 7d 49 6d 81 e2 5c f4 e6 f4 f6 0d |.3.D.}Im..\.....| +peer0.org1.example.com | 00000020 5f 3e fc e3 a5 02 20 5c c5 05 6f 1b fe e4 b8 57 |_>.... \..o....W| +peer0.org1.example.com | 00000030 68 2b 8b 2a f1 5d 4b ae dc ff 35 81 87 26 21 ff |h+.*.]K...5..&!.| +peer0.org1.example.com | 00000040 d7 1a 0f e0 c2 4e d7 |.....N.|" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc0036c4c70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc0036c4c70 gate 1563590417200134700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [policies] Evaluate -> DEBU 1fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.201 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.discovery] sendMemResponse -> DEBU 1fdc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fde Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fdf Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101E " +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe1 Sign: digest: AAF36FAB600E8E5D6DFD21332E6C75166CB3FE373AC44A50CD1CD54E3F06C093 " +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fe2 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:17.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fe5 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fe9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.361 UTC [gossip.comm] func1 -> DEBU 1ff3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ff6 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ff7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 0d 6e 69 b8 fb 0f 8c 32 85 95 ab 75 32 b2 e4 bd |.ni....2...u2...| +peer0.org1.example.com | 00000010 a6 9a b4 b6 36 ad d9 a8 a4 ee 55 fe 0a 63 f2 0c |....6.....U..c..|" +peer0.org1.example.com | "2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 44 02 20 5d 4e 0e 9a cf 91 95 00 ca 60 15 91 |0D. ]N.......`..| +peer0.org1.example.com | 00000010 1d 35 18 08 83 81 13 37 91 87 8b 8a 37 f9 b6 67 |.5.....7....7..g| +peer0.org1.example.com | 00000020 aa 87 e5 47 02 20 07 17 ea 01 93 e6 d3 27 36 b2 |...G. .......'6.| +peer0.org1.example.com | 00000030 b8 ee 42 d4 15 f0 35 a9 88 dc 8f 89 73 5e 14 46 |..B...5.....s^.F| +peer0.org1.example.com | 00000040 a4 f9 c8 ec 3e 2e |....>.|" +peer0.org1.example.com | "2019-07-20 02:40:17.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ffa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 2000 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.364 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2001 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2003 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.369 UTC [gossip.comm] Send -> DEBU 2005 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.369 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.370 UTC [gossip.comm] Send -> DEBU 2007 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.370 UTC [gossip.comm] sendToEndpoint -> DEBU 2008 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.371 UTC [gossip.comm] sendToEndpoint -> DEBU 2009 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.372 UTC [gossip.comm] func1 -> DEBU 200c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2010 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.374 UTC [gossip.comm] func1 -> DEBU 2011 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2012 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2013 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2014 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2015 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.comm] func1 -> DEBU 2016 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2017 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2018 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2019 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 201a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:17.408 UTC [msp] DeserializeIdentity -> DEBU 201b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 201f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2020 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func1 -> DEBU 2022 0xc003687320 gate 1563590417410060500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2023 0xc003687320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2024 0xc003687320 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2025 0xc003687320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [cauthdsl] func2 -> DEBU 2026 0xc003687320 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [cauthdsl] func1 -> DEBU 2027 0xc003687320 gate 1563590417410060500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.411 UTC [policies] Evaluate -> DEBU 2028 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.412 UTC [policies] Evaluate -> DEBU 2029 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [policies] Evaluate -> DEBU 202a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func1 -> DEBU 202b 0xc003687b60 gate 1563590417413050900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202c 0xc003687b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202d 0xc003687b60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202e 0xc003687b60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.413 UTC [msp.identity] Verify -> DEBU 202f Verify: digest = 00000000 8a 2b f9 43 5b 7a ef 10 f4 24 ff a7 f6 54 4d af |.+.C[z...$...TM.| +peer0.org1.example.com | 00000010 ae 4b 85 11 6d 31 72 f5 50 32 2c 76 c5 a6 bb 21 |.K..m1r.P2,v...!|" +peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [msp.identity] Verify -> DEBU 2030 Verify: sig = 00000000 30 45 02 21 00 bf f5 f2 c7 b0 3e 98 23 0c 5d 27 |0E.!......>.#.]'| +peer0.org1.example.com | 00000010 c1 3b 50 34 b7 9a 5c 1a f0 66 33 51 2d f0 a0 a6 |.;P4..\..f3Q-...| +peer0.org1.example.com | 00000020 7d f1 c9 3a 5e 02 20 77 e8 d0 30 d7 86 49 83 8b |}..:^. w..0..I..| +peer0.org1.example.com | 00000030 93 94 16 f9 5d ca b8 ee 42 dc 57 24 b5 99 ff 52 |....]...B.W$...R| +peer0.org1.example.com | 00000040 d9 df 71 f8 c1 ba 89 |..q....|" +peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [cauthdsl] func2 -> DEBU 2031 0xc003687b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [cauthdsl] func1 -> DEBU 2032 0xc003687b60 gate 1563590417413050900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:17.414 UTC [policies] Evaluate -> DEBU 2033 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [gossip.discovery] sendMemResponse -> DEBU 2038 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:17.415 UTC [msp] DeserializeIdentity -> DEBU 2039 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [gossip.comm] Send -> DEBU 203c Entering, sending GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.416 UTC [gossip.discovery] sendMemResponse -> DEBU 203d Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.comm] func1 -> DEBU 2040 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2041 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2043 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2044 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2046 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2047 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2048 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 2049 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 204c 0xc003652100 gate 1563590417571983300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204d 0xc003652100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204e 0xc003652100 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204f 0xc003652100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2050 0xc003652100 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2051 0xc003652100 gate 1563590417571983300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2052 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2053 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2055 0xc003652980 gate 1563590417572451200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2056 0xc003652980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2057 0xc003652980 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2058 0xc003652980 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.572 UTC [msp.identity] Verify -> DEBU 2059 Verify: digest = 00000000 3c 58 51 70 7b 27 28 b6 1f 1d e5 56 0b 6e 05 a9 | DEBU 205a Verify: sig = 00000000 30 45 02 21 00 e8 5b a8 e3 61 3d 94 a3 0b 9b b7 |0E.!..[..a=.....| +peer0.org1.example.com | 00000010 c4 11 ff a2 e6 01 24 1a 00 42 ff e1 9d 2e 83 b5 |......$..B......| +peer0.org1.example.com | 00000020 94 91 d1 45 fb 02 20 63 c4 6d 0d df 72 21 dc 83 |...E.. c.m..r!..| +peer0.org1.example.com | 00000030 97 7e 46 bc 53 2a 98 fb 9e da 35 8e 5c 85 0d 16 |.~F.S*....5.\...| +peer0.org1.example.com | 00000040 a6 b4 c2 b2 f8 a4 45 |......E|" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [cauthdsl] func2 -> DEBU 205b 0xc003652980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [cauthdsl] func1 -> DEBU 205c 0xc003652980 gate 1563590417572451200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 2060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2061 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2062 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2063 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2064 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2065 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2066 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2068 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 206f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2070 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2071 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 2072 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2074 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2075 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2076 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.comm] func1 -> DEBU 2077 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2078 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2079 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.583 UTC [gossip.comm] func1 -> DEBU 207c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.583 UTC [gossip.gossip] handleMessage -> DEBU 207d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.gossip] handleMessage -> DEBU 207e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2080 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] deployImage -> DEBU 2081 Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] createContainer -> DEBU 2082 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:40:19.640 UTC [dockercontroller] getDockerHostConfig -> DEBU 2083 docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-07-20 02:40:19.758 UTC [dockercontroller] createContainer -> DEBU 2084 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.comm] func1 -> DEBU 2085 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2086 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2087 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2088 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2089 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:19.928 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:19.931 UTC [cauthdsl] func1 -> DEBU 2091 0xc003510770 gate 1563590419930912600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:19.931 UTC [cauthdsl] func2 -> DEBU 2092 0xc003510770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2093 0xc003510770 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2094 0xc003510770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2095 0xc003510770 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:19.933 UTC [cauthdsl] func1 -> DEBU 2096 0xc003510770 gate 1563590419930912600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:19.934 UTC [cauthdsl] func1 -> DEBU 209a 0xc003510fb0 gate 1563590419934803200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209b 0xc003510fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209c 0xc003510fb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209d 0xc003510fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:19.935 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| +peer0.org1.example.com | 00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" +peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| +peer0.org1.example.com | 00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| +peer0.org1.example.com | 00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| +peer0.org1.example.com | 00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| +peer0.org1.example.com | 00000040 2b 6e 18 e1 a9 c6 |+n....|" +peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [cauthdsl] func2 -> DEBU 20a0 0xc003510fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:19.936 UTC [cauthdsl] func1 -> DEBU 20a1 0xc003510fb0 gate 1563590419934803200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a8 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.comm] func1 -> DEBU 20ab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.gossip] handleMessage -> DEBU 20ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.944 UTC [gossip.pull] HandleMessage -> DEBU 20ad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.945 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] learnExistingMembers -> DEBU 20b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 20b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20b2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20b3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.pull] SendDigest -> DEBU 20b8 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:19.947 UTC [gossip.discovery] sendMemResponse -> DEBU 20b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.comm] Send -> DEBU 20bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.discovery] sendMemResponse -> DEBU 20be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:19.949 UTC [gossip.comm] sendToEndpoint -> DEBU 20bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:19.950 UTC [gossip.comm] sendToEndpoint -> DEBU 20c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] Send -> DEBU 20c6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20ca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.254 UTC [gossip.comm] func1 -> DEBU 20cd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20cf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.comm] func1 -> DEBU 20d1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20d3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.comm] func1 -> DEBU 20d5 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.pull] HandleMessage -> DEBU 20d7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 20d9 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:20.293 UTC [msp.identity] Sign -> DEBU 20da Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101F " +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20db Sign: digest: 504B6EC17B1E1B1D8BBAD474EBAC421C80C37F85D67DE2002BF8519639289328 " +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 20dc Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20dd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20de Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20df Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20eb Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20ec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ee Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20ef Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20f0 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] isSentByMe -> DEBU 20f2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20fa Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [msp.identity] Verify -> DEBU 20fb Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] isSentByMe -> DEBU 20fd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2102 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2103 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func1 -> DEBU 2107 0xc0033b32f0 gate 1563590420298565800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2108 0xc0033b32f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2109 0xc0033b32f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [gossip.comm] func1 -> DEBU 210a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [gossip.gossip] handleMessage -> DEBU 210b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210c 0xc0033b32f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210d 0xc0033b32f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 210e 0xc0033b32f0 gate 1563590420298565800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 210f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 2112 0xc0033b3b30 gate 1563590420300966200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2113 0xc0033b3b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2114 0xc0033b3b30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2115 0xc0033b3b30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2116 Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| +peer0.org1.example.com | 00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2117 Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| +peer0.org1.example.com | 00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| +peer0.org1.example.com | 00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| +peer0.org1.example.com | 00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| +peer0.org1.example.com | 00000040 2b 6e 18 e1 a9 c6 |+n....|" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2118 0xc0033b3b30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [cauthdsl] func1 -> DEBU 2119 0xc0033b3b30 gate 1563590420300966200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2120 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2122 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2123 Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +peer0.org1.example.com | 00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2124 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +peer0.org1.example.com | 00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +peer0.org1.example.com | 00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +peer0.org1.example.com | 00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +peer0.org1.example.com | 00000040 12 14 a9 de 14 fb |......|" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2125 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2126 Verify: sig = 00000000 30 44 02 20 2d ba 51 f4 8a 64 9d 24 9e 51 64 d0 |0D. -.Q..d.$.Qd.| +peer0.org1.example.com | 00000010 43 09 85 6d e2 51 b3 cb 56 0c 62 ba 3c 11 f8 03 |C..m.Q..V.b.<...| +peer0.org1.example.com | 00000020 d6 72 b4 ef 02 20 7f 19 2b ab 8c e3 a1 5a 6b f0 |.r... ..+....Zk.| +peer0.org1.example.com | 00000030 58 b0 bc d6 1a b0 46 0e 6c 40 a3 8e 54 73 5a 63 |X.....F.l@..TsZc| +peer0.org1.example.com | 00000040 e3 11 28 fd 0a 7d |..(..}|" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] isSentByMe -> DEBU 2128 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2129 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.gossip] handleMessage -> DEBU 212a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 212b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.367 UTC [gossip.comm] func1 -> DEBU 212c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.368 UTC [gossip.gossip] handleMessage -> DEBU 212d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.368 UTC [gossip.pull] HandleMessage -> DEBU 212e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.369 UTC [gossip.pull] SendDigest -> DEBU 212f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:20.369 UTC [gossip.gossip] handleMessage -> DEBU 2130 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.371 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.371 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.gossip] handleMessage -> DEBU 2133 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2134 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2135 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2136 Verify: digest = 00000000 c7 31 e2 19 58 a3 f6 b8 be 34 34 a8 ec 5c e8 9d |.1..X....44..\..| +peer0.org1.example.com | 00000010 48 9d ae 36 36 cd ca 8e b1 2f 46 d6 54 bc 3f 26 |H..66..../F.T.?&|" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2137 Verify: sig = 00000000 30 44 02 20 06 ca bf c0 84 51 4e 9b 01 3e ed 97 |0D. .....QN..>..| +peer0.org1.example.com | 00000010 a9 b1 1e c9 d4 6d ea ea d7 71 9d 86 c9 c3 31 f7 |.....m...q....1.| +peer0.org1.example.com | 00000020 a5 48 b6 4b 02 20 4c 13 b3 73 b7 34 1f 9c 7d 04 |.H.K. L..s.4..}.| +peer0.org1.example.com | 00000030 96 e1 6a c7 90 c8 3f 1d 94 1a 87 9e 1f 17 ef 0d |..j...?.........| +peer0.org1.example.com | 00000040 30 2a 69 1a 73 9b |0*i.s.|" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2138 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2139 Verify: sig = 00000000 30 44 02 20 29 a2 f3 b7 4d 89 32 2f 55 be 24 6b |0D. )...M.2/U.$k| +peer0.org1.example.com | 00000010 a0 8f 76 7a 42 fe 14 ea 54 38 0c ce ec 7f 15 f8 |..vzB...T8......| +peer0.org1.example.com | 00000020 77 fa a1 66 02 20 2f 1e f8 f2 a5 dd 0e a0 98 bd |w..f. /.........| +peer0.org1.example.com | 00000030 9f 8d 04 a3 0f 45 ec 8f ca ce 47 dd d1 40 75 05 |.....E....G..@u.| +peer0.org1.example.com | 00000040 dc b3 82 63 e5 b7 |...c..|" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 213a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 2140 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.discovery] sendMemResponse -> DEBU 2142 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.373 UTC [gossip.comm] Send -> DEBU 2145 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.discovery] sendMemResponse -> DEBU 2146 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2147 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2148 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.gossip] handleMessage -> DEBU 214a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.554 UTC [gossip.pull] HandleMessage -> DEBU 214b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.556 UTC [msp] DeserializeIdentity -> DEBU 214f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2150 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2151 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.557 UTC [gossip.pull] SendDigest -> DEBU 2152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:20.560 UTC [gossip.gossip] handleMessage -> DEBU 2153 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.comm] func1 -> DEBU 2154 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2155 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2156 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2157 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2158 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:20.562 UTC [msp] DeserializeIdentity -> DEBU 2159 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 215a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.563 UTC [policies] Evaluate -> DEBU 215d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [cauthdsl] func1 -> DEBU 2160 0xc0033afa80 gate 1563590420564792700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.564 UTC [cauthdsl] func2 -> DEBU 2161 0xc0033afa80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2162 0xc0033afa80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2163 0xc0033afa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2164 0xc0033afa80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [cauthdsl] func1 -> DEBU 2165 0xc0033afa80 gate 1563590420564792700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.565 UTC [policies] Evaluate -> DEBU 2166 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2167 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2168 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.567 UTC [cauthdsl] func1 -> DEBU 2169 0xc0031ba2c0 gate 1563590420566867700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216a 0xc0031ba2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216b 0xc0031ba2c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.570 UTC [cauthdsl] func2 -> DEBU 216c 0xc0031ba2c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.570 UTC [msp.identity] Verify -> DEBU 216d Verify: digest = 00000000 4d fc 0e 77 db 69 88 31 38 93 68 0f 5b 04 f2 09 |M..w.i.18.h.[...| +peer0.org1.example.com | 00000010 32 12 51 3d 70 3f 48 33 49 68 c7 26 13 26 87 d2 |2.Q=p?H3Ih.&.&..|" +peer0.org1.example.com | "2019-07-20 02:40:20.571 UTC [msp.identity] Verify -> DEBU 216e Verify: sig = 00000000 30 44 02 20 37 87 1a 84 16 b7 93 5f e8 af ad 0a |0D. 7......_....| +peer0.org1.example.com | 00000010 f4 b9 98 82 65 c0 32 e7 28 d3 08 27 11 4b e5 5f |....e.2.(..'.K._| +peer0.org1.example.com | 00000020 3b 36 e7 6d 02 20 4f 3c 7b cf 53 62 27 64 57 33 |;6.m. O<{.Sb'dW3| +peer0.org1.example.com | 00000030 b6 77 3a b7 1e f7 19 4a 9c 09 0b 4d dd c7 f1 f0 |.w:....J...M....| +peer0.org1.example.com | 00000040 0a e3 d1 be 6e f3 |....n.|" +peer0.org1.example.com | "2019-07-20 02:40:20.571 UTC [cauthdsl] func2 -> DEBU 216f 0xc0031ba2c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.572 UTC [cauthdsl] func1 -> DEBU 2170 0xc0031ba2c0 gate 1563590420566867700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.572 UTC [policies] Evaluate -> DEBU 2171 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2173 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2174 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2175 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2176 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2177 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2178 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2179 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 217a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.576 UTC [gossip.discovery] handleAliveMessage -> DEBU 217b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.578 UTC [gossip.discovery] sendMemResponse -> DEBU 217c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] Send -> DEBU 2180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2181 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2183 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2184 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [dockercontroller] Start -> DEBU 2185 Started container dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2186 container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2187 waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2188 got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2189 container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-07-20 02:40:20.717 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.719 UTC [msp] DeserializeIdentity -> DEBU 218b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.720 UTC [gossip.comm] Send -> DEBU 218c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.720 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.721 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2191 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.729 UTC [gossip.gossip] handleMessage -> DEBU 2194 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2192 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.729 UTC [msp] DeserializeIdentity -> DEBU 2195 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.731 UTC [msp] DeserializeIdentity -> DEBU 2197 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.732 UTC [msp] DeserializeIdentity -> DEBU 2199 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.730 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.732 UTC [gossip.comm] func1 -> DEBU 2198 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.735 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 219a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.743 UTC [cauthdsl] func1 -> DEBU 21a0 0xc003125d80 gate 1563590420743984900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a1 0xc003125d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a2 0xc003125d80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a3 0xc003125d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a4 0xc003125d80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [cauthdsl] func1 -> DEBU 21a5 0xc003125d80 gate 1563590420743984900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.744 UTC [policies] Evaluate -> DEBU 21a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0031165c0 gate 1563590420745495300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.745 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0031165c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0031165c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0031165c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ad Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ae Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [cauthdsl] func2 -> DEBU 21af 0xc0031165c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0031165c0 gate 1563590420745495300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.747 UTC [policies] Evaluate -> DEBU 21b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.749 UTC [policies] Evaluate -> DEBU 21b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.749 UTC [msp] DeserializeIdentity -> DEBU 21b5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.750 UTC [msp] DeserializeIdentity -> DEBU 21b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.751 UTC [gossip.pull] Hello -> DEBU 21b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:20.752 UTC [msp] DeserializeIdentity -> DEBU 21b8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.753 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.754 UTC [gossip.comm] Send -> DEBU 21ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:20.756 UTC [gossip.comm] sendToEndpoint -> DEBU 21bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.758 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21bf Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21c0 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:20.760 UTC [gossip.comm] func1 -> DEBU 21c1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.766 UTC [cauthdsl] func1 -> DEBU 21ca 0xc0030f3a30 gate 1563590420766558700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.766 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0030f3a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0030f3a30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cd 0xc0030f3a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21ce 0xc0030f3a30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.767 UTC [cauthdsl] func1 -> DEBU 21cf 0xc0030f3a30 gate 1563590420766558700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.768 UTC [cauthdsl] func1 -> DEBU 21d3 0xc0030da2c0 gate 1563590420768941600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d4 0xc0030da2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d5 0xc0030da2c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d6 0xc0030da2c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [cauthdsl] func2 -> DEBU 21d9 0xc0030da2c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [cauthdsl] func1 -> DEBU 21da 0xc0030da2c0 gate 1563590420768941600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.770 UTC [policies] Evaluate -> DEBU 21db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21e0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [chaincode.accesscontrol] authenticate -> DEBU 21e3 Chaincode exp02:1.0 's authentication is authorized" +peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e4 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e5 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:20.776 UTC [chaincode] handleMessage -> DEBU 21e6 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21eb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [chaincode] HandleRegister -> DEBU 21e9 Received REGISTER in state created" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [chaincode] Register -> DEBU 21ed registered handler complete for chaincode exp02:1.0" +peer0.org1.example.com | "2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21ec Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [chaincode] HandleRegister -> DEBU 21ef Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f2 0xc003046bc0 gate 1563590420779005600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f3 0xc003046bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f4 0xc003046bc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f5 0xc003046bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f6 0xc003046bc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f7 0xc003046bc0 gate 1563590420779005600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [chaincode] HandleRegister -> DEBU 21f9 Changed state to established for name:"exp02:1.0" " +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [chaincode] sendReady -> DEBU 21fc sending READY for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-07-20 02:40:20.780 UTC [chaincode] sendReady -> DEBU 21fe Changed to state ready for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21fd 0xc003047400 gate 1563590420779979600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.780 UTC [cauthdsl] func2 -> DEBU 21ff 0xc003047400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2200 0xc003047400 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2202 0xc003047400 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [chaincode] Launch -> DEBU 2201 launch complete" +peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [chaincode] Execute -> DEBU 2203 Entry" +peer0.org1.example.com | "2019-07-20 02:40:20.781 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [cauthdsl] func2 -> DEBU 2206 0xc003047400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.782 UTC [cauthdsl] func1 -> DEBU 2207 0xc003047400 gate 1563590420779979600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 220e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 220f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2210 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func1 -> DEBU 2214 0xc002fe9900 gate 1563590420784745900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2215 0xc002fe9900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2216 0xc002fe9900 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2217 0xc002fe9900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2218 0xc002fe9900 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 2219 0xc002fe9900 gate 1563590420784745900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 221d 0xc002fae140 gate 1563590420785168500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.785 UTC [cauthdsl] func2 -> DEBU 221e 0xc002fae140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 221f 0xc002fae140 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 2220 0xc002fae140 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2221 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2222 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:20.787 UTC [chaincode] handleMessage -> DEBU 2223 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2224 [79f74fa3] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2225 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:20.790 UTC [cauthdsl] func2 -> DEBU 2226 0xc002fae140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.791 UTC [chaincode] handleMessage -> DEBU 2227 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:20.791 UTC [cauthdsl] func1 -> DEBU 2228 0xc002fae140 gate 1563590420785168500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 2229 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 222a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.793 UTC [chaincode] HandleTransaction -> DEBU 222e [79f74fa3] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [chaincode] HandleTransaction -> DEBU 2230 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:20.794 UTC [msp] DeserializeIdentity -> DEBU 2231 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2232 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2233 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2235 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [chaincode] handleMessage -> DEBU 2234 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:20.796 UTC [chaincode] Notify -> DEBU 2236 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2239 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 223a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.797 UTC [chaincode] Execute -> DEBU 2238 Exit" +peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [endorser] callChaincode -> INFO 223b [businesschannel][79f74fa3] Exit chaincode: name:"lscc" (30079ms)" +peer0.org1.example.com | "2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 223c Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] Done -> DEBU 223d Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +peer0.org1.example.com | "2019-07-20 02:40:20.800 UTC [endorser] SimulateProposal -> DEBU 223e [businesschannel][79f74fa3] Exit" +peer0.org1.example.com | "2019-07-20 02:40:20.800 UTC [endorser] endorseProposal -> DEBU 223f [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:20.801 UTC [endorser] endorseProposal -> DEBU 2240 [businesschannel][79f74fa3] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 2242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [policies] Evaluate -> DEBU 2243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.802 UTC [cauthdsl] func1 -> DEBU 2244 0xc002f89090 gate 1563590420802657900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2245 0xc002f89090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2246 0xc002f89090 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2247 Sign: plaintext: 0A204790835E071B71CF339AE73C7888...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2248 Sign: digest: 37DFF638163BF053F0A202081D973D9C0328932F16905D7CA07D4DFD41588ED9 " +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2249 0xc002f89090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 224a 0xc002f89090 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 224c 0xc002f89090 gate 1563590420802657900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 2250 0xc002f898d0 gate 1563590420804830700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2251 0xc002f898d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2252 0xc002f898d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2253 0xc002f898d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2254 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2255 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:20.804 UTC [endorser] EndorseWithPlugin -> DEBU 224b Exiting {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:20.805 UTC [endorser] endorseProposal -> DEBU 2256 [businesschannel][79f74fa3] Exit" +peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [cauthdsl] func2 -> DEBU 2257 0xc002f898d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [cauthdsl] func1 -> DEBU 2258 0xc002f898d0 gate 1563590420804830700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [lockbasedtxmgr] Done -> DEBU 2259 Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [endorser] func1 -> DEBU 225b Exit: request from 172.18.0.9:58342" +peer0.org1.example.com | "2019-07-20 02:40:20.806 UTC [policies] Evaluate -> DEBU 225a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.808 UTC [comm.grpc.server] 1 -> INFO 225c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58342 grpc.code=OK grpc.call_duration=30.0944849s +peer0.org1.example.com | "2019-07-20 02:40:20.808 UTC [policies] Evaluate -> DEBU 225d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2260 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2261 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func1 -> DEBU 226a 0xc002f5d760 gate 1563590420810881700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226b 0xc002f5d760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226c 0xc002f5d760 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226d 0xc002f5d760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226e 0xc002f5d760 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 226f 0xc002f5d760 gate 1563590420810881700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2270 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 2273 0xc002f5dfa0 gate 1563590420811537400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 2274 0xc002f5dfa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2275 0xc002f5dfa0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2276 0xc002f5dfa0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [cauthdsl] func2 -> DEBU 2279 0xc002f5dfa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [cauthdsl] func1 -> DEBU 227a 0xc002f5dfa0 gate 1563590420811537400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 227f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 2280 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:20.820 UTC [gossip.gossip] handleMessage -> DEBU 2281 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.822 UTC [gossip.gossip] handleMessage -> DEBU 2282 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.823 UTC [gossip.pull] HandleMessage -> DEBU 2283 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.823 UTC [gossip.gossip] handleMessage -> DEBU 2284 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.842 UTC [grpc] infof -> DEBU 2286 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:20.834 UTC [grpc] infof -> DEBU 2285 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:20.878 UTC [gossip.comm] func1 -> DEBU 2287 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.878 UTC [gossip.gossip] handleMessage -> DEBU 2288 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:20.879 UTC [gossip.gossip] handleMessage -> DEBU 228b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.comm] func1 -> DEBU 228c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.gossip] handleMessage -> DEBU 228d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.908 UTC [gossip.pull] HandleMessage -> DEBU 228e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:20.909 UTC [gossip.pull] SendDigest -> DEBU 228f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:20.909 UTC [gossip.gossip] handleMessage -> DEBU 2290 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:21.998 UTC [gossip.election] waitForInterrupt -> DEBU 2291 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.election] IsLeader -> DEBU 2292 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] GetDefaultSigningIdentity -> DEBU 2293 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2294 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510091801 " +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2295 Sign: digest: CE53D14C8BDD185163EA86423928464BF5E2185940EB5A7C1CC04771A58293DC " +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.election] waitForInterrupt -> DEBU 2296 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2297 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2298 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2299 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [gossip.comm] Send -> DEBU 229b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.comm] func1 -> DEBU 22a0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22a8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22a9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22aa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ac Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 22b0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [cauthdsl] func1 -> DEBU 22b8 0xc002a63060 gate 1563590422022870600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.022 UTC [cauthdsl] func2 -> DEBU 22b9 0xc002a63060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22ba 0xc002a63060 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bb 0xc002a63060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bc 0xc002a63060 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22bd 0xc002a63060 gate 1563590422022870600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22c1 0xc002a638a0 gate 1563590422023224000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c2 0xc002a638a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c3 0xc002a638a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c4 0xc002a638a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c5 Verify: digest = 00000000 f1 6e e7 89 d4 c4 bf 8c dc 6f 4c f9 de 91 05 dc |.n.......oL.....| +peer0.org1.example.com | 00000010 be 94 5d 61 2b 3b 79 e7 74 d5 f4 43 28 c3 69 87 |..]a+;y.t..C(.i.|" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c6 Verify: sig = 00000000 30 45 02 21 00 db 8d bb 55 89 30 0e f0 d8 88 d0 |0E.!....U.0.....| +peer0.org1.example.com | 00000010 5f 43 0c 7e e3 ea fb 4e 5b 9f 9b 55 57 38 ac 77 |_C.~...N[..UW8.w| +peer0.org1.example.com | 00000020 a3 2c 55 96 b0 02 20 46 95 b9 cd af 51 5b b0 41 |.,U... F....Q[.A| +peer0.org1.example.com | 00000030 07 0c e5 83 af e3 f8 89 b4 12 34 97 80 00 64 f7 |..........4...d.| +peer0.org1.example.com | 00000040 e2 79 b7 7e 3c 11 19 |.y.~<..|" +peer0.org1.example.com | "2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c7 0xc002a638a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [cauthdsl] func1 -> DEBU 22c8 0xc002a638a0 gate 1563590422023224000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22cf updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.comm] func1 -> DEBU 22d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22da Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22db Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.028 UTC [gossip.comm] func1 -> DEBU 22e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22e9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.227 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 22ed Sleeping 25s" +peer0.org1.example.com | "2019-07-20 02:40:22.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 22ee Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:22.238 UTC [msp.identity] Sign -> DEBU 22ef Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151020 " +peer0.org1.example.com | "2019-07-20 02:40:22.239 UTC [msp.identity] Sign -> DEBU 22f0 Sign: digest: EBDDB8E92477E63EEFA2BA9C61E1DAD7F517C2858787E52C7D65FB4EDC778900 " +peer0.org1.example.com | "2019-07-20 02:40:22.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 22f1 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:22.241 UTC [gossip.discovery] periodicalSendAlive -> DEBU 22f4 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [msp] DeserializeIdentity -> DEBU 22fa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22ff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.246 UTC [gossip.comm] sendToEndpoint -> DEBU 2300 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2301 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [endorser] ProcessProposal -> DEBU 2302 Entering: request from 172.18.0.9:58352" +peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] ValidateProposalMessage -> DEBU 2303 ValidateProposalMessage starts for signed proposal 0xc003370280" +peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] validateChannelHeader -> DEBU 2304 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:22.342 UTC [protoutils] checkSignatureFromCreator -> DEBU 2305 begin" +peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [msp] GetManagerForChain -> DEBU 2306 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2307 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2308 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:22.343 UTC [msp.identity] Verify -> DEBU 2309 Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| +peer0.org1.example.com | 00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" +peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [msp.identity] Verify -> DEBU 230a Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| +peer0.org1.example.com | 00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| +peer0.org1.example.com | 00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| +peer0.org1.example.com | 00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| +peer0.org1.example.com | 00000040 b6 15 f0 b9 47 21 01 |....G!.|" +peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] checkSignatureFromCreator -> DEBU 230b exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230c validateChaincodeProposalMessage starts for proposal 0xc0005b4460, header 0xc003370690" +peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:22.344 UTC [endorser] preProcess -> DEBU 230e [businesschannel][862a1339] processing txid: 862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 230f retrieveTransactionByID() - txId = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2310 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2311 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func1 -> DEBU 2315 0xc0029331a0 gate 1563590422345723200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2316 0xc0029331a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2317 0xc0029331a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2318 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp] Validate -> DEBU 2319 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp] getCertificationChain -> DEBU 231a MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231b 0xc0029331a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| +peer0.org1.example.com | 00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| +peer0.org1.example.com | 00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| +peer0.org1.example.com | 00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| +peer0.org1.example.com | 00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| +peer0.org1.example.com | 00000040 b6 15 f0 b9 47 21 01 |....G!.|" +peer0.org1.example.com | "2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231e 0xc0029331a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [cauthdsl] func1 -> DEBU 231f 0xc0029331a0 gate 1563590422345723200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2320 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2322 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2324 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2325 constructing new tx simulator txid = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2326 [businesschannel][862a1339] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [stateleveldb] GetState -> DEBU 2327 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2328 [businesschannel][862a1339] Exit" +peer0.org1.example.com | "2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] Done -> DEBU 2329 Done with transaction simulation / query execution [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +peer0.org1.example.com | "2019-07-20 02:40:22.348 UTC [endorser] func1 -> DEBU 232a Exit: request from 172.18.0.9:58352" +peer0.org1.example.com | "2019-07-20 02:40:22.348 UTC [comm.grpc.server] 1 -> INFO 232b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58352 grpc.code=OK grpc.call_duration=6.0452ms +peer0.org1.example.com | "2019-07-20 02:40:22.351 UTC [grpc] warningf -> DEBU 232c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58352: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:40:22.351 UTC [grpc] infof -> DEBU 232d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:22.352 UTC [grpc] infof -> DEBU 232e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.comm] func1 -> DEBU 232f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2330 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2331 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2332 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2333 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2334 Verify: digest = 00000000 68 b2 ce e5 1a bc 7e 9c ac ef cd f9 94 e8 b1 1b |h.....~.........| +peer0.org1.example.com | 00000010 11 db 9d 96 e8 0f b2 db 97 c0 3b 77 50 37 88 64 |..........;wP7.d|" +peer0.org1.example.com | "2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2335 Verify: sig = 00000000 30 45 02 21 00 af dd 12 0b 63 b8 e1 6e 01 6d 74 |0E.!.....c..n.mt| +peer0.org1.example.com | 00000010 a8 2b 6e bc 79 4b b0 d6 d9 5f 71 27 51 10 ad 99 |.+n.yK..._q'Q...| +peer0.org1.example.com | 00000020 a0 f6 24 e5 cb 02 20 77 89 1b 62 25 94 dc 07 38 |..$... w..b%...8| +peer0.org1.example.com | 00000030 28 6b 54 70 20 5e 3c a5 cd 0a 98 8e fd 9d 53 53 |(kTp ^<.......SS| +peer0.org1.example.com | 00000040 9b 69 e8 69 aa 5c b8 |.i.i.\.|" +peer0.org1.example.com | "2019-07-20 02:40:22.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 2336 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 2337 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2338 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2339 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 233c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 233d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2340 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [gossip.comm] Send -> DEBU 2341 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2342 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] Send -> DEBU 2343 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2344 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2345 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2346 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 2347 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.377 UTC [gossip.comm] func1 -> DEBU 2348 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.377 UTC [gossip.gossip] handleMessage -> DEBU 2349 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.gossip] handleMessage -> DEBU 234b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.378 UTC [gossip.comm] func1 -> DEBU 234a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.379 UTC [gossip.gossip] handleMessage -> DEBU 234e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.gossip] handleMessage -> DEBU 234f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2350 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2351 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.comm] func1 -> DEBU 2352 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2353 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2354 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2355 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2356 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [msp] DeserializeIdentity -> DEBU 2357 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2359 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 235a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func1 -> DEBU 235e 0xc0007d4190 gate 1563590422558401200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 235f 0xc0007d4190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 2360 0xc0007d4190 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2361 0xc0007d4190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2362 0xc0007d4190 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [cauthdsl] func1 -> DEBU 2363 0xc0007d4190 gate 1563590422558401200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.559 UTC [policies] Evaluate -> DEBU 2364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.560 UTC [cauthdsl] func1 -> DEBU 2367 0xc0007d4a30 gate 1563590422560915000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2368 0xc0007d4a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2369 0xc0007d4a30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236a 0xc0007d4a30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 46 8b 7b d6 90 39 0f 79 17 a9 b3 43 a0 14 fe 74 |F.{..9.y...C...t| +peer0.org1.example.com | 00000010 e4 2c e5 e6 6f 82 c6 fb ed 5b 3f c5 df fd 1b 32 |.,..o....[?....2|" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 44 02 20 16 a5 c2 0e 55 8a f8 e7 7a b4 06 29 |0D. ....U...z..)| +peer0.org1.example.com | 00000010 05 4f 88 83 a2 d5 8f f8 0d 68 ae 6a 17 d7 45 0c |.O.......h.j..E.| +peer0.org1.example.com | 00000020 a2 35 17 2b 02 20 51 ce ab c4 fc 0b d4 69 e8 65 |.5.+. Q......i.e| +peer0.org1.example.com | 00000030 66 09 be 24 f4 e1 8e f1 8f 5f 09 d4 7b d8 c5 ac |f..$....._..{...| +peer0.org1.example.com | 00000040 49 bc 10 5e 80 94 |I..^..|" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236d 0xc0007d4a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [cauthdsl] func1 -> DEBU 236e 0xc0007d4a30 gate 1563590422560915000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.561 UTC [policies] Evaluate -> DEBU 236f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2370 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2371 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2372 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2373 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2374 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2375 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2376 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2377 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2378 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2379 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 2380 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2381 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2382 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2383 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2384 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.565 UTC [msp] DeserializeIdentity -> DEBU 2385 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2386 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2387 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2388 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2389 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 238f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2390 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2391 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2392 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2393 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2394 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2395 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2396 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2397 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp] DeserializeIdentity -> DEBU 2398 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp.identity] newIdentity -> DEBU 2399 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS +peer0.org1.example.com | hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg +peer0.org1.example.com | rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC +peer0.org1.example.com | dg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func1 -> DEBU 239a 0xc0007338d0 gate 1563590422852774600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239b 0xc0007338d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239c 0xc0007338d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.852 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 239d Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp] Validate -> DEBU 239e MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 239f 0xc0007338d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a0 Verify: digest = 00000000 8c b8 01 77 65 0b a3 0a 0a fc 6f 48 84 dd 2f 3f |...we.....oH../?| +peer0.org1.example.com | 00000010 f7 69 6f 14 28 21 3d 73 f7 2d d8 56 d4 4e 22 80 |.io.(!=s.-.V.N".|" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a1 Verify: sig = 00000000 30 44 02 20 2f ab 29 ad 54 0d 53 67 d2 ab 50 ad |0D. /.).T.Sg..P.| +peer0.org1.example.com | 00000010 c5 98 64 da 4e 92 02 d8 f9 73 20 b4 ff 23 5c a5 |..d.N....s ..#\.| +peer0.org1.example.com | 00000020 ff 27 12 3e 02 20 0f ac fb c2 41 bc 8d bb 20 08 |.'.>. ....A... .| +peer0.org1.example.com | 00000030 16 c9 b0 a9 58 0b fb cb 0e a5 08 54 64 68 40 27 |....X......Tdh@'| +peer0.org1.example.com | 00000040 7f 8c df 1b 24 f0 |....$.|" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 23a2 0xc0007338d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [cauthdsl] func1 -> DEBU 23a3 0xc0007338d0 gate 1563590422852774600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a6 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [policies] Evaluate -> DEBU 23a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [blocksProvider] DeliverBlocks -> DEBU 23a8 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.855 UTC [gossip.state] addPayload -> DEBU 23a9 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] addPayload -> DEBU 23aa Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ab [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ac [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> INFO 23ad [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> DEBU 23af [businesschannel] Validating block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b0 [businesschannel] START Block Validation for block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b1 expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [committer.txvalidator] validateTx -> DEBU 23b2 [businesschannel] validateTx starts for block 0xc0006949c0 env 0xc003371810 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:22.856 UTC [blocksProvider] DeliverBlocks -> DEBU 23ae [businesschannel] Gossiping block [3], peers number [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.857 UTC [protoutils] ValidateTransaction -> DEBU 23b3 ValidateTransactionEnvelope starts for envelope 0xc003371810" +peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] ValidateTransaction -> DEBU 23b4 Header is channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " +peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] validateChannelHeader -> DEBU 23b5 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b6 begin" +peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [msp] GetManagerForChain -> DEBU 23b7 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b9 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:22.859 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +peer0.org1.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +peer0.org1.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +peer0.org1.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +peer0.org1.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +peer0.org1.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" +peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 23bc exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23bd validateEndorserTransaction starts for data 0xc00323ca80, header channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " +peer0.org1.example.com | "2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23be validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [protoutils] validateEndorserTransaction -> DEBU 23bf validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-07-20 02:40:22.858 UTC [gossip.channel] AddToMsgStore -> DEBU 23c0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [protoutils] ValidateTransaction -> DEBU 23c1 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [committer.txvalidator] validateTx -> DEBU 23c2 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:22.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23c3 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] validateTx -> DEBU 23c4 Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23c5 [businesschannel] VSCCValidateTx starts for bytes 0xc003bad000" +peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [gossip.pull] Add -> DEBU 23c6 Added 3, total items: 3" +peer0.org1.example.com | "2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 23c7 Validating Tx 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23ca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23cb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.863 UTC [gossip.comm] Send -> DEBU 23cc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23cd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23ce Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23d0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:22.869 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23d1 constructing new query executor txid = [dd0ee138-c617-46cb-98a9-fae76c835f47]" +peer0.org1.example.com | "2019-07-20 02:40:22.870 UTC [lockbasedtxmgr] Done -> DEBU 23d2 Done with transaction simulation / query execution [dd0ee138-c617-46cb-98a9-fae76c835f47]" +peer0.org1.example.com | "2019-07-20 02:40:22.871 UTC [msp] DeserializeIdentity -> DEBU 23d3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:22.872 UTC [msp.identity] newIdentity -> DEBU 23d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func1 -> DEBU 23d5 0xc0006bb9b0 gate 1563590422873396500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d6 0xc0006bb9b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d7 0xc0006bb9b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 23d8 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:22.873 UTC [msp] Validate -> DEBU 23d9 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:22.876 UTC [msp] getCertificationChain -> DEBU 23da MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:22.877 UTC [cauthdsl] func2 -> DEBU 23db 0xc0006bb9b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.877 UTC [msp.identity] Verify -> DEBU 23dc Verify: digest = 00000000 37 df f6 38 16 3b f0 53 f0 a2 02 08 1d 97 3d 9c |7..8.;.S......=.| +peer0.org1.example.com | 00000010 03 28 93 2f 16 90 5d 7c a0 7d 4d fd 41 58 8e d9 |.(./..]|.}M.AX..|" +peer0.org1.example.com | "2019-07-20 02:40:22.878 UTC [msp.identity] Verify -> DEBU 23dd Verify: sig = 00000000 30 43 02 20 1b 72 18 31 bd 18 67 a2 cd 03 ca 91 |0C. .r.1..g.....| +peer0.org1.example.com | 00000010 cb 37 6c 80 76 45 b9 6c f3 20 09 f6 4b 83 fd 0d |.7l.vE.l. ..K...| +peer0.org1.example.com | 00000020 34 a4 1b 10 02 1f 2e cb 8a df 0f 19 1b 54 e4 9a |4............T..| +peer0.org1.example.com | 00000030 d8 18 2b f3 83 42 4a 03 5a 19 be 2b 47 b4 bb c4 |..+..BJ.Z..+G...| +peer0.org1.example.com | 00000040 df f8 47 dc 1f |..G..|" +peer0.org1.example.com | "2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23de 0xc0006bb9b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23df 0xc0006bb9b0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e0 0xc0006bb9b0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e1 0xc0006bb9b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.881 UTC [cauthdsl] func1 -> DEBU 23e2 0xc0006bb9b0 gate 1563590422873396500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] Validate -> DEBU 23e3 VSCC info: doing special validation for LSCC" +peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e4 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e5 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e6 Namespace exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e7 Namespace lscc" +peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23e8 constructing new query executor txid = [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" +peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [stateleveldb] GetState -> DEBU 23e9 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] Done -> DEBU 23ea Done with transaction simulation / query execution [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" +peer0.org1.example.com | "2019-07-20 02:40:22.884 UTC [vscc] ValidateLSCCInvocation -> DEBU 23eb Validating deploy for cc exp02 version 1.0" +peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23ec constructing new query executor txid = [82bb1a55-4f36-491e-9f0c-a5955335d197]" +peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [stateleveldb] GetState -> DEBU 23ed GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] Done -> DEBU 23ee Done with transaction simulation / query execution [82bb1a55-4f36-491e-9f0c-a5955335d197]" +peer0.org1.example.com | "2019-07-20 02:40:22.887 UTC [cauthdsl] func1 -> DEBU 23ef 0xc000587cd0 gate 1563590422887178600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f0 0xc000587cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f1 0xc000587cd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f2 0xc000587cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f3 Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +peer0.org1.example.com | 00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f4 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +peer0.org1.example.com | 00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +peer0.org1.example.com | 00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +peer0.org1.example.com | 00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +peer0.org1.example.com | 00000040 d7 3e d5 8f e5 b0 |.>....|" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f5 0xc000587cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f6 0xc000587cd0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f7 0xc000587cd0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f8 0xc000587cd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [cauthdsl] func1 -> DEBU 23f9 0xc000587cd0 gate 1563590422887178600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [vscc] Validate -> DEBU 23fa block 3, namespace: lscc, tx 0 validation results is: " +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 23fb Transaction 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f appears to be valid" +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23fc [businesschannel] VSCCValidateTx completes env bytes 0xc003bad000" +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] validateTx -> DEBU 23fd [businesschannel] validateTx completes for block 0xc0006949c0 env 0xc003371810 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:22.890 UTC [committer.txvalidator] Validate -> DEBU 23fe got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:40:22.891 UTC [committer.txvalidator] Validate -> INFO 23ff [businesschannel] Validated block [3] in 34ms" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2400 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [gossip.privdata] StoreBlock -> DEBU 2401 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [kvledger] CommitWithPvtData -> DEBU 2402 [businesschannel] Validating state for block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2403 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2404 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2405 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2406 ValidateAndPrepareBatch() for block number = [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2407 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:22.893 UTC [valimpl] preprocessProtoBlock -> DEBU 2408 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [stateleveldb] GetState -> DEBU 2409 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [statebasedval] validateKVRead -> DEBU 240a Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 240b Block [3] Transaction index [0] TxId [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [valinternal] ApplyWriteSet -> DEBU 240c txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000258880), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0002588c0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc000258900)}" +peer0.org1.example.com | "2019-07-20 02:40:22.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240d validating rwset..." +peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240e postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240f ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:40:22.895 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2410 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00309b4a0)}}" +peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleStateUpdates -> INFO 2411 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [stateleveldb] GetState -> DEBU 2412 GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2413 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 2414 Created metadata tar" +peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 2415 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2416 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2417 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +peer0.org1.example.com | "2019-07-20 02:40:22.897 UTC [stateleveldb] GetState -> DEBU 2418 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2419 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 201 201 124 213 209 131 170 90 214 236 213 79 201 15 102 244 57 138 217 224 48 255 78 38 213 53 156 203 16 22 213 204 2 32 92 73 198 4 5 111 56 38 126 201 24 110 29 201 66 1 202 46 128 237 231 125 50 102 55 17 170 129 77 248 168 103]} 0x15231a0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0007d3200 0xc0007d0ba0 {{0 0} 0 0 0 0} {false}})]}" +peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [stateleveldb] GetState -> DEBU 241a GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 241b Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00049f160})}" +peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241c [businesschannel] Adding CommitHash to the block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241d [businesschannel] Committing block [3] to storage" +peer0.org1.example.com | "2019-07-20 02:40:22.899 UTC [ledgerstorage] CommitWithPvtData -> DEBU 241e Writing block [3] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:40:22.901 UTC [pvtdatastorage] Prepare -> DEBU 241f Saved 0 private data write sets for block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2420 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= +peer0.org1.example.com | txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2421 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to txid-index" +peer0.org1.example.com | "2019-07-20 02:40:22.904 UTC [fsblkstorage] indexBlock -> DEBU 2422 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx number:[0] ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:40:22.907 UTC [fsblkstorage] updateCheckpoint -> DEBU 2423 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76025], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | "2019-07-20 02:40:22.908 UTC [pvtdatastorage] Commit -> DEBU 2424 Committing private data for block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.910 UTC [pvtdatastorage] Commit -> DEBU 2425 Committed private data for block [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.911 UTC [kvledger] CommitWithPvtData -> DEBU 2426 [businesschannel] Committing block [3] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:40:22.911 UTC [lockbasedtxmgr] Commit -> DEBU 2427 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 2428 Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2429 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 242a Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:22.913 UTC [stateleveldb] ApplyUpdates -> DEBU 242b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242d Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] Commit -> DEBU 242e Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 242f Preparing potential purge list working-set for expiringAtBlk [4]" +peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2430 constructing new query executor txid = [3b620695-cd97-4774-aa6c-670f7a63026d]" +peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 2431 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [stateleveldb] GetState -> DEBU 2432 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2433 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +peer0.org1.example.com | "2019-07-20 02:40:22.917 UTC [lockbasedtxmgr] Done -> DEBU 2434 Done with transaction simulation / query execution [3b620695-cd97-4774-aa6c-670f7a63026d]" +peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 2435 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [msp] GetDefaultSigningIdentity -> DEBU 2436 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:22.918 UTC [msp.identity] Sign -> DEBU 2437 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08031A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-07-20 02:40:22.919 UTC [msp.identity] Sign -> DEBU 2438 Sign: digest: F57E1C530C7035E35585EC6DB2FD52DEB073123D88DCDEDA3469126395DE6470 " +peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2439 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-07-20 02:40:22.916 UTC [leveldbhelper] GetIterator -> DEBU 243a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [lockbasedtxmgr] func1 -> DEBU 243b launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [kvledger] CommitWithPvtData -> DEBU 243c [businesschannel] Committing block [3] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [historyleveldb] Commit -> DEBU 243d Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:40:22.920 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 243e No expiry entry found for expiringAtBlk [4]" +peer0.org1.example.com | "2019-07-20 02:40:22.922 UTC [historyleveldb] Commit -> DEBU 243f Channel [businesschannel]: Updates committed to history database for blockNo [3]" +peer0.org1.example.com | "2019-07-20 02:40:22.922 UTC [kvledger] CommitWithPvtData -> INFO 2440 [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=6ms block_and_pvtdata_commit=11ms state_commit=9ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp] GetDefaultSigningIdentity -> DEBU 2441 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2442 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08041A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2443 Sign: digest: BF89A0C215F21F47A90AE4FECE47C8598012A62D55BBCAD57DA7449BE32BD4F1 " +peer0.org1.example.com | "2019-07-20 02:40:22.923 UTC [gossip.state] commitBlock -> DEBU 2444 [businesschannel] Committed block [3] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:40:23.929 UTC [gossip.comm] func1 -> DEBU 2445 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.930 UTC [gossip.gossip] handleMessage -> DEBU 2446 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.931 UTC [gossip.gossip] handleMessage -> DEBU 2447 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2448 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2449 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:23.933 UTC [msp] DeserializeIdentity -> DEBU 244a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 244b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:23.936 UTC [policies] Evaluate -> DEBU 244e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 244f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 2450 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func1 -> DEBU 2451 0xc00049b6c0 gate 1563590423938160300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2452 0xc00049b6c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2453 0xc00049b6c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2454 0xc00049b6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2455 0xc00049b6c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 2456 0xc00049b6c0 gate 1563590423938160300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2457 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2458 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 245a 0xc00049bf00 gate 1563590423939786700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 245b 0xc00049bf00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245c 0xc00049bf00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245d 0xc00049bf00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245e Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| +peer0.org1.example.com | 00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" +peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245f Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| +peer0.org1.example.com | 00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| +peer0.org1.example.com | 00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| +peer0.org1.example.com | 00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| +peer0.org1.example.com | 00000040 16 dd 0a 2d 86 f3 96 |...-...|" +peer0.org1.example.com | "2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 2460 0xc00049bf00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [cauthdsl] func1 -> DEBU 2461 0xc00049bf00 gate 1563590423939786700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2462 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2464 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [policies] Evaluate -> DEBU 2465 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 2467 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2468 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2469 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 246c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 246d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [gossip.discovery] sendMemResponse -> DEBU 246e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:23.944 UTC [msp] DeserializeIdentity -> DEBU 246f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.comm] func1 -> DEBU 2470 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.gossip] handleMessage -> DEBU 2471 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [gossip.pull] HandleMessage -> DEBU 2473 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2474 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.945 UTC [msp] DeserializeIdentity -> DEBU 2472 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2476 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2477 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2478 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 2479 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.pull] SendDigest -> DEBU 247b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.948 UTC [gossip.comm] Send -> DEBU 247d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:23.949 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020$" signature:"0E\002!\000\257\335\022\013c\270\341n\001mt\250+n\274yK\260\326\331_q'Q\020\255\231\240\366$\345\313\002 w\211\033b%\224\334\0078(kTp ^<\245\315\n\230\216\375\235SS\233i\350i\252\\\270" > alive: alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2481 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2482 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2483 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2484 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.pull] Hello -> DEBU 2485 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] Send -> DEBU 2486 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2487 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2488 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 2489 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.257 UTC [gossip.comm] func1 -> DEBU 248b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.pull] HandleMessage -> DEBU 248d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.comm] func1 -> DEBU 2490 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.gossip] handleMessage -> DEBU 2491 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.pull] HandleMessage -> DEBU 2492 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.260 UTC [gossip.gossip] handleMessage -> DEBU 2493 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.259 UTC [gossip.comm] sendToEndpoint -> DEBU 2494 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.comm] func1 -> DEBU 2495 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2496 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.pull] HandleMessage -> DEBU 2497 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2498 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2499 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151021 " +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249b Sign: digest: 086E8AFDC0D95B46BA6F5676E9FFC6D08AB168E789B5C7D3982A0EFD3FDED97B " +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 249c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 249f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.299 UTC [gossip.comm] func1 -> DEBU 24aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.299 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.gossip] handleMessage -> DEBU 24ac Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.300 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24af Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +peer0.org1.example.com | "2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24b0 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] isSentByMe -> DEBU 24b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.304 UTC [gossip.gossip] handleMessage -> DEBU 24b6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.305 UTC [gossip.gossip] handleMessage -> DEBU 24b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24bb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.306 UTC [msp.identity] Verify -> DEBU 24bc Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [msp.identity] Verify -> DEBU 24bd Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24be Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] isSentByMe -> DEBU 24bf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.308 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.309 UTC [cauthdsl] func1 -> DEBU 24c9 0xc00044ebf0 gate 1563590424309885400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24ca 0xc00044ebf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cb 0xc00044ebf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cc 0xc00044ebf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cd 0xc00044ebf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [cauthdsl] func1 -> DEBU 24ce 0xc00044ebf0 gate 1563590424309885400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func1 -> DEBU 24d2 0xc00044f580 gate 1563590424310987600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d3 0xc00044f580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00044f580 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00044f580 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d6 Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| +peer0.org1.example.com | 00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" +peer0.org1.example.com | "2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d7 Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| +peer0.org1.example.com | 00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| +peer0.org1.example.com | 00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| +peer0.org1.example.com | 00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| +peer0.org1.example.com | 00000040 16 dd 0a 2d 86 f3 96 |...-...|" +peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [cauthdsl] func2 -> DEBU 24d8 0xc00044f580 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [cauthdsl] func1 -> DEBU 24d9 0xc00044f580 gate 1563590424310987600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.312 UTC [policies] Evaluate -> DEBU 24da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24e2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.314 UTC [gossip.gossip] handleMessage -> DEBU 24e3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e4 Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +peer0.org1.example.com | 00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e5 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +peer0.org1.example.com | 00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +peer0.org1.example.com | 00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +peer0.org1.example.com | 00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +peer0.org1.example.com | 00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e7 Verify: sig = 00000000 30 44 02 20 0e 9c 8d a2 0e f2 2a e5 9b b6 17 d3 |0D. ......*.....| +peer0.org1.example.com | 00000010 ac 3a c0 37 a4 0a 51 12 b7 f2 a7 78 69 65 16 5d |.:.7..Q....xie.]| +peer0.org1.example.com | 00000020 22 16 c0 19 02 20 74 42 a4 00 5d 04 90 54 fb b3 |".... tB..]..T..| +peer0.org1.example.com | 00000030 18 89 61 bb 4b a0 27 eb c0 7a 18 20 6b a9 6e 5b |..a.K.'..z. k.n[| +peer0.org1.example.com | 00000040 76 47 a5 81 e4 57 |vG...W|" +peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] isSentByMe -> DEBU 24e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.comm] func1 -> DEBU 24ec Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.369 UTC [gossip.pull] HandleMessage -> DEBU 24ee GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.370 UTC [gossip.pull] SendDigest -> DEBU 24ef Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:24.370 UTC [gossip.gossip] handleMessage -> DEBU 24f0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.comm] func1 -> DEBU 24f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f6 Verify: digest = 00000000 f7 db 21 ce dd da b6 c7 68 b1 be dc 17 69 4a 9b |..!.....h....iJ.| +peer0.org1.example.com | 00000010 4e 1c 08 d7 64 40 fd 34 71 bb af 05 ca b4 96 37 |N...d@.4q......7|" +peer0.org1.example.com | "2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f7 Verify: sig = 00000000 30 45 02 21 00 a9 5d 61 2b f5 ac c6 63 89 4e fb |0E.!..]a+...c.N.| +peer0.org1.example.com | 00000010 6d 08 85 da 52 55 17 cc 93 8d 2f 40 5a 31 27 6f |m...RU..../@Z1'o| +peer0.org1.example.com | 00000020 60 28 81 78 28 02 20 34 05 05 23 bd 08 70 b9 c6 |`(.x(. 4..#..p..| +peer0.org1.example.com | 00000030 14 de 52 b0 16 16 d2 21 c8 66 04 9a 5e 48 b1 6b |..R....!.f..^H.k| +peer0.org1.example.com | 00000040 f9 63 98 57 62 85 db |.c.Wb..|" +peer0.org1.example.com | "2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f9 Verify: sig = 00000000 30 44 02 20 6f fe ab d1 9b f0 4b c4 7e fe 0f 5a |0D. o.....K.~..Z| +peer0.org1.example.com | 00000010 68 f2 ab 5a db a3 02 fa 13 ad bd 37 e4 49 a3 01 |h..Z.......7.I..| +peer0.org1.example.com | 00000020 f3 3a bb 13 02 20 65 1d ea 2a 8c 94 ee 54 27 11 |.:... e..*...T'.| +peer0.org1.example.com | 00000030 5b eb 0f c2 00 78 d8 2c 50 e9 96 8d 9c 0d 8c 79 |[....x.,P......y| +peer0.org1.example.com | 00000040 b8 75 1a 8a eb 03 |.u....|" +peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:24.379 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.379 UTC [gossip.discovery] handleAliveMessage -> DEBU 2500 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2501 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [gossip.discovery] sendMemResponse -> DEBU 2502 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:24.380 UTC [msp] DeserializeIdentity -> DEBU 2503 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.381 UTC [msp] DeserializeIdentity -> DEBU 2504 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.381 UTC [gossip.comm] Send -> DEBU 2505 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.discovery] sendMemResponse -> DEBU 2506 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2508 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.542 UTC [endorser] ProcessProposal -> DEBU 2509 Entering: request from 172.18.0.9:58356" +peer0.org1.example.com | "2019-07-20 02:40:24.542 UTC [protoutils] ValidateProposalMessage -> DEBU 250a ValidateProposalMessage starts for signed proposal 0xc002fdc370" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] validateChannelHeader -> DEBU 250b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250c begin" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp] GetManagerForChain -> DEBU 250d Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250f creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2510 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| +peer0.org1.example.com | 00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" +peer0.org1.example.com | "2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2511 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| +peer0.org1.example.com | 00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| +peer0.org1.example.com | 00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| +peer0.org1.example.com | 00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| +peer0.org1.example.com | 00000040 63 c0 3c 1d 9d 1d |c.<...|" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] checkSignatureFromCreator -> DEBU 2512 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2513 validateChaincodeProposalMessage starts for proposal 0xc0005e7f80, header 0xc002fdc780" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2514 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [endorser] preProcess -> DEBU 2515 [businesschannel][9ced4390] processing txid: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2516 retrieveTransactionByID() - txId = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2517 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2518 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 2519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func1 -> DEBU 251c 0xc000229d40 gate 1563590424545536000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251d 0xc000229d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251e 0xc000229d40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251f 0xc000229d40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| +peer0.org1.example.com | 00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" +peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| +peer0.org1.example.com | 00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| +peer0.org1.example.com | 00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| +peer0.org1.example.com | 00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| +peer0.org1.example.com | 00000040 63 c0 3c 1d 9d 1d |c.<...|" +peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [cauthdsl] func2 -> DEBU 2522 0xc000229d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [cauthdsl] func1 -> DEBU 2523 0xc000229d40 gate 1563590424545536000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.546 UTC [policies] Evaluate -> DEBU 2524 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2526 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.547 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2528 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2529 constructing new tx simulator txid = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [endorser] SimulateProposal -> DEBU 252a [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.548 UTC [stateleveldb] GetState -> DEBU 252b GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [ccprovider] GetChaincodeData -> DEBU 252c Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [endorser] callChaincode -> INFO 252d [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.549 UTC [chaincode] Execute -> DEBU 252e Entry" +peer0.org1.example.com | "2019-07-20 02:40:24.551 UTC [chaincode] handleMessage -> DEBU 252f [9ced4390] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.551 UTC [chaincode] HandleTransaction -> DEBU 2530 [9ced4390] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [chaincode] HandleGetState -> DEBU 2531 [9ced4390] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [stateleveldb] GetState -> DEBU 2532 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:24.552 UTC [chaincode] HandleTransaction -> DEBU 2533 [9ced4390] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:24.554 UTC [gossip.comm] func1 -> DEBU 2534 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [gossip.gossip] handleMessage -> DEBU 2535 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [gossip.pull] HandleMessage -> DEBU 2536 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2537 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2538 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 2539 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [gossip.pull] SendDigest -> DEBU 253d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:24.556 UTC [gossip.gossip] handleMessage -> DEBU 253e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.557 UTC [chaincode] handleMessage -> DEBU 253f [9ced4390] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.557 UTC [chaincode] Notify -> DEBU 2540 [9ced4390] notifying Txid:9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [chaincode] Execute -> DEBU 2541 Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [endorser] callChaincode -> INFO 2542 [businesschannel][9ced4390] Exit chaincode: name:"exp02" (8ms)" +peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2543 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] Done -> DEBU 2544 Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +peer0.org1.example.com | "2019-07-20 02:40:24.558 UTC [endorser] SimulateProposal -> DEBU 2545 [businesschannel][9ced4390] Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2546 [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2547 [businesschannel][9ced4390] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:24.559 UTC [endorser] EndorseWithPlugin -> DEBU 2548 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:24.560 UTC [gossip.comm] func1 -> DEBU 2549 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.565 UTC [msp.identity] Sign -> DEBU 254a Sign: plaintext: 0A2097CB3F03F46412D05C11B69168FC...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [msp.identity] Sign -> DEBU 254c Sign: digest: A2BFD1B59AE6A062AA9F49715A99F6F5A4AC22E447B5BA55A700F061CA54F3E7 " +peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [endorser] EndorseWithPlugin -> DEBU 254d Exiting {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [endorser] endorseProposal -> DEBU 254e [businesschannel][9ced4390] Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [lockbasedtxmgr] Done -> DEBU 254f Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [endorser] func1 -> DEBU 2550 Exit: request from 172.18.0.9:58356" +peer0.org1.example.com | "2019-07-20 02:40:24.566 UTC [gossip.gossip] handleMessage -> DEBU 254b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [comm.grpc.server] 1 -> INFO 2551 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58356 grpc.code=OK grpc.call_duration=25.1225ms +peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2553 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2554 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:24.568 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.567 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2557 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2558 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2559 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:24.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 255a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [policies] Evaluate -> DEBU 255d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func1 -> DEBU 255e 0xc00027b190 gate 1563590424574399600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 255f 0xc00027b190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 2560 0xc00027b190 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2561 0xc00027b190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2562 0xc00027b190 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [cauthdsl] func1 -> DEBU 2563 0xc00027b190 gate 1563590424574399600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.575 UTC [policies] Evaluate -> DEBU 2564 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2566 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func1 -> DEBU 2567 0xc00027ba40 gate 1563590424576595400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2568 0xc00027ba40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2569 0xc00027ba40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256a 0xc00027ba40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256b Verify: digest = 00000000 41 b0 db f9 9c d3 07 22 e0 f1 0f a6 45 df 28 d5 |A......"....E.(.| +peer0.org1.example.com | 00000010 17 04 4e 0f 92 f8 eb 0e 36 59 06 81 4e 27 04 4a |..N.....6Y..N'.J|" +peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256c Verify: sig = 00000000 30 44 02 20 14 8e 2e 3b 7a 79 e9 a8 e3 4d ad a8 |0D. ...;zy...M..| +peer0.org1.example.com | 00000010 da d9 de 22 30 55 a7 77 4a ac 5e 17 7d d4 33 76 |..."0U.wJ.^.}.3v| +peer0.org1.example.com | 00000020 eb 3e bc 24 02 20 48 de 27 64 5d 20 89 e3 ab c6 |.>.$. H.'d] ....| +peer0.org1.example.com | 00000030 85 6e 79 7e 3e 04 4f 44 a9 94 c8 36 46 63 d3 c4 |.ny~>.OD...6Fc..| +peer0.org1.example.com | 00000040 3e 9f 0e e2 b1 ab |>.....|" +peer0.org1.example.com | "2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256d 0xc00027ba40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [cauthdsl] func1 -> DEBU 256e 0xc00027ba40 gate 1563590424576595400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 256f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2570 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2571 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2572 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.578 UTC [gossip.discovery] handleAliveMessage -> DEBU 2573 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2574 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2575 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2576 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2577 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2578 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] handleAliveMessage -> DEBU 2579 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU 257a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [gossip.discovery] sendMemResponse -> DEBU 257b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] Send -> DEBU 257f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2580 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2581 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.581 UTC [gossip.discovery] sendMemResponse -> DEBU 2582 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" > alive:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +peer0.org1.example.com | "2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2584 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] Send -> DEBU 2585 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [gossip.comm] func1 -> DEBU 258c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [gossip.gossip] handleMessage -> DEBU 258d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.720 UTC [msp.identity] Verify -> DEBU 258e Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:24.721 UTC [msp.identity] Verify -> DEBU 258f Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:24.721 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2592 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2593 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2594 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.722 UTC [policies] Evaluate -> DEBU 2595 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2596 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func1 -> DEBU 2598 0xc0002ecf80 gate 1563590424723322000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 2599 0xc0002ecf80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259b 0xc0002ecf80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [gossip.comm] func1 -> DEBU 259a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259c 0xc0002ecf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [cauthdsl] func2 -> DEBU 259d 0xc0002ecf80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [cauthdsl] func1 -> DEBU 259e 0xc0002ecf80 gate 1563590424723322000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.726 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [gossip.comm] Send -> DEBU 25a3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [gossip.comm] func1 -> DEBU 25a4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.727 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.728 UTC [policies] Evaluate -> DEBU 25a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func1 -> DEBU 25a8 0xc0002eda70 gate 1563590424729010500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25aa 0xc0002eda70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ac 0xc0002eda70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ad 0xc0002eda70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [msp.identity] Verify -> DEBU 25af Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [msp.identity] Verify -> DEBU 25b1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [cauthdsl] func2 -> DEBU 25b3 0xc0002eda70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.730 UTC [cauthdsl] func1 -> DEBU 25b5 0xc0002eda70 gate 1563590424729010500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.728 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.732 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.735 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25bd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25be Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.737 UTC [policies] Evaluate -> DEBU 25bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [cauthdsl] func1 -> DEBU 25c2 0xc0003dcea0 gate 1563590424738584700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.738 UTC [cauthdsl] func2 -> DEBU 25c3 0xc0003dcea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c4 0xc0003dcea0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c5 0xc0003dcea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c6 0xc0003dcea0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.739 UTC [cauthdsl] func1 -> DEBU 25c7 0xc0003dcea0 gate 1563590424738584700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.740 UTC [cauthdsl] func1 -> DEBU 25cb 0xc0003dd810 gate 1563590424740711600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cc 0xc0003dd810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cd 0xc0003dd810 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25ce 0xc0003dd810 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25cf Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25d0 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:24.742 UTC [cauthdsl] func2 -> DEBU 25d1 0xc0003dd810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [cauthdsl] func1 -> DEBU 25d3 0xc0003dd810 gate 1563590424740711600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.743 UTC [gossip.comm] func1 -> DEBU 25d2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.746 UTC [msp.identity] Verify -> DEBU 25d8 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:24.747 UTC [msp.identity] Verify -> DEBU 25d9 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25da Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.750 UTC [cauthdsl] func1 -> DEBU 25df 0xc000716cd0 gate 1563590424750527300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e0 0xc000716cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e1 0xc000716cd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.753 UTC [cauthdsl] func2 -> DEBU 25e2 0xc000716cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.754 UTC [msp.identity] Verify -> DEBU 25e3 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [gossip.pull] Hello -> DEBU 25e7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.755 UTC [msp.identity] Verify -> DEBU 25e6 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.760 UTC [gossip.comm] Send -> DEBU 25eb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:24.761 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.757 UTC [cauthdsl] func2 -> DEBU 25ea 0xc000716cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [cauthdsl] func1 -> DEBU 25ed 0xc000716cd0 gate 1563590424750527300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [policies] Evaluate -> DEBU 25ef Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.762 UTC [gossip.comm] sendToEndpoint -> DEBU 25ee Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.764 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.766 UTC [gossip.gossip] handleMessage -> DEBU 25f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.766 UTC [msp] DeserializeIdentity -> DEBU 25f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.767 UTC [msp.identity] Verify -> DEBU 25f7 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f8 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ff Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2601 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2602 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [cauthdsl] func1 -> DEBU 2603 0xc002963630 gate 1563590424770746900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.770 UTC [cauthdsl] func2 -> DEBU 2604 0xc002963630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2605 0xc002963630 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2606 0xc002963630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2607 0xc002963630 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [cauthdsl] func1 -> DEBU 2608 0xc002963630 gate 1563590424770746900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 2609 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func1 -> DEBU 260c 0xc002963e70 gate 1563590424772207200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260d 0xc002963e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260e 0xc002963e70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260f 0xc002963e70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.773 UTC [msp.identity] Verify -> DEBU 2610 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +peer0.org1.example.com | 00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [msp.identity] Verify -> DEBU 2611 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +peer0.org1.example.com | 00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +peer0.org1.example.com | 00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +peer0.org1.example.com | 00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +peer0.org1.example.com | 00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [cauthdsl] func2 -> DEBU 2612 0xc002963e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [cauthdsl] func1 -> DEBU 2613 0xc002963e70 gate 1563590424772207200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.774 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2616 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2617 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [endorser] ProcessProposal -> DEBU 2618 Entering: request from 172.18.0.9:58360" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.775 UTC [protoutils] ValidateProposalMessage -> DEBU 261a ValidateProposalMessage starts for signed proposal 0xc002f51540" +peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [protoutils] validateChannelHeader -> DEBU 261b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [protoutils] checkSignatureFromCreator -> DEBU 261d begin" +peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [msp] GetManagerForChain -> DEBU 261e Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 261f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 2620 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:24.776 UTC [msp] DeserializeIdentity -> DEBU 261c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| +peer0.org1.example.com | 00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" +peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2623 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| +peer0.org1.example.com | 00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| +peer0.org1.example.com | 00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| +peer0.org1.example.com | 00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| +peer0.org1.example.com | 00000040 5f 7c d9 ad 57 d3 |_|..W.|" +peer0.org1.example.com | "2019-07-20 02:40:24.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2622 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2626 validateChaincodeProposalMessage starts for proposal 0xc0001485b0, header 0xc002f51950" +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2627 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [endorser] preProcess -> DEBU 2628 [businesschannel][3cf6d7e2] processing txid: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732" +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2629 retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +peer0.org1.example.com | "2019-07-20 02:40:24.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2625 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 262b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [aclmgmt] CheckACL -> DEBU 262a acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [aclmgmt] CheckACL -> DEBU 262e acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.781 UTC [cauthdsl] func1 -> DEBU 2633 0xc003a0e750 gate 1563590424781804600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2634 0xc003a0e750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2635 0xc003a0e750 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2636 0xc003a0e750 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2638 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| +peer0.org1.example.com | 00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [cauthdsl] func1 -> DEBU 2637 0xc003a0eb00 gate 1563590424782522000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2639 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| +peer0.org1.example.com | 00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| +peer0.org1.example.com | 00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| +peer0.org1.example.com | 00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| +peer0.org1.example.com | 00000040 5f 7c d9 ad 57 d3 |_|..W.|" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263a 0xc003a0eb00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263c 0xc003a0eb00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263b 0xc003a0e750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func1 -> DEBU 263d 0xc003a0e750 gate 1563590424781804600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 263e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 2640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263f 0xc003a0eb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2641 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [cauthdsl] func2 -> DEBU 2642 0xc003a0eb00 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [cauthdsl] func1 -> DEBU 2644 0xc003a0eb00 gate 1563590424782522000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2648 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2649 constructing new tx simulator txid = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [endorser] SimulateProposal -> DEBU 264b [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [stateleveldb] GetState -> DEBU 264c GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [ccprovider] GetChaincodeData -> DEBU 264d Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:24.786 UTC [endorser] callChaincode -> INFO 264e [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.786 UTC [chaincode] Execute -> DEBU 264f Entry" +peer0.org1.example.com | "2019-07-20 02:40:24.785 UTC [cauthdsl] func1 -> DEBU 264a 0xc00055f7a0 gate 1563590424785318600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [chaincode] handleMessage -> DEBU 2651 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2650 0xc00055f7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2652 0xc00055f7a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2653 0xc00055f7a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.787 UTC [chaincode] HandleTransaction -> DEBU 2654 [3cf6d7e2] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [chaincode] HandleGetState -> DEBU 2656 [3cf6d7e2] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [stateleveldb] GetState -> DEBU 2657 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [chaincode] HandleTransaction -> DEBU 2658 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2655 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2659 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [cauthdsl] func2 -> DEBU 265a 0xc00055f7a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [cauthdsl] func1 -> DEBU 265b 0xc00055f7a0 gate 1563590424785318600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [msp] DeserializeIdentity -> DEBU 2661 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2662 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2663 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2665 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2666 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func1 -> DEBU 2667 0xc003b4cc60 gate 1563590424790742400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2668 0xc003b4cc60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2669 0xc003b4cc60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266a 0xc003b4cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266b 0xc003b4cc60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [cauthdsl] func1 -> DEBU 266c 0xc003b4cc60 gate 1563590424790742400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.789 UTC [chaincode] handleMessage -> DEBU 2660 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func1 -> DEBU 2671 0xc003b4d510 gate 1563590424792004600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2672 0xc003b4d510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2673 0xc003b4d510 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2674 0xc003b4d510 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.792 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:24.791 UTC [chaincode] HandleTransaction -> DEBU 2670 [3cf6d7e2] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:24.793 UTC [chaincode] HandleGetState -> DEBU 2676 [3cf6d7e2] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:24.794 UTC [stateleveldb] GetState -> DEBU 2677 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-07-20 02:40:24.794 UTC [chaincode] HandleTransaction -> DEBU 2678 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:24.793 UTC [msp.identity] Verify -> DEBU 2679 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [cauthdsl] func2 -> DEBU 267a 0xc003b4d510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [cauthdsl] func1 -> DEBU 267b 0xc003b4d510 gate 1563590424792004600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [policies] Evaluate -> DEBU 267f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2681 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.796 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2683 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +peer0.org1.example.com | 00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2684 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +peer0.org1.example.com | 00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +peer0.org1.example.com | 00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +peer0.org1.example.com | 00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +peer0.org1.example.com | 00000040 d2 41 7c 47 6f 15 |.A|Go.|" +peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2685 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2686 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2687 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2689 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 268a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.799 UTC [cauthdsl] func1 -> DEBU 268e 0xc0036e5740 gate 1563590424799839700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 268f 0xc0036e5740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2690 0xc0036e5740 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2691 0xc0036e5740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2692 0xc0036e5740 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2693 0xc0036e5740 gate 1563590424799839700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2694 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2697 0xc0036e5f80 gate 1563590424800963900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.798 UTC [chaincode] handleMessage -> DEBU 2688 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 2698 0xc0036e5f80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 2699 [3cf6d7e2] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269a 0xc0036e5f80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 269b [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269c 0xc0036e5f80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 269e Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +peer0.org1.example.com | 00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [chaincode] handleMessage -> DEBU 269d [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 269f [3cf6d7e2] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 26a0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +peer0.org1.example.com | 00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +peer0.org1.example.com | 00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +peer0.org1.example.com | 00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +peer0.org1.example.com | 00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 26a1 [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] handleMessage -> DEBU 26a3 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] Notify -> DEBU 26a4 [3cf6d7e2] notifying Txid:3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [chaincode] Execute -> DEBU 26a5 Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] callChaincode -> INFO 26a6 [businesschannel][3cf6d7e2] Exit chaincode: name:"exp02" (18ms)" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 26a7 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] Done -> DEBU 26a8 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] SimulateProposal -> DEBU 26a9 [businesschannel][3cf6d7e2] Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26aa [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26ab [businesschannel][3cf6d7e2] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [endorser] EndorseWithPlugin -> DEBU 26ac Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ad Sign: plaintext: 0A20D3E5EF20BE3985D0A70F10BC9838...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ae Sign: digest: 4C3F23D107F594129EEAAB4C73111C5D8F880DCB0AF0F51BEE8DA03F26D71281 " +peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [endorser] EndorseWithPlugin -> DEBU 26af Exiting {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [endorser] endorseProposal -> DEBU 26b0 [businesschannel][3cf6d7e2] Exit" +peer0.org1.example.com | "2019-07-20 02:40:24.805 UTC [lockbasedtxmgr] Done -> DEBU 26b1 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +peer0.org1.example.com | "2019-07-20 02:40:24.806 UTC [endorser] func1 -> DEBU 26b2 Exit: request from 172.18.0.9:58360" +peer0.org1.example.com | "2019-07-20 02:40:24.806 UTC [comm.grpc.server] 1 -> INFO 26b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58360 grpc.code=OK grpc.call_duration=30.9885ms +peer0.org1.example.com | "2019-07-20 02:40:24.803 UTC [cauthdsl] func2 -> DEBU 26a2 0xc0036e5f80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [cauthdsl] func1 -> DEBU 26b4 0xc0036e5f80 gate 1563590424800963900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26b9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +peer0.org1.example.com | 00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +peer0.org1.example.com | "2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26ba Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +peer0.org1.example.com | 00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +peer0.org1.example.com | 00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +peer0.org1.example.com | 00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +peer0.org1.example.com | 00000040 3d a4 49 5d c4 5d bb |=.I].].|" +peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0036e1f60 gate 1563590424823548200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0036e1f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0036e1f60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0036e1f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0036e1f60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0036e1f60 gate 1563590424823548200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26cc 0xc0038e07a0 gate 1563590424824490800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cd 0xc0038e07a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26ce 0xc0038e07a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cf 0xc0038e07a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +peer0.org1.example.com | "2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [cauthdsl] func2 -> DEBU 26d2 0xc0038e07a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [cauthdsl] func1 -> DEBU 26d3 0xc0038e07a0 gate 1563590424824490800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26da Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.827 UTC [cauthdsl] func1 -> DEBU 26de 0xc0038e1880 gate 1563590424827881200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26df 0xc0038e1880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e0 0xc0038e1880 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e1 0xc0038e1880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e2 0xc0038e1880 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [cauthdsl] func1 -> DEBU 26e3 0xc0038e1880 gate 1563590424827881200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:24.829 UTC [cauthdsl] func1 -> DEBU 26e7 0xc00393e0c0 gate 1563590424828998600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:24.830 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00393e0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00393e0c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00393e0c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:24.833 UTC [msp.identity] Verify -> DEBU 26ed Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +peer0.org1.example.com | "2019-07-20 02:40:24.834 UTC [msp.identity] Verify -> DEBU 26ee Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [cauthdsl] func2 -> DEBU 26ef 0xc00393e0c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [cauthdsl] func1 -> DEBU 26f0 0xc00393e0c0 gate 1563590424828998600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:24.835 UTC [policies] Evaluate -> DEBU 26f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:24.836 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.837 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.838 UTC [msp.identity] Verify -> DEBU 26f7 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [msp.identity] Verify -> DEBU 26f8 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [msp] DeserializeIdentity -> DEBU 26f9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fb Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.840 UTC [gossip.pull] HandleMessage -> DEBU 26fc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.840 UTC [gossip.gossip] handleMessage -> DEBU 26fd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.878 UTC [gossip.comm] func1 -> DEBU 26fe Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.878 UTC [gossip.gossip] handleMessage -> DEBU 26ff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2700 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2701 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.881 UTC [gossip.gossip] handleMessage -> DEBU 2702 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.886 UTC [gossip.comm] func1 -> DEBU 2703 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.886 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:24.887 UTC [gossip.gossip] handleMessage -> DEBU 2707 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2708 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.gossip] handleMessage -> DEBU 270a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2709 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.894 UTC [msp] DeserializeIdentity -> DEBU 270d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2710 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2711 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:24.896 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:24.896 UTC [gossip.gossip] handleMessage -> DEBU 2713 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:24.902 UTC [gossip.comm] func1 -> DEBU 2714 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.pull] HandleMessage -> DEBU 2716 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:24.903 UTC [gossip.pull] SendDigest -> DEBU 2717 Sending BLOCK_MSG digest: [3 1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:24.904 UTC [gossip.gossip] handleMessage -> DEBU 2718 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:25.024 UTC [endorser] ProcessProposal -> DEBU 2719 Entering: request from 172.18.0.9:58366" +peer0.org1.example.com | "2019-07-20 02:40:25.025 UTC [protoutils] ValidateProposalMessage -> DEBU 271a ValidateProposalMessage starts for signed proposal 0xc0029a5d10" +peer0.org1.example.com | "2019-07-20 02:40:25.025 UTC [protoutils] validateChannelHeader -> DEBU 271b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 271c begin" +peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [msp] GetManagerForChain -> DEBU 271d Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:25.026 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.027 UTC [msp.identity] newIdentity -> DEBU 271f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:25.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2720 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-07-20 02:40:25.028 UTC [msp] Validate -> DEBU 2721 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [msp] getCertificationChain -> DEBU 2722 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [protoutils] checkSignatureFromCreator -> DEBU 2723 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:25.029 UTC [msp.identity] Verify -> DEBU 2724 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| +peer0.org1.example.com | 00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" +peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [msp.identity] Verify -> DEBU 2725 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| +peer0.org1.example.com | 00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| +peer0.org1.example.com | 00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| +peer0.org1.example.com | 00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| +peer0.org1.example.com | 00000040 62 a9 01 cd 92 74 |b....t|" +peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] checkSignatureFromCreator -> DEBU 2726 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2727 validateChaincodeProposalMessage starts for proposal 0xc000122f50, header 0xc00080e140" +peer0.org1.example.com | "2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2728 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [endorser] preProcess -> DEBU 2729 [businesschannel][fe4517b7] processing txid: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a" +peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 272a retrieveTransactionByID() - txId = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +peer0.org1.example.com | "2019-07-20 02:40:25.031 UTC [aclmgmt] CheckACL -> DEBU 272b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [aclmgmt] CheckACL -> DEBU 272c acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func1 -> DEBU 2730 0xc003e0d260 gate 1563590425033105300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2731 0xc003e0d260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2732 0xc003e0d260 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2733 0xc003e0d260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [cauthdsl] func2 -> DEBU 2734 0xc003e0d260 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [cauthdsl] func1 -> DEBU 2735 0xc003e0d260 gate 1563590425033105300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func1 -> DEBU 2739 0xc003e0dac0 gate 1563590425034719300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273a 0xc003e0dac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273b 0xc003e0dac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 273c Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] Validate -> DEBU 273d MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:25.035 UTC [msp] getCertificationChain -> DEBU 273e MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [cauthdsl] func2 -> DEBU 273f 0xc003e0dac0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| +peer0.org1.example.com | 00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" +peer0.org1.example.com | "2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| +peer0.org1.example.com | 00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| +peer0.org1.example.com | 00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| +peer0.org1.example.com | 00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| +peer0.org1.example.com | 00000040 62 a9 01 cd 92 74 |b....t|" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [cauthdsl] func2 -> DEBU 2742 0xc003e0dac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [cauthdsl] func1 -> DEBU 2743 0xc003e0dac0 gate 1563590425034719300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2744 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2746 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:25.037 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2748 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2749 constructing new tx simulator txid = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [endorser] SimulateProposal -> DEBU 274a [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [stateleveldb] GetState -> DEBU 274b GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [ccprovider] GetChaincodeData -> DEBU 274c Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:25.038 UTC [endorser] callChaincode -> INFO 274d [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:25.039 UTC [chaincode] Execute -> DEBU 274e Entry" +peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] handleMessage -> DEBU 274f [fe4517b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2750 [fe4517b7] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleGetState -> DEBU 2751 [fe4517b7] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [stateleveldb] GetState -> DEBU 2752 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2753 [fe4517b7] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:25.041 UTC [chaincode] handleMessage -> DEBU 2754 [fe4517b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:25.042 UTC [chaincode] Notify -> DEBU 2755 [fe4517b7] notifying Txid:fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:25.045 UTC [gossip.comm] func1 -> DEBU 2756 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2758 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [gossip.gossip] handleMessage -> DEBU 275b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [chaincode] Execute -> DEBU 275c Exit" +peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [endorser] callChaincode -> INFO 275d [businesschannel][fe4517b7] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-07-20 02:40:25.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 275e Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [lockbasedtxmgr] Done -> DEBU 275f Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] SimulateProposal -> DEBU 2760 [businesschannel][fe4517b7] Exit" +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2761 [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2762 [businesschannel][fe4517b7] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [endorser] EndorseWithPlugin -> DEBU 2763 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2764 Sign: plaintext: 0A2086BA17C4AAFC9D029031ABC2FFF8...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2765 Sign: digest: B49E3AD54A8ED894AD092B2726AC8FBC2C4B98C786E0D4605E7E46CC2F7AAA90 " +peer0.org1.example.com | "2019-07-20 02:40:25.049 UTC [endorser] EndorseWithPlugin -> DEBU 2766 Exiting {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:25.049 UTC [endorser] endorseProposal -> DEBU 2767 [businesschannel][fe4517b7] Exit" +peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [lockbasedtxmgr] Done -> DEBU 2768 Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [endorser] func1 -> DEBU 2769 Exit: request from 172.18.0.9:58366" +peer0.org1.example.com | "2019-07-20 02:40:25.050 UTC [comm.grpc.server] 1 -> INFO 276a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58366 grpc.code=OK grpc.call_duration=26.8375ms +peer0.org1.example.com | "2019-07-20 02:40:25.051 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.051 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 276e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 276f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2770 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2771 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2772 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.052 UTC [cauthdsl] func1 -> DEBU 2774 0xc003fcb870 gate 1563590425052956900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2775 0xc003fcb870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2776 0xc003fcb870 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2777 0xc003fcb870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2778 0xc003fcb870 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 2779 0xc003fcb870 gate 1563590425052956900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 277d 0xc00400e0b0 gate 1563590425053935600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277e 0xc00400e0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277f 0xc00400e0b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [cauthdsl] func2 -> DEBU 2780 0xc00400e0b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [grpc] infof -> DEBU 2781 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:25.057 UTC [msp.identity] Verify -> DEBU 2782 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:25.058 UTC [msp.identity] Verify -> DEBU 2783 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [cauthdsl] func2 -> DEBU 2784 0xc00400e0b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [cauthdsl] func1 -> DEBU 2785 0xc00400e0b0 gate 1563590425053935600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:25.059 UTC [policies] Evaluate -> DEBU 2786 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2787 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2788 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2789 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.060 UTC [gossip.gossip] handleMessage -> DEBU 278b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [gossip.comm] func1 -> DEBU 278c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [gossip.gossip] handleMessage -> DEBU 278d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.061 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.062 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 278f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2791 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2792 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.062 UTC [grpc] infof -> DEBU 2790 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func1 -> DEBU 2796 0xc003e81ea0 gate 1563590425064986200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2797 0xc003e81ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2798 0xc003e81ea0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2799 0xc003e81ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:25.066 UTC [cauthdsl] func2 -> DEBU 279a 0xc003e81ea0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.066 UTC [cauthdsl] func1 -> DEBU 279b 0xc003e81ea0 gate 1563590425064986200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func1 -> DEBU 279f 0xc0006386e0 gate 1563590425068282800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a0 0xc0006386e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a1 0xc0006386e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a2 0xc0006386e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.070 UTC [msp.identity] Verify -> DEBU 27a3 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:25.071 UTC [msp.identity] Verify -> DEBU 27a4 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [cauthdsl] func2 -> DEBU 27a5 0xc0006386e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [cauthdsl] func1 -> DEBU 27a6 0xc0006386e0 gate 1563590425068282800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:25.072 UTC [policies] Evaluate -> DEBU 27a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.073 UTC [policies] Evaluate -> DEBU 27a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27a9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.075 UTC [msp] DeserializeIdentity -> DEBU 27ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.075 UTC [gossip.gossip] handleMessage -> DEBU 27ac Exiting" +peer0.org1.example.com | "2019-07-20 02:40:25.183 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.183 UTC [gossip.gossip] handleMessage -> DEBU 27ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.186 UTC [gossip.gossip] handleMessage -> DEBU 27b2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:25.192 UTC [gossip.comm] func1 -> DEBU 27b3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.193 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:25.193 UTC [msp] DeserializeIdentity -> DEBU 27b5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27bc 0xc0007504a0 gate 1563590425196036400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bd 0xc0007504a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27be 0xc0007504a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bf 0xc0007504a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27c0 0xc0007504a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27c1 0xc0007504a0 gate 1563590425196036400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27c5 0xc000750ce0 gate 1563590425196986500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c6 0xc000750ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c7 0xc000750ce0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c8 0xc000750ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27cb 0xc000750ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27cc 0xc000750ce0 gate 1563590425196986500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [policies] Evaluate -> DEBU 27d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [msp] DeserializeIdentity -> DEBU 27d1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:25.198 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:26.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:26.845 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d4 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [cauthdsl] func1 -> DEBU 27d8 0xc000639f40 gate 1563590426847433500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:26.847 UTC [cauthdsl] func2 -> DEBU 27d9 0xc000639f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27da 0xc000639f40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27db 0xc000639f40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:26.848 UTC [msp.identity] Verify -> DEBU 27dc Verify: digest = 00000000 a0 cc 22 24 a6 fd 41 ca a8 ab e4 54 29 1b 01 20 |.."$..A....T).. | +peer0.org1.example.com | 00000010 a1 aa a0 ab 2c b6 6c 16 c4 77 ff 3d e4 2f 4b 00 |....,.l..w.=./K.|" +peer0.org1.example.com | "2019-07-20 02:40:26.849 UTC [msp.identity] Verify -> DEBU 27dd Verify: sig = 00000000 30 44 02 20 49 e5 40 e2 01 5a 4d b2 0b b1 d9 96 |0D. I.@..ZM.....| +peer0.org1.example.com | 00000010 eb ef c0 39 d8 5f 4a bf 19 95 66 d7 1b 7e 23 e4 |...9._J...f..~#.| +peer0.org1.example.com | 00000020 86 75 35 11 02 20 4a bc 32 6c e8 b3 58 8f 09 cd |.u5.. J.2l..X...| +peer0.org1.example.com | 00000030 cb 09 71 17 d5 13 8e 95 96 9a 8c 1d d1 91 07 86 |..q.............| +peer0.org1.example.com | 00000040 93 23 b1 9d cd 6e |.#...n|" +peer0.org1.example.com | "2019-07-20 02:40:26.849 UTC [cauthdsl] func2 -> DEBU 27de 0xc000639f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [cauthdsl] func1 -> DEBU 27df 0xc000639f40 gate 1563590426847433500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e2 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:26.852 UTC [blocksProvider] DeliverBlocks -> DEBU 27e4 [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.852 UTC [gossip.state] addPayload -> DEBU 27e5 [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [gossip.state] addPayload -> DEBU 27e6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [blocksProvider] DeliverBlocks -> DEBU 27e8 [businesschannel] Gossiping block [4], peers number [3]" +peer0.org1.example.com | "2019-07-20 02:40:26.853 UTC [gossip.state] deliverPayloads -> DEBU 27e7 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.854 UTC [gossip.state] deliverPayloads -> DEBU 27e9 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:40:26.854 UTC [gossip.privdata] StoreBlock -> INFO 27ea [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-07-20 02:40:26.857 UTC [gossip.privdata] StoreBlock -> DEBU 27eb [businesschannel] Validating block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ec [businesschannel] START Block Validation for block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ed expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:40:26.858 UTC [committer.txvalidator] validateTx -> DEBU 27ee [businesschannel] validateTx starts for block 0xc0004858c0 env 0xc0028bdc20 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27ef ValidateTransactionEnvelope starts for envelope 0xc0028bdc20" +peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27f0 Header is channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " +peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] validateChannelHeader -> DEBU 27f1 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:26.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f2 begin" +peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [msp] GetManagerForChain -> DEBU 27f3 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f5 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:26.861 UTC [msp.identity] Verify -> DEBU 27f6 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| +peer0.org1.example.com | 00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" +peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [msp.identity] Verify -> DEBU 27f7 Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| +peer0.org1.example.com | 00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| +peer0.org1.example.com | 00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| +peer0.org1.example.com | 00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| +peer0.org1.example.com | 00000040 95 b0 80 c3 bc 80 99 |.......|" +peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f8 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:26.862 UTC [protoutils] validateEndorserTransaction -> DEBU 27f9 validateEndorserTransaction starts for data 0xc003bdf000, header channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " +peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fa validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fb validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [protoutils] ValidateTransaction -> DEBU 27fc ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [committer.txvalidator] validateTx -> DEBU 27fd Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:26.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27fe retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [committer.txvalidator] validateTx -> DEBU 27ff Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2800 [businesschannel] VSCCValidateTx starts for bytes 0xc0004e2400" +peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2801 constructing new query executor txid = [f398664c-20c2-4d41-9183-fecba403f08a]" +peer0.org1.example.com | "2019-07-20 02:40:26.864 UTC [stateleveldb] GetState -> DEBU 2802 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:26.865 UTC [lockbasedtxmgr] Done -> DEBU 2803 Done with transaction simulation / query execution [f398664c-20c2-4d41-9183-fecba403f08a]" +peer0.org1.example.com | "2019-07-20 02:40:26.865 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2804 Validating Tx 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2805 constructing new query executor txid = [5b17155b-dc37-4fcd-8594-53903d419501]" +peer0.org1.example.com | "2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] Done -> DEBU 2806 Done with transaction simulation / query execution [5b17155b-dc37-4fcd-8594-53903d419501]" +peer0.org1.example.com | "2019-07-20 02:40:26.868 UTC [cauthdsl] func1 -> DEBU 2807 0xc002f478a0 gate 1563590426868447500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:26.869 UTC [cauthdsl] func2 -> DEBU 2808 0xc002f478a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [gossip.channel] AddToMsgStore -> DEBU 2809 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [gossip.pull] Add -> DEBU 280b Added 4, total items: 4" +peer0.org1.example.com | "2019-07-20 02:40:26.870 UTC [cauthdsl] func2 -> DEBU 280a 0xc002f478a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280c 0xc002f478a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280d Verify: digest = 00000000 4c 3f 23 d1 07 f5 94 12 9e ea ab 4c 73 11 1c 5d |L?#........Ls..]| +peer0.org1.example.com | 00000010 8f 88 0d cb 0a f0 f5 1b ee 8d a0 3f 26 d7 12 81 |...........?&...|" +peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280e Verify: sig = 00000000 30 45 02 21 00 a3 09 11 68 b6 4a cf cc b2 e0 16 |0E.!....h.J.....| +peer0.org1.example.com | 00000010 4f a8 02 f4 78 43 81 2a f3 c7 ea 8b 34 ed 79 ca |O...xC.*....4.y.| +peer0.org1.example.com | 00000020 71 f2 e0 ca 94 02 20 3c f5 44 47 2d ce fc 85 9c |q..... <.DG-....| +peer0.org1.example.com | 00000030 56 18 25 fa 92 95 2f e5 42 a2 94 96 01 72 d3 5b |V.%.../.B....r.[| +peer0.org1.example.com | 00000040 67 e8 13 66 51 b3 6b |g..fQ.k|" +peer0.org1.example.com | "2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280f 0xc002f478a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2810 0xc002f478a0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2811 0xc002f478a0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2812 0xc002f478a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [cauthdsl] func1 -> DEBU 2813 0xc002f478a0 gate 1563590426868447500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:26.873 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2814 constructing new query executor txid = [b411b15d-1b46-48d3-be14-dbe98f8da76f]" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [lockbasedtxmgr] Done -> DEBU 2815 Done with transaction simulation / query execution [b411b15d-1b46-48d3-be14-dbe98f8da76f]" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [vscc] Validate -> DEBU 2816 block 4, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2817 Transaction 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 appears to be valid" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2818 [businesschannel] VSCCValidateTx completes env bytes 0xc0004e2400" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] validateTx -> DEBU 2819 [businesschannel] validateTx completes for block 0xc0004858c0 env 0xc0028bdc20 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> DEBU 281a got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> INFO 281b [businesschannel] Validated block [4] in 18ms" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281c Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:40:26.876 UTC [gossip.privdata] StoreBlock -> DEBU 281d [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:40:26.877 UTC [kvledger] CommitWithPvtData -> DEBU 281e [businesschannel] Validating state for block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.880 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.877 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2820 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:40:26.882 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:40:26.883 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:40:26.883 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2823 ValidateAndPrepareBatch() for block number = [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.884 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:26.884 UTC [valimpl] preprocessProtoBlock -> DEBU 2825 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-07-20 02:40:26.885 UTC [msp] DeserializeIdentity -> DEBU 2826 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 2827 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [statebasedval] validateKVRead -> DEBU 2828 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 2829 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 282a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 282b GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [gossip.comm] Send -> DEBU 282c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 282e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [stateleveldb] GetState -> DEBU 282f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [statebasedval] validateKVRead -> DEBU 2830 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2831 Block [4] Transaction index [0] TxId [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [valinternal] ApplyWriteSet -> DEBU 2832 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003020a40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003020b00)}" +peer0.org1.example.com | "2019-07-20 02:40:26.890 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 validating rwset..." +peer0.org1.example.com | "2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 2835 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2836 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2837 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2838 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:40:26.895 UTC [kvledger] CommitWithPvtData -> DEBU 2839 [businesschannel] Adding CommitHash to the block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.896 UTC [kvledger] CommitWithPvtData -> DEBU 283a [businesschannel] Committing block [4] to storage" +peer0.org1.example.com | "2019-07-20 02:40:26.896 UTC [ledgerstorage] CommitWithPvtData -> DEBU 283b Writing block [4] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:40:26.903 UTC [pvtdatastorage] Prepare -> DEBU 283c Saved 0 private data write sets for block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283d Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= +peer0.org1.example.com | txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283e Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to txid-index" +peer0.org1.example.com | "2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283f Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx number:[0] ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:40:26.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 2840 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80053], isChainEmpty=[false], lastBlockNumber=[4]" +peer0.org1.example.com | "2019-07-20 02:40:26.918 UTC [pvtdatastorage] Commit -> DEBU 2841 Committing private data for block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [pvtdatastorage] Commit -> DEBU 2842 Committed private data for block [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [kvledger] CommitWithPvtData -> DEBU 2843 [businesschannel] Committing block [4] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2844 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2846 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2847 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2848 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2849 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] Commit -> DEBU 284a Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b Preparing potential purge list working-set for expiringAtBlk [5]" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] func1 -> DEBU 284c launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [kvledger] CommitWithPvtData -> DEBU 284d [businesschannel] Committing block [4] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [historyleveldb] Commit -> DEBU 284e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:40:26.928 UTC [leveldbhelper] GetIterator -> DEBU 284f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:40:26.929 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2850 No expiry entry found for expiringAtBlk [5]" +peer0.org1.example.com | "2019-07-20 02:40:26.930 UTC [historyleveldb] Commit -> DEBU 2851 Channel [businesschannel]: Updates committed to history database for blockNo [4]" +peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [kvledger] CommitWithPvtData -> INFO 2852 [businesschannel] Committed block [4] with 1 transaction(s) in 54ms (state_validation=18ms block_and_pvtdata_commit=28ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp] GetDefaultSigningIdentity -> DEBU 2853 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2854 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08051A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2855 Sign: digest: 9F8F9BA187E3D7AD25ADAB380D04A58C6823AADBBC650640B818D6D17BCA764A " +peer0.org1.example.com | "2019-07-20 02:40:26.931 UTC [gossip.state] commitBlock -> DEBU 2856 [businesschannel] Committed block [4] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:40:26.999 UTC [gossip.election] waitForInterrupt -> DEBU 2857 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.000 UTC [gossip.election] IsLeader -> DEBU 2858 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:27.000 UTC [msp] GetDefaultSigningIdentity -> DEBU 2859 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:27.001 UTC [msp.identity] Sign -> DEBU 285a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100A1801 " +peer0.org1.example.com | "2019-07-20 02:40:27.002 UTC [msp.identity] Sign -> DEBU 285b Sign: digest: 3C12A3CEC5CB7423F2D05CC1CB64C08F1FCFA25938DE5509242BEFFCB1D03575 " +peer0.org1.example.com | "2019-07-20 02:40:27.002 UTC [gossip.election] waitForInterrupt -> DEBU 285c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:27.006 UTC [gossip.comm] func1 -> DEBU 285d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.008 UTC [gossip.gossip] handleMessage -> DEBU 285e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.009 UTC [gossip.gossip] handleMessage -> DEBU 285f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2860 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2861 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:27.010 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.011 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2864 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2865 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.012 UTC [policies] Evaluate -> DEBU 2866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func1 -> DEBU 2869 0xc0033ef6f0 gate 1563590427013372300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286a 0xc0033ef6f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286b 0xc0033ef6f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286c 0xc0033ef6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286d 0xc0033ef6f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.016 UTC [cauthdsl] func1 -> DEBU 286f 0xc0033ef6f0 gate 1563590427013372300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2870 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.015 UTC [gossip.comm] func1 -> DEBU 286e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2871 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2873 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func1 -> DEBU 2874 0xc00379a040 gate 1563590427018048500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2875 0xc00379a040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2876 0xc00379a040 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2877 0xc00379a040 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2878 Verify: digest = 00000000 34 5c 18 02 4e f3 bc fb b1 a1 29 a4 92 63 c8 d0 |4\..N.....)..c..| +peer0.org1.example.com | 00000010 e0 62 df a1 90 fd 41 a8 c7 18 5c 3e 5a 8d c5 6e |.b....A...\>Z..n|" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2879 Verify: sig = 00000000 30 44 02 20 23 4e fb c3 d2 e3 f4 cc da f4 e2 3f |0D. #N.........?| +peer0.org1.example.com | 00000010 f6 47 89 14 6b f5 4f 8e cc fb 18 d3 0b 6f c4 c5 |.G..k.O......o..| +peer0.org1.example.com | 00000020 5b e7 ec 8d 02 20 77 89 48 b5 92 de 13 26 6e 5e |[.... w.H....&n^| +peer0.org1.example.com | 00000030 ee ba a7 b1 33 d2 36 d5 4b 6a 61 14 23 18 6e 25 |....3.6.Kja.#.n%| +peer0.org1.example.com | 00000040 99 37 43 15 a0 09 |.7C...|" +peer0.org1.example.com | "2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 287a 0xc00379a040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [cauthdsl] func1 -> DEBU 287b 0xc00379a040 gate 1563590427018048500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 2880 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2881 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2882 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2883 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2884 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2885 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2887 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.017 UTC [gossip.gossip] handleMessage -> DEBU 2872 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.gossip] handleMessage -> DEBU 2888 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2889 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [gossip.comm] Send -> DEBU 288f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2891 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] Send -> DEBU 2897 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [msp] DeserializeIdentity -> DEBU 2898 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] Send -> DEBU 289a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] func1 -> DEBU 2896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.024 UTC [gossip.comm] sendToEndpoint -> DEBU 28a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.026 UTC [gossip.comm] sendToEndpoint -> DEBU 28a4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.244 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a5 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151022 " +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a7 Sign: digest: 819BDFE46E1A1EE055D1141FFDE3D7554AF2B24B2F62ECB0CFC09CC56E885EFA " +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a8 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28aa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:27.312 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28ab Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [gossip.comm] Send -> DEBU 28ae Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.comm] func1 -> DEBU 28b9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28bb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28bc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.402 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28bd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28be Verify: digest = 00000000 d5 d4 12 8c 11 af 11 2f f8 85 73 66 a1 82 f1 bf |......./..sf....| +peer0.org1.example.com | 00000010 e7 f9 2c af 71 30 28 38 89 7d ec df 43 e1 3e dc |..,.q0(8.}..C.>.|" +peer0.org1.example.com | "2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28bf Verify: sig = 00000000 30 45 02 21 00 a9 07 c0 0f 0b 35 ba 37 ea 31 e4 |0E.!......5.7.1.| +peer0.org1.example.com | 00000010 7a db a5 7b 94 0f 9d 2e 5e be 4d a6 e6 b3 fa b5 |z..{....^.M.....| +peer0.org1.example.com | 00000020 ff dc 30 61 b0 02 20 62 ea df c6 5d 10 5a d8 82 |..0a.. b...].Z..| +peer0.org1.example.com | 00000030 38 99 7a 54 45 3a 92 96 e7 41 e9 cd 67 42 f0 dc |8.zTE:...A..gB..| +peer0.org1.example.com | 00000040 e0 8c 56 a8 ed 17 da |..V....|" +peer0.org1.example.com | "2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c1 Verify: sig = 00000000 30 45 02 21 00 fe b4 65 c5 5b 87 1f 40 11 77 34 |0E.!...e.[..@.w4| +peer0.org1.example.com | 00000010 39 85 1b 3a 7f 13 47 91 b3 31 12 bd 5d 72 cf a7 |9..:..G..1..]r..| +peer0.org1.example.com | 00000020 cf e8 ee 6d b2 02 20 37 91 77 c8 95 05 19 2f 4e |...m.. 7.w..../N| +peer0.org1.example.com | 00000030 68 b2 a6 a1 ea e5 9f f9 d1 e7 7b cd 79 ac 9e 50 |h.........{.y..P| +peer0.org1.example.com | 00000040 c6 0e 51 df e0 84 85 |..Q....|" +peer0.org1.example.com | "2019-07-20 02:40:27.411 UTC [gossip.comm] func1 -> DEBU 28c2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.412 UTC [gossip.comm] func1 -> DEBU 28c4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.412 UTC [gossip.gossip] handleMessage -> DEBU 28c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.408 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] handleAliveMessage -> DEBU 28cb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.419 UTC [gossip.gossip] handleMessage -> DEBU 28cd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28ce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.429 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.430 UTC [msp] DeserializeIdentity -> DEBU 28d5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28db Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.551 UTC [endorser] ProcessProposal -> DEBU 28de Entering: request from 172.18.0.9:58370" +peer0.org1.example.com | "2019-07-20 02:40:27.551 UTC [protoutils] ValidateProposalMessage -> DEBU 28df ValidateProposalMessage starts for signed proposal 0xc000596280" +peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [protoutils] validateChannelHeader -> DEBU 28e0 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e1 begin" +peer0.org1.example.com | "2019-07-20 02:40:27.552 UTC [msp] GetManagerForChain -> DEBU 28e2 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:27.553 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e3 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-07-20 02:40:27.554 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e4 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:27.554 UTC [msp.identity] Verify -> DEBU 28e5 Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| +peer0.org1.example.com | 00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" +peer0.org1.example.com | "2019-07-20 02:40:27.555 UTC [msp.identity] Verify -> DEBU 28e6 Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| +peer0.org1.example.com | 00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| +peer0.org1.example.com | 00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| +peer0.org1.example.com | 00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| +peer0.org1.example.com | 00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" +peer0.org1.example.com | "2019-07-20 02:40:27.555 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e7 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:27.556 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28e8 validateChaincodeProposalMessage starts for proposal 0xc000406700, header 0xc000596690" +peer0.org1.example.com | "2019-07-20 02:40:27.561 UTC [gossip.comm] func1 -> DEBU 28e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.565 UTC [gossip.gossip] handleMessage -> DEBU 28ea Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.566 UTC [gossip.gossip] handleMessage -> DEBU 28eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:27.568 UTC [msp] DeserializeIdentity -> DEBU 28ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.575 UTC [gossip.comm] func1 -> DEBU 28f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.576 UTC [gossip.comm] func1 -> DEBU 28f1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.578 UTC [policies] Evaluate -> DEBU 28f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.579 UTC [gossip.gossip] handleMessage -> DEBU 28f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.582 UTC [policies] Evaluate -> DEBU 28f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:27.565 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28f7 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [endorser] preProcess -> DEBU 28f9 [businesschannel][45a41d79] processing txid: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81" +peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fa retrieveTransactionByID() - txId = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +peer0.org1.example.com | "2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fb acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:27.584 UTC [policies] Evaluate -> DEBU 28f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fc acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:27.586 UTC [cauthdsl] func1 -> DEBU 28fd 0xc003ab5ab0 gate 1563590427586480900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.588 UTC [policies] Evaluate -> DEBU 2900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.589 UTC [cauthdsl] func1 -> DEBU 2902 0xc002858240 gate 1563590427589122400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.589 UTC [cauthdsl] func2 -> DEBU 2903 0xc002858240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.588 UTC [cauthdsl] func2 -> DEBU 2901 0xc003ab5ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2904 0xc003ab5ab0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2905 0xc003ab5ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2906 0xc003ab5ab0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func1 -> DEBU 2907 0xc003ab5ab0 gate 1563590427586480900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [policies] Evaluate -> DEBU 2909 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func1 -> DEBU 290c 0xc002858a80 gate 1563590427601207400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290d 0xc002858a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290e 0xc002858a80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290f 0xc002858a80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 f9 8d f8 ea 20 e1 4b 0a 33 89 a1 4a e1 65 16 14 |.... .K.3..J.e..| +peer0.org1.example.com | 00000010 88 2f 4e e4 e9 4e 05 f1 4a 0b f0 5e ea 5a cb c5 |./N..N..J..^.Z..|" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2911 Verify: sig = 00000000 30 45 02 21 00 df e9 99 b7 18 e6 f2 5b 89 92 70 |0E.!........[..p| +peer0.org1.example.com | 00000010 3a 70 57 71 5c 8f c3 19 89 a0 3b 81 8b 21 bc 6d |:pWq\.....;..!.m| +peer0.org1.example.com | 00000020 b4 24 3a 2a 10 02 20 53 cb f9 11 e8 15 28 46 8f |.$:*.. S.....(F.| +peer0.org1.example.com | 00000030 e5 66 9f cf 35 99 71 f1 2a 66 f8 0c aa cd c3 35 |.f..5.q.*f.....5| +peer0.org1.example.com | 00000040 cf 6b 12 ea 09 cb eb |.k.....|" +peer0.org1.example.com | "2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 2912 0xc002858a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [cauthdsl] func1 -> DEBU 2913 0xc002858a80 gate 1563590427601207400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2916 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 2918 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 2919 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 291e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 291f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2908 0xc002858240 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2920 0xc002858240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2922 0xc002858240 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2924 0xc002858240 gate 1563590427589122400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2925 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2926 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2927 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2928 0xc00295c3f0 gate 1563590427607262800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 2929 0xc00295c3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 292a 0xc00295c3f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [cauthdsl] func2 -> DEBU 292b 0xc00295c3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292e Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| +peer0.org1.example.com | 00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" +peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292f Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| +peer0.org1.example.com | 00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| +peer0.org1.example.com | 00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| +peer0.org1.example.com | 00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| +peer0.org1.example.com | 00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" +peer0.org1.example.com | "2019-07-20 02:40:27.611 UTC [cauthdsl] func2 -> DEBU 2930 0xc00295c3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [gossip.gossip] handleMessage -> DEBU 292c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [cauthdsl] func1 -> DEBU 2931 0xc00295c3f0 gate 1563590427607262800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2932 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2939 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.613 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2938 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:27.616 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.617 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2940 constructing new tx simulator txid = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +peer0.org1.example.com | "2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 2941 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [gossip.comm] Send -> DEBU 2942 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [msp] DeserializeIdentity -> DEBU 2943 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.619 UTC [endorser] SimulateProposal -> DEBU 2944 [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] Send -> DEBU 2945 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [stateleveldb] GetState -> DEBU 2946 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2947 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 2949 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2948 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 294a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.612 UTC [gossip.gossip] handleMessage -> DEBU 2933 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.623 UTC [ccprovider] GetChaincodeData -> DEBU 294b Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:27.623 UTC [endorser] callChaincode -> INFO 294c [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.626 UTC [chaincode] Execute -> DEBU 294d Entry" +peer0.org1.example.com | "2019-07-20 02:40:27.630 UTC [chaincode] handleMessage -> DEBU 294e [45a41d79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.631 UTC [chaincode] HandleTransaction -> DEBU 294f [45a41d79] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:27.631 UTC [chaincode] HandleGetState -> DEBU 2950 [45a41d79] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:27.632 UTC [stateleveldb] GetState -> DEBU 2951 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:27.632 UTC [chaincode] HandleTransaction -> DEBU 2952 [45a41d79] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] handleMessage -> DEBU 2953 [45a41d79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] Notify -> DEBU 2954 [45a41d79] notifying Txid:45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [chaincode] Execute -> DEBU 2955 Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [endorser] callChaincode -> INFO 2956 [businesschannel][45a41d79] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2957 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] Done -> DEBU 2958 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] SimulateProposal -> DEBU 2959 [businesschannel][45a41d79] Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295a [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295b [businesschannel][45a41d79] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [endorser] EndorseWithPlugin -> DEBU 295c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:27.635 UTC [msp.identity] Sign -> DEBU 295d Sign: plaintext: 0A206ADFF19A06A8EA4B5E0424063B24...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [msp.identity] Sign -> DEBU 295e Sign: digest: 8F0962501C35270F72ECE8639758C3F453AD626CECD34429CC2E661F87E2C9DE " +peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [endorser] EndorseWithPlugin -> DEBU 295f Exiting {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][45a41d79] Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.636 UTC [lockbasedtxmgr] Done -> DEBU 2961 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +peer0.org1.example.com | "2019-07-20 02:40:27.637 UTC [endorser] func1 -> DEBU 2962 Exit: request from 172.18.0.9:58370" +peer0.org1.example.com | "2019-07-20 02:40:27.637 UTC [comm.grpc.server] 1 -> INFO 2963 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58370 grpc.code=OK grpc.call_duration=86.3296ms +peer0.org1.example.com | "2019-07-20 02:40:27.644 UTC [grpc] infof -> DEBU 2964 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:27.647 UTC [grpc] infof -> DEBU 2965 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [endorser] ProcessProposal -> DEBU 2966 Entering: request from 172.18.0.9:58374" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] ValidateProposalMessage -> DEBU 2967 ValidateProposalMessage starts for signed proposal 0xc0005976d0" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] validateChannelHeader -> DEBU 2968 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 2969 begin" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [msp] GetManagerForChain -> DEBU 296a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 296b creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296c creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296d Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| +peer0.org1.example.com | 00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" +peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296e Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| +peer0.org1.example.com | 00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| +peer0.org1.example.com | 00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| +peer0.org1.example.com | 00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| +peer0.org1.example.com | 00000040 ba 33 01 2b 88 5d |.3.+.]|" +peer0.org1.example.com | "2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296f exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2970 validateChaincodeProposalMessage starts for proposal 0xc000406fc0, header 0xc000597ae0" +peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2971 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.841 UTC [endorser] preProcess -> DEBU 2972 [businesschannel][cf18601c] processing txid: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919" +peer0.org1.example.com | "2019-07-20 02:40:27.842 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2973 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2974 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2975 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [cauthdsl] func1 -> DEBU 2979 0xc003493650 gate 1563590427843609300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.843 UTC [cauthdsl] func2 -> DEBU 297a 0xc003493650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297b 0xc003493650 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297c 0xc003493650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297d 0xc003493650 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 297e 0xc003493650 gate 1563590427843609300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 297f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2981 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 2982 0xc003493e90 gate 1563590427844684100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2983 0xc003493e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2984 0xc003493e90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2985 0xc003493e90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2986 Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| +peer0.org1.example.com | 00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2987 Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| +peer0.org1.example.com | 00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| +peer0.org1.example.com | 00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| +peer0.org1.example.com | 00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| +peer0.org1.example.com | 00000040 ba 33 01 2b 88 5d |.3.+.]|" +peer0.org1.example.com | "2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2988 0xc003493e90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [cauthdsl] func1 -> DEBU 2989 0xc003493e90 gate 1563590427844684100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298c Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [policies] Evaluate -> DEBU 298d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 298e constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 298f constructing new tx simulator txid = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [endorser] SimulateProposal -> DEBU 2990 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [stateleveldb] GetState -> DEBU 2991 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:27.847 UTC [ccprovider] GetChaincodeData -> DEBU 2992 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:27.848 UTC [endorser] callChaincode -> INFO 2993 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.848 UTC [chaincode] Execute -> DEBU 2994 Entry" +peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] handleMessage -> DEBU 2995 [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2996 [cf18601c] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleGetState -> DEBU 2997 [cf18601c] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [stateleveldb] GetState -> DEBU 2998 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2999 [cf18601c] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:27.851 UTC [chaincode] handleMessage -> DEBU 299a [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.851 UTC [chaincode] HandleTransaction -> DEBU 299b [cf18601c] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [chaincode] HandleGetState -> DEBU 299c [cf18601c] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [stateleveldb] GetState -> DEBU 299d GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-07-20 02:40:27.852 UTC [chaincode] HandleTransaction -> DEBU 299e [cf18601c] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:27.853 UTC [chaincode] handleMessage -> DEBU 299f [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.853 UTC [chaincode] HandleTransaction -> DEBU 29a0 [cf18601c] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:27.854 UTC [chaincode] HandleTransaction -> DEBU 29a1 [cf18601c] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:27.855 UTC [chaincode] handleMessage -> DEBU 29a2 [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.855 UTC [chaincode] HandleTransaction -> DEBU 29a3 [cf18601c] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:27.856 UTC [chaincode] HandleTransaction -> DEBU 29a4 [cf18601c] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] handleMessage -> DEBU 29a5 [cf18601c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] Notify -> DEBU 29a6 [cf18601c] notifying Txid:cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:27.858 UTC [chaincode] Execute -> DEBU 29a7 Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.859 UTC [endorser] callChaincode -> INFO 29a8 [businesschannel][cf18601c] Exit chaincode: name:"exp02" (11ms)" +peer0.org1.example.com | "2019-07-20 02:40:27.859 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 29a9 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [lockbasedtxmgr] Done -> DEBU 29aa Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [endorser] SimulateProposal -> DEBU 29ab [businesschannel][cf18601c] Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.861 UTC [endorser] endorseProposal -> DEBU 29ac [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [endorser] endorseProposal -> DEBU 29ad [businesschannel][cf18601c] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [endorser] EndorseWithPlugin -> DEBU 29ae Entering endorsement for {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29af Sign: plaintext: 0A208F6E376BDBC55C3AA7239AA1D8FF...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29b0 Sign: digest: C6E111A0177E2C9B0B87802FB0AF0B6B419E7EC6C5CFFDAFEC9A9218AC29ED00 " +peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] EndorseWithPlugin -> DEBU 29b1 Exiting {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] endorseProposal -> DEBU 29b2 [businesschannel][cf18601c] Exit" +peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [lockbasedtxmgr] Done -> DEBU 29b3 Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [endorser] func1 -> DEBU 29b4 Exit: request from 172.18.0.9:58374" +peer0.org1.example.com | "2019-07-20 02:40:27.863 UTC [comm.grpc.server] 1 -> INFO 29b5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58374 grpc.code=OK grpc.call_duration=24.3051ms +peer0.org1.example.com | "2019-07-20 02:40:27.897 UTC [grpc] infof -> DEBU 29b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:27.898 UTC [grpc] infof -> DEBU 29b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:27.932 UTC [gossip.comm] func1 -> DEBU 29b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29ba Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29bb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:27.935 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c4 0xc0037d00b0 gate 1563590427937259900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c5 0xc0037d00b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c6 0xc0037d00b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c7 0xc0037d00b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0037d00b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c9 0xc0037d00b0 gate 1563590427937259900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func1 -> DEBU 29cd 0xc0037d08f0 gate 1563590427939010500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29ce 0xc0037d08f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29cf 0xc0037d08f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29d0 0xc0037d08f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d1 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| +peer0.org1.example.com | 00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" +peer0.org1.example.com | "2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d2 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| +peer0.org1.example.com | 00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| +peer0.org1.example.com | 00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| +peer0.org1.example.com | 00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 29d3 0xc0037d08f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [cauthdsl] func1 -> DEBU 29d4 0xc0037d08f0 gate 1563590427939010500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 29d9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 29da Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29db updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29de Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [gossip.discovery] sendMemResponse -> DEBU 29e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:27.951 UTC [msp] DeserializeIdentity -> DEBU 29e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [gossip.comm] Send -> DEBU 29e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:27.952 UTC [gossip.comm] sendToEndpoint -> DEBU 29e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.953 UTC [gossip.comm] sendToEndpoint -> DEBU 29e7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:27.953 UTC [gossip.discovery] sendMemResponse -> DEBU 29e8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020&" signature:"0E\002!\000\251\007\300\017\0135\2727\3521\344z\333\245{\224\017\235.^\276M\246\346\263\372\265\377\3340a\260\002 b\352\337\306]\020Z\330\2028\231zTE:\222\226\347A\351\315gB\360\334\340\214V\250\355\027\332" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:27.964 UTC [gossip.comm] func1 -> DEBU 29e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.964 UTC [gossip.gossip] handleMessage -> DEBU 29ea Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.965 UTC [gossip.pull] HandleMessage -> DEBU 29eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ec Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:27.973 UTC [gossip.pull] SendDigest -> DEBU 29f2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:27.973 UTC [gossip.gossip] handleMessage -> DEBU 29f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [endorser] ProcessProposal -> DEBU 29f4 Entering: request from 172.18.0.9:58380" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] ValidateProposalMessage -> DEBU 29f5 ValidateProposalMessage starts for signed proposal 0xc00040e8c0" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] validateChannelHeader -> DEBU 29f6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f7 begin" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp] GetManagerForChain -> DEBU 29f8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29fa creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fb Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| +peer0.org1.example.com | 00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" +peer0.org1.example.com | "2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fc Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 29fd exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29fe validateChaincodeProposalMessage starts for proposal 0xc00015e460, header 0xc00040ed20" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29ff validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [endorser] preProcess -> DEBU 2a00 [businesschannel][cc800e57] processing txid: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a01 retrieveTransactionByID() - txId = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a02 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a03 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [cauthdsl] func1 -> DEBU 2a07 0xc003dfe5b0 gate 1563590428112919900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.112 UTC [cauthdsl] func2 -> DEBU 2a08 0xc003dfe5b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a09 0xc003dfe5b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc003dfe5b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| +peer0.org1.example.com | 00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 2a0d 0xc003dfe5b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc003dfe5b0 gate 1563590428112919900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:28.113 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:28.114 UTC [chaincode] Execute -> DEBU 2a19 Entry" +peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] handleMessage -> DEBU 2a1a [cc800e57] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] HandleTransaction -> DEBU 2a1b [cc800e57] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:28.115 UTC [chaincode] HandleGetState -> DEBU 2a1c [cc800e57] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] HandleTransaction -> DEBU 2a1e [cc800e57] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] handleMessage -> DEBU 2a1f [cc800e57] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] Notify -> DEBU 2a20 [cc800e57] notifying Txid:cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [chaincode] Execute -> DEBU 2a21 Exit" +peer0.org1.example.com | "2019-07-20 02:40:28.116 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][cc800e57] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][cc800e57] Exit" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][cc800e57] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A203057560B0313BBF17756CE01CD7D...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: 6133F8EA9F116FF8A82DC6B0FBFF17BB6F8709BD253A81A79A71CB31DE79DE43 " +peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][cc800e57] Exit" +peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.9:58380" +peer0.org1.example.com | "2019-07-20 02:40:28.118 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58380 grpc.code=OK grpc.call_duration=7.2891ms +peer0.org1.example.com | "2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:28.256 UTC [gossip.pull] Hello -> DEBU 2a32 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:28.257 UTC [gossip.comm] Send -> DEBU 2a33 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.259 UTC [gossip.pull] Hello -> DEBU 2a34 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:28.259 UTC [gossip.comm] Send -> DEBU 2a35 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.260 UTC [gossip.pull] Hello -> DEBU 2a36 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:28.260 UTC [gossip.comm] Send -> DEBU 2a37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a38 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a39 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.263 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.265 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.264 UTC [gossip.comm] func1 -> DEBU 2a3c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.265 UTC [gossip.gossip] handleMessage -> DEBU 2a3f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.pull] HandleMessage -> DEBU 2a40 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.gossip] handleMessage -> DEBU 2a41 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.266 UTC [gossip.comm] func1 -> DEBU 2a42 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.pull] HandleMessage -> DEBU 2a44 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.comm] func1 -> DEBU 2a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4a Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151023 " +peer0.org1.example.com | "2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4c Sign: digest: DD566ACBCC6F0F4BF5C93A6D9969AB3470634D6F878390F8EAAA43682E300636 " +peer0.org1.example.com | "2019-07-20 02:40:28.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4d Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:28.299 UTC [msp.identity] Sign -> DEBU 2a4e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:28.300 UTC [msp.identity] Sign -> DEBU 2a4f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:28.300 UTC [gossip.comm] Send -> DEBU 2a50 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.301 UTC [msp] DeserializeIdentity -> DEBU 2a51 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.301 UTC [gossip.comm] Send -> DEBU 2a52 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a54 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.302 UTC [gossip.comm] Send -> DEBU 2a56 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a58 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.comm] func1 -> DEBU 2a59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.305 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.306 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a5e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.gossip] handleMessage -> DEBU 2a61 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.311 UTC [msp.identity] Verify -> DEBU 2a63 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [msp.identity] Verify -> DEBU 2a64 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.312 UTC [gossip.discovery] isSentByMe -> DEBU 2a66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a67 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a68 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a6b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.314 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +peer0.org1.example.com | "2019-07-20 02:40:28.315 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +peer0.org1.example.com | "2019-07-20 02:40:28.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.discovery] isSentByMe -> DEBU 2a70 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a71 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.316 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a75 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a76 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7a 0xc0004eff30 gate 1563590428318061300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7b 0xc0004eff30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7c 0xc0004eff30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7d 0xc0004eff30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7e 0xc0004eff30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7f 0xc0004eff30 gate 1563590428318061300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.318 UTC [policies] Evaluate -> DEBU 2a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func1 -> DEBU 2a83 0xc000556770 gate 1563590428319543900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a84 0xc000556770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a85 0xc000556770 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [cauthdsl] func2 -> DEBU 2a86 0xc000556770 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a87 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| +peer0.org1.example.com | 00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" +peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a88 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| +peer0.org1.example.com | 00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| +peer0.org1.example.com | 00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| +peer0.org1.example.com | 00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 2a89 0xc000556770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.320 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc000556770 gate 1563590428319543900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a8f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a90 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a91 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.322 UTC [gossip.gossip] handleMessage -> DEBU 2a93 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a94 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.324 UTC [msp.identity] Verify -> DEBU 2a95 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +peer0.org1.example.com | 00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +peer0.org1.example.com | "2019-07-20 02:40:28.326 UTC [msp.identity] Verify -> DEBU 2a96 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +peer0.org1.example.com | 00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +peer0.org1.example.com | 00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +peer0.org1.example.com | 00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +peer0.org1.example.com | 00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a97 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a98 Verify: sig = 00000000 30 45 02 21 00 ad 7b 41 8f d5 3d 54 c2 64 5f 84 |0E.!..{A..=T.d_.| +peer0.org1.example.com | 00000010 05 26 86 79 15 e2 67 05 70 51 4e e3 47 b4 f3 8a |.&.y..g.pQN.G...| +peer0.org1.example.com | 00000020 a3 1a 1a a3 7a 02 20 76 54 21 e8 2d e2 d2 d3 47 |....z. vT!.-...G| +peer0.org1.example.com | 00000030 65 80 54 e2 59 47 47 d3 ee 0b c4 f4 bc 92 51 fc |e.T.YGG.......Q.| +peer0.org1.example.com | 00000040 6b 5e 10 f1 dc fd 42 |k^....B|" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] isSentByMe -> DEBU 2a9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.327 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a9c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.367 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.368 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.368 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.369 UTC [gossip.pull] SendDigest -> DEBU 2aa0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:28.369 UTC [gossip.gossip] handleMessage -> DEBU 2aa1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.389 UTC [gossip.comm] func1 -> DEBU 2aa2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.389 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.390 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +peer0.org1.example.com | "2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" +peer0.org1.example.com | "2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aa9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aaa Verify: sig = 00000000 30 45 02 21 00 f5 8a 76 70 1b 9e 13 5b bc 43 19 |0E.!...vp...[.C.| +peer0.org1.example.com | 00000010 06 6f c9 d9 d1 12 64 6a 6c 56 fd 82 e1 aa 45 37 |.o....djlV....E7| +peer0.org1.example.com | 00000020 94 52 38 8e 4a 02 20 32 69 7f 61 06 4a 6c 28 0e |.R8.J. 2i.a.Jl(.| +peer0.org1.example.com | 00000030 1a 1c 48 26 9b a1 07 62 f4 21 8b e4 98 7b ff e0 |..H&...b.!...{..| +peer0.org1.example.com | 00000040 d1 fd 28 be 2f 8e af |..(./..|" +peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aab Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aac Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aad updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aae Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aaf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ab0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ab3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.398 UTC [gossip.comm] Send -> DEBU 2ab6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.554 UTC [gossip.comm] func1 -> DEBU 2aba Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [gossip.gossip] handleMessage -> DEBU 2abb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [gossip.pull] HandleMessage -> DEBU 2abc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.557 UTC [gossip.pull] SendDigest -> DEBU 2ac3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:28.557 UTC [gossip.gossip] handleMessage -> DEBU 2ac4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.comm] func1 -> DEBU 2ac5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ac9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2acb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc0034f2890 gate 1563590428568875200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc0034f2890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc0034f2890 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc0034f2890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ad5 0xc0034f2890 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ad6 0xc0034f2890 gate 1563590428568875200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ada 0xc0034f30d0 gate 1563590428569180700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0034f30d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0034f30d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2add 0xc0034f30d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2ade Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| +peer0.org1.example.com | 00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2adf Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| +peer0.org1.example.com | 00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| +peer0.org1.example.com | 00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| +peer0.org1.example.com | 00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| +peer0.org1.example.com | 00000040 73 f1 a6 87 33 15 00 |s...3..|" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc0034f30d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0034f30d0 gate 1563590428569180700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aeb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2aee Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.comm] Send -> DEBU 2af2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2af3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] Send -> DEBU 2af8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.723 UTC [gossip.comm] func1 -> DEBU 2aff Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.727 UTC [gossip.gossip] handleMessage -> DEBU 2b00 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.728 UTC [gossip.comm] func1 -> DEBU 2b01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.731 UTC [gossip.comm] func1 -> DEBU 2b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b03 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b05 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] Send -> DEBU 2b06 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b07 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b08 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.735 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.733 UTC [msp.identity] Verify -> DEBU 2b04 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp.identity] Verify -> DEBU 2b0f Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b10 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b11 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b13 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b14 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b18 0xc0032f5cb0 gate 1563590428738122700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b19 0xc0032f5cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1a 0xc0032f5cb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1b 0xc0032f5cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1c 0xc0032f5cb0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b1d 0xc0032f5cb0 gate 1563590428738122700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func1 -> DEBU 2b21 0xc003ba24f0 gate 1563590428739538400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b22 0xc003ba24f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b23 0xc003ba24f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.741 UTC [cauthdsl] func2 -> DEBU 2b24 0xc003ba24f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.741 UTC [msp.identity] Verify -> DEBU 2b25 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +peer0.org1.example.com | "2019-07-20 02:40:28.736 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.745 UTC [msp.identity] Verify -> DEBU 2b26 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +peer0.org1.example.com | "2019-07-20 02:40:28.746 UTC [cauthdsl] func2 -> DEBU 2b27 0xc003ba24f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.746 UTC [cauthdsl] func1 -> DEBU 2b28 0xc003ba24f0 gate 1563590428739538400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.748 UTC [policies] Evaluate -> DEBU 2b2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.748 UTC [msp] DeserializeIdentity -> DEBU 2b2d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.749 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b30 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b31 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func1 -> DEBU 2b35 0xc003ba3cc0 gate 1563590428752408800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b36 0xc003ba3cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b37 0xc003ba3cc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b38 0xc003ba3cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b39 0xc003ba3cc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc003ba3cc0 gate 1563590428752408800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func1 -> DEBU 2b3e 0xc003d68500 gate 1563590428754307100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b3f 0xc003d68500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003d68500 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003d68500 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b42 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b43 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [cauthdsl] func2 -> DEBU 2b44 0xc003d68500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [cauthdsl] func1 -> DEBU 2b45 0xc003d68500 gate 1563590428754307100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b48 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [msp.identity] Verify -> DEBU 2b4a Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b4b Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.758 UTC [policies] Evaluate -> DEBU 2b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.758 UTC [cauthdsl] func1 -> DEBU 2b51 0xc003d69c00 gate 1563590428758639500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003d69c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b53 0xc003d69c00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b54 0xc003d69c00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.759 UTC [msp.identity] Verify -> DEBU 2b55 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b56 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [cauthdsl] func2 -> DEBU 2b57 0xc003d69c00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [cauthdsl] func1 -> DEBU 2b58 0xc003d69c00 gate 1563590428758639500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b59 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [policies] Evaluate -> DEBU 2b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [gossip.gossip] handleMessage -> DEBU 2b5d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b60 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.761 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [gossip.pull] Hello -> DEBU 2b62 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b63 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b64 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +peer0.org1.example.com | "2019-07-20 02:40:28.763 UTC [msp] DeserializeIdentity -> DEBU 2b65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [msp] DeserializeIdentity -> DEBU 2b66 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] Send -> DEBU 2b67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b69 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [gossip.comm] func1 -> DEBU 2b6a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b70 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b71 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.767 UTC [policies] Evaluate -> DEBU 2b72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [cauthdsl] func1 -> DEBU 2b75 0xc0039e9890 gate 1563590428768410700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.768 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0039e9890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b77 0xc0039e9890 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b78 0xc0039e9890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b79 0xc0039e9890 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7a 0xc0039e9890 gate 1563590428768410700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7e 0xc003efa0d0 gate 1563590428769550200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b7f 0xc003efa0d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b80 0xc003efa0d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b81 0xc003efa0d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.769 UTC [msp.identity] Verify -> DEBU 2b82 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +peer0.org1.example.com | 00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [msp.identity] Verify -> DEBU 2b83 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +peer0.org1.example.com | 00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +peer0.org1.example.com | 00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +peer0.org1.example.com | 00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +peer0.org1.example.com | 00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [cauthdsl] func2 -> DEBU 2b84 0xc003efa0d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [cauthdsl] func1 -> DEBU 2b85 0xc003efa0d0 gate 1563590428769550200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [policies] Evaluate -> DEBU 2b89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [cauthdsl] func1 -> DEBU 2b92 0xc003efb8a0 gate 1563590428772520400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.772 UTC [cauthdsl] func2 -> DEBU 2b93 0xc003efb8a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b94 0xc003efb8a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b95 0xc003efb8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [cauthdsl] func2 -> DEBU 2b96 0xc003efb8a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [cauthdsl] func1 -> DEBU 2b97 0xc003efb8a0 gate 1563590428772520400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.774 UTC [policies] Evaluate -> DEBU 2b98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func1 -> DEBU 2b9b 0xc0006be0e0 gate 1563590428775611400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9c 0xc0006be0e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9d 0xc0006be0e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [cauthdsl] func2 -> DEBU 2b9e 0xc0006be0e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2b9f Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2ba0 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:28.777 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc0006be0e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [cauthdsl] func1 -> DEBU 2ba2 0xc0006be0e0 gate 1563590428775611400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.778 UTC [msp] DeserializeIdentity -> DEBU 2ba7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [cauthdsl] func1 -> DEBU 2bad 0xc0006bf1c0 gate 1563590428779691300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.779 UTC [cauthdsl] func2 -> DEBU 2bae 0xc0006bf1c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2baf 0xc0006bf1c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc0006bf1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb1 0xc0006bf1c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb2 0xc0006bf1c0 gate 1563590428779691300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb6 0xc0006bfa00 gate 1563590428780810500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0006bfa00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0006bfa00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc0006bfa00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bba Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bbb Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bbc 0xc0006bfa00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.781 UTC [cauthdsl] func1 -> DEBU 2bbd 0xc0006bfa00 gate 1563590428780810500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.782 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc5 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +peer0.org1.example.com | 00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +peer0.org1.example.com | "2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +peer0.org1.example.com | 00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +peer0.org1.example.com | 00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +peer0.org1.example.com | 00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +peer0.org1.example.com | 00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +peer0.org1.example.com | 00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +peer0.org1.example.com | 00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +peer0.org1.example.com | 00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +peer0.org1.example.com | 00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +peer0.org1.example.com | 00000040 93 08 2f 55 cd 66 |../U.f|" +peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0007fc350 gate 1563590428785776500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.785 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0007fc350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0007fc350 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0007fc350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd5 0xc0007fc350 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bd6 0xc0007fc350 gate 1563590428785776500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bda 0xc0007fcb90 gate 1563590428786851300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc0007fcb90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdc 0xc0007fcb90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc0007fcb90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bde Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +peer0.org1.example.com | 00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +peer0.org1.example.com | "2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bdf Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +peer0.org1.example.com | 00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +peer0.org1.example.com | 00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +peer0.org1.example.com | 00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +peer0.org1.example.com | 00000040 a3 bb 17 85 f1 b2 |......|" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [cauthdsl] func2 -> DEBU 2be0 0xc0007fcb90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [cauthdsl] func1 -> DEBU 2be1 0xc0007fcb90 gate 1563590428786851300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.788 UTC [msp] DeserializeIdentity -> DEBU 2be6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [msp] DeserializeIdentity -> DEBU 2be7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.789 UTC [policies] Evaluate -> DEBU 2beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func1 -> DEBU 2bee 0xc00080a360 gate 1563590428791136600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bef 0xc00080a360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc00080a360 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf1 0xc00080a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc00080a360 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [cauthdsl] func1 -> DEBU 2bf3 0xc00080a360 gate 1563590428791136600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.793 UTC [policies] Evaluate -> DEBU 2bf4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func1 -> DEBU 2bf7 0xc00080aba0 gate 1563590428794390900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc00080aba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf9 0xc00080aba0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bfa 0xc00080aba0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfb Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +peer0.org1.example.com | "2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfc Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2bfd 0xc00080aba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc00080aba0 gate 1563590428794390900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c01 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.795 UTC [msp] DeserializeIdentity -> DEBU 2c03 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c04 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c05 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func1 -> DEBU 2c09 0xc00080bc80 gate 1563590428796725600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0a 0xc00080bc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0b 0xc00080bc80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0c 0xc00080bc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc00080bc80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c0e 0xc00080bc80 gate 1563590428796725600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c0f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0028aa4c0 gate 1563590428797791000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c13 0xc0028aa4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0028aa4c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c15 0xc0028aa4c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2c18 0xc0028aa4c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:28.798 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0028aa4c0 gate 1563590428797791000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.799 UTC [gossip.pull] HandleMessage -> DEBU 2c20 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.800 UTC [gossip.gossip] handleMessage -> DEBU 2c21 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.878 UTC [gossip.comm] func1 -> DEBU 2c22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.878 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.879 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.881 UTC [msp] DeserializeIdentity -> DEBU 2c25 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.882 UTC [gossip.gossip] handleMessage -> DEBU 2c26 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.885 UTC [gossip.comm] func1 -> DEBU 2c27 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.885 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.886 UTC [msp.identity] Verify -> DEBU 2c29 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2a Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:28.886 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [gossip.comm] func1 -> DEBU 2c2c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [gossip.gossip] handleMessage -> DEBU 2c2d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.889 UTC [msp.identity] Verify -> DEBU 2c2e Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2f Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:28.890 UTC [msp] DeserializeIdentity -> DEBU 2c30 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.890 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.899 UTC [gossip.comm] func1 -> DEBU 2c32 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.900 UTC [gossip.gossip] handleMessage -> DEBU 2c33 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.900 UTC [msp.identity] Verify -> DEBU 2c34 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c35 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:28.901 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:28.901 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:28.903 UTC [gossip.comm] func1 -> DEBU 2c38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.903 UTC [gossip.gossip] handleMessage -> DEBU 2c39 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.pull] HandleMessage -> DEBU 2c3a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.pull] SendDigest -> DEBU 2c3b Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:28.904 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.045 UTC [gossip.comm] func1 -> DEBU 2c3d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [gossip.gossip] handleMessage -> DEBU 2c3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c3f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c40 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.047 UTC [msp] DeserializeIdentity -> DEBU 2c41 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.047 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [gossip.comm] func1 -> DEBU 2c43 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [gossip.gossip] handleMessage -> DEBU 2c44 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.049 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c47 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c48 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [cauthdsl] func1 -> DEBU 2c4c 0xc002a37700 gate 1563590429050765400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.050 UTC [cauthdsl] func2 -> DEBU 2c4d 0xc002a37700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4e 0xc002a37700 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc002a37700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c50 0xc002a37700 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c51 0xc002a37700 gate 1563590429050765400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c55 0xc002a37f40 gate 1563590429052725600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.052 UTC [cauthdsl] func2 -> DEBU 2c56 0xc002a37f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c57 0xc002a37f40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c58 0xc002a37f40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c59 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c5a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c5b 0xc002a37f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc002a37f40 gate 1563590429052725600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c5f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2c62 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.062 UTC [gossip.comm] func1 -> DEBU 2c63 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.063 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.063 UTC [msp] DeserializeIdentity -> DEBU 2c65 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c67 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c68 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [policies] Evaluate -> DEBU 2c6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func1 -> DEBU 2c6c 0xc003c761e0 gate 1563590429065560400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6d 0xc003c761e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6e 0xc003c761e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc003c761e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003c761e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c71 0xc003c761e0 gate 1563590429065560400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c75 0xc003c76a20 gate 1563590429066647500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c76 0xc003c76a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c77 0xc003c76a20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c78 0xc003c76a20 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c79 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c7a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c7b 0xc003c76a20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [cauthdsl] func1 -> DEBU 2c7c 0xc003c76a20 gate 1563590429066647500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [msp] DeserializeIdentity -> DEBU 2c81 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.068 UTC [gossip.gossip] handleMessage -> DEBU 2c82 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.184 UTC [gossip.comm] func1 -> DEBU 2c83 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.185 UTC [gossip.gossip] handleMessage -> DEBU 2c84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.185 UTC [msp] DeserializeIdentity -> DEBU 2c85 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.187 UTC [gossip.gossip] handleMessage -> DEBU 2c88 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [gossip.comm] func1 -> DEBU 2c89 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [gossip.gossip] handleMessage -> DEBU 2c8a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.195 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [policies] Evaluate -> DEBU 2c91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func1 -> DEBU 2c92 0xc003b89a10 gate 1563590429198298900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003b89a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003b89a10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c95 0xc003b89a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c96 0xc003b89a10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c97 0xc003b89a10 gate 1563590429198298900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c9b 0xc003e72250 gate 1563590429199406700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9c 0xc003e72250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9d 0xc003e72250 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9e 0xc003e72250 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.199 UTC [msp.identity] Verify -> DEBU 2c9f Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [msp.identity] Verify -> DEBU 2ca0 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2ca1 0xc003e72250 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [cauthdsl] func1 -> DEBU 2ca2 0xc003e72250 gate 1563590429199406700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:29.201 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.201 UTC [gossip.gossip] handleMessage -> DEBU 2ca8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2ca9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2caa Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:29.907 UTC [cauthdsl] func1 -> DEBU 2cae 0xc002a0e280 gate 1563590429907908700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2caf 0xc002a0e280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb0 0xc002a0e280 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc002a0e280 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb2 Verify: digest = 00000000 66 5c 55 fa 92 62 2b cc 22 38 bc 5a ab e1 99 8b |f\U..b+."8.Z....| +peer0.org1.example.com | 00000010 a3 7e ed 8d 7b d3 7a 83 e9 52 e5 4a 62 c6 47 33 |.~..{.z..R.Jb.G3|" +peer0.org1.example.com | "2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb3 Verify: sig = 00000000 30 44 02 20 01 7e e9 fb f8 ac ac 13 48 6c 04 13 |0D. .~......Hl..| +peer0.org1.example.com | 00000010 74 73 0e 9a ff 6d 09 40 fc 70 78 8b 24 00 cf 5b |ts...m.@.px.$..[| +peer0.org1.example.com | 00000020 e4 01 16 96 02 20 12 c1 64 09 0f 0d 76 d3 a3 a3 |..... ..d...v...| +peer0.org1.example.com | 00000030 43 0b 17 03 66 2e f7 a8 fa 41 d8 8d 8d 6f 8a 41 |C...f....A...o.A| +peer0.org1.example.com | 00000040 f7 d3 15 33 5c e9 |...3\.|" +peer0.org1.example.com | "2019-07-20 02:40:29.909 UTC [cauthdsl] func2 -> DEBU 2cb4 0xc002a0e280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.909 UTC [cauthdsl] func1 -> DEBU 2cb5 0xc002a0e280 gate 1563590429907908700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [blocksProvider] DeliverBlocks -> DEBU 2cba [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbb [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbc Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [blocksProvider] DeliverBlocks -> DEBU 2cbd [businesschannel] Gossiping block [5], peers number [3]" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.channel] AddToMsgStore -> DEBU 2cbe Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.pull] Add -> DEBU 2cbf Added 5, total items: 5" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc0 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc1 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> INFO 2cc2 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> DEBU 2cc3 [businesschannel] Validating block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc4 [businesschannel] START Block Validation for block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc5 expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:40:29.911 UTC [committer.txvalidator] validateTx -> DEBU 2cc6 [businesschannel] validateTx starts for block 0xc003329000 env 0xc003de9680 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc7 ValidateTransactionEnvelope starts for envelope 0xc003de9680" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc8 Header is channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] validateChannelHeader -> DEBU 2cc9 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cca begin" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp] GetManagerForChain -> DEBU 2ccb Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccc creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccd creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2cce Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| +peer0.org1.example.com | 00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2ccf Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| +peer0.org1.example.com | 00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| +peer0.org1.example.com | 00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| +peer0.org1.example.com | 00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| +peer0.org1.example.com | 00000040 f3 e2 8c ca 4c 85 |....L.|" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cd0 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:29.912 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd1 validateEndorserTransaction starts for data 0xc003d9d000, header channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd2 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd3 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [protoutils] ValidateTransaction -> DEBU 2cd4 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd5 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2cd6 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd7 Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cd8 [businesschannel] VSCCValidateTx starts for bytes 0xc002a09000" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cd9 constructing new query executor txid = [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [stateleveldb] GetState -> DEBU 2cda GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cdb Done with transaction simulation / query execution [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2cdc Validating Tx cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cdd constructing new query executor txid = [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" +peer0.org1.example.com | "2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc00354b270 gate 1563590429913996900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc00354b270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce1 0xc00354b270 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce2 0xc00354b270 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce3 Verify: digest = 00000000 c6 e1 11 a0 17 7e 2c 9b 0b 87 80 2f b0 af 0b 6b |.....~,..../...k| +peer0.org1.example.com | 00000010 41 9e 7e c6 c5 cf fd af ec 9a 92 18 ac 29 ed 00 |A.~..........)..|" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce4 Verify: sig = 00000000 30 44 02 20 0c fc 56 28 ee eb 1a f1 d8 0f 5b 52 |0D. ..V(......[R| +peer0.org1.example.com | 00000010 91 0d 11 5c ab d0 c8 22 b9 b6 e5 18 a2 a5 e5 03 |...\..."........| +peer0.org1.example.com | 00000020 e3 e5 89 8a 02 20 61 9b 09 2a c0 01 99 74 e1 30 |..... a..*...t.0| +peer0.org1.example.com | 00000030 6e 6a 3e cb e8 8b b1 71 d4 cd 93 8b 96 db ba 79 |nj>....q.......y| +peer0.org1.example.com | 00000040 83 ae 49 e9 5e 8d |..I.^.|" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc00354b270 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc00354b270 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce7 0xc00354b270 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc00354b270 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc00354b270 gate 1563590429913996900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cea constructing new query executor txid = [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] Done -> DEBU 2ceb Done with transaction simulation / query execution [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [vscc] Validate -> DEBU 2cec block 5, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2ced Transaction cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 appears to be valid" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cee [businesschannel] VSCCValidateTx completes env bytes 0xc002a09000" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] validateTx -> DEBU 2cef [businesschannel] validateTx completes for block 0xc003329000 env 0xc003de9680 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> DEBU 2cf0 got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> INFO 2cf1 [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2cf2 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:40:29.914 UTC [gossip.privdata] StoreBlock -> DEBU 2cf3 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [kvledger] CommitWithPvtData -> DEBU 2cf4 [businesschannel] Validating state for block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf6 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf7 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf8 ValidateAndPrepareBatch() for block number = [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf9 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [valimpl] preprocessProtoBlock -> DEBU 2cfa txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfb GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfc Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfd GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfe Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cff GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2d00 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2d01 Block [5] Transaction index [0] TxId [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:40:29.917 UTC [valinternal] ApplyWriteSet -> DEBU 2d02 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034a4240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034a4280)}" +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d03 validating rwset..." +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d04 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d06 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.918 UTC [kvledger] CommitWithPvtData -> DEBU 2d08 [businesschannel] Adding CommitHash to the block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [kvledger] CommitWithPvtData -> DEBU 2d09 [businesschannel] Committing block [5] to storage" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2d0b Writing block [5] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] Send -> DEBU 2d0d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:29.920 UTC [pvtdatastorage] Prepare -> DEBU 2d12 Saved 0 private data write sets for block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d13 Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= +peer0.org1.example.com | txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d14 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to txid-index" +peer0.org1.example.com | "2019-07-20 02:40:29.925 UTC [fsblkstorage] indexBlock -> DEBU 2d15 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx number:[0] ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:40:29.935 UTC [fsblkstorage] updateCheckpoint -> DEBU 2d16 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84079], isChainEmpty=[false], lastBlockNumber=[5]" +peer0.org1.example.com | "2019-07-20 02:40:29.935 UTC [pvtdatastorage] Commit -> DEBU 2d17 Committing private data for block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.939 UTC [pvtdatastorage] Commit -> DEBU 2d18 Committed private data for block [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [kvledger] CommitWithPvtData -> DEBU 2d19 [businesschannel] Committing block [5] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1a lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1b Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2d1c Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [lockbasedtxmgr] Commit -> DEBU 2d1d Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1e Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1f Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] Commit -> DEBU 2d20 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d21 Preparing potential purge list working-set for expiringAtBlk [6]" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [leveldbhelper] GetIterator -> DEBU 2d22 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d23 No expiry entry found for expiringAtBlk [6]" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] func1 -> DEBU 2d24 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [kvledger] CommitWithPvtData -> DEBU 2d25 [businesschannel] Committing block [5] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:40:29.943 UTC [historyleveldb] Commit -> DEBU 2d26 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [historyleveldb] Commit -> DEBU 2d27 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [kvledger] CommitWithPvtData -> INFO 2d28 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=2ms block_and_pvtdata_commit=21ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d29 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2a Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08061A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2b Sign: digest: 16B6E3422440EF1113CC2D5AD11B5698025C5C42F9054C40FB3B8C581A28CBBD " +peer0.org1.example.com | "2019-07-20 02:40:29.945 UTC [gossip.state] commitBlock -> DEBU 2d2c [businesschannel] Committed block [5] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [endorser] ProcessProposal -> DEBU 2d2d Entering: request from 172.18.0.9:58384" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] ValidateProposalMessage -> DEBU 2d2e ValidateProposalMessage starts for signed proposal 0xc003e3fd10" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] validateChannelHeader -> DEBU 2d2f validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d30 begin" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [msp] GetManagerForChain -> DEBU 2d31 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d33 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d34 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| +peer0.org1.example.com | 00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d35 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| +peer0.org1.example.com | 00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| +peer0.org1.example.com | 00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| +peer0.org1.example.com | 00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| +peer0.org1.example.com | 00000040 3d a5 8c db 81 e3 |=.....|" +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d36 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d37 validateChaincodeProposalMessage starts for proposal 0xc0029acd90, header 0xc003fb8190" +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d38 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:30.281 UTC [endorser] preProcess -> DEBU 2d39 [businesschannel][2fec28c6] processing txid: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d3a retrieveTransactionByID() - txId = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3c acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func1 -> DEBU 2d40 0xc00376f160 gate 1563590430283118800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d41 0xc00376f160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d42 0xc00376f160 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d43 0xc00376f160 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d44 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| +peer0.org1.example.com | 00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" +peer0.org1.example.com | "2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d45 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| +peer0.org1.example.com | 00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| +peer0.org1.example.com | 00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| +peer0.org1.example.com | 00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| +peer0.org1.example.com | 00000040 3d a5 8c db 81 e3 |=.....|" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [cauthdsl] func2 -> DEBU 2d46 0xc00376f160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [cauthdsl] func1 -> DEBU 2d47 0xc00376f160 gate 1563590430283118800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d48 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4a Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d4c constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d4d constructing new tx simulator txid = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [endorser] SimulateProposal -> DEBU 2d4e [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [stateleveldb] GetState -> DEBU 2d4f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [ccprovider] GetChaincodeData -> DEBU 2d50 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [endorser] callChaincode -> INFO 2d51 [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:30.285 UTC [chaincode] Execute -> DEBU 2d52 Entry" +peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] handleMessage -> DEBU 2d53 [2fec28c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d54 [2fec28c6] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleGetState -> DEBU 2d55 [2fec28c6] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [stateleveldb] GetState -> DEBU 2d56 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d57 [2fec28c6] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:30.288 UTC [chaincode] handleMessage -> DEBU 2d58 [2fec28c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [chaincode] Notify -> DEBU 2d59 [2fec28c6] notifying Txid:2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [chaincode] Execute -> DEBU 2d5a Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] callChaincode -> INFO 2d5b [businesschannel][2fec28c6] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d5c Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] Done -> DEBU 2d5d Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] SimulateProposal -> DEBU 2d5e [businesschannel][2fec28c6] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.289 UTC [endorser] endorseProposal -> DEBU 2d5f [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d60 [businesschannel][2fec28c6] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d61 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d62 Sign: plaintext: 0A2074EF80C23BC6C4E8567CCE74AA7C...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d63 Sign: digest: E1CA0B783FA631FD149AA90726F9DC6674E11EE6CAB366B0DAF3B9701126138F " +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d64 Exiting {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d65 [businesschannel][2fec28c6] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.290 UTC [lockbasedtxmgr] Done -> DEBU 2d66 Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +peer0.org1.example.com | "2019-07-20 02:40:30.291 UTC [endorser] func1 -> DEBU 2d67 Exit: request from 172.18.0.9:58384" +peer0.org1.example.com | "2019-07-20 02:40:30.291 UTC [comm.grpc.server] 1 -> INFO 2d68 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58384 grpc.code=OK grpc.call_duration=11.2701ms +peer0.org1.example.com | "2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d69 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d6a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [endorser] ProcessProposal -> DEBU 2d6b Entering: request from 172.18.0.9:58388" +peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [protoutils] ValidateProposalMessage -> DEBU 2d6c ValidateProposalMessage starts for signed proposal 0xc003fb92c0" +peer0.org1.example.com | "2019-07-20 02:40:30.661 UTC [protoutils] validateChannelHeader -> DEBU 2d6d validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d6e begin" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp] GetManagerForChain -> DEBU 2d6f Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d70 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d71 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d72 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| +peer0.org1.example.com | 00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" +peer0.org1.example.com | "2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d73 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| +peer0.org1.example.com | 00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| +peer0.org1.example.com | 00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| +peer0.org1.example.com | 00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| +peer0.org1.example.com | 00000040 09 34 4d cd e2 e3 |.4M...|" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d74 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d75 validateChaincodeProposalMessage starts for proposal 0xc0029ad2d0, header 0xc003fb96d0" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d76 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [endorser] preProcess -> DEBU 2d77 [businesschannel][3bd567df] processing txid: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d78 retrieveTransactionByID() - txId = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d79 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d7a constructing new tx simulator txid = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +peer0.org1.example.com | "2019-07-20 02:40:30.663 UTC [endorser] SimulateProposal -> DEBU 2d7b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [endorser] callChaincode -> INFO 2d7c [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [chaincode] Execute -> DEBU 2d7d Entry" +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7e acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7f acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [policies] Evaluate -> DEBU 2d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d83 0xc003209920 gate 1563590430665096900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d84 0xc003209920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d85 0xc003209920 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d86 0xc003209920 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d87 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| +peer0.org1.example.com | 00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d88 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| +peer0.org1.example.com | 00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| +peer0.org1.example.com | 00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| +peer0.org1.example.com | 00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| +peer0.org1.example.com | 00000040 09 34 4d cd e2 e3 |.4M...|" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d89 0xc003209920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc003209920 gate 1563590430665096900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] handleMessage -> DEBU 2d8f [3bd567df] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] HandleTransaction -> DEBU 2d90 [3bd567df] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [chaincode] HandleGetState -> DEBU 2d91 [3bd567df] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.666 UTC [stateleveldb] GetState -> DEBU 2d92 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] HandleTransaction -> DEBU 2d93 [3bd567df] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] handleMessage -> DEBU 2d94 [3bd567df] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] Notify -> DEBU 2d95 [3bd567df] notifying Txid:3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [chaincode] Execute -> DEBU 2d96 Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] callChaincode -> INFO 2d97 [businesschannel][3bd567df] Exit chaincode: name:"lscc" (3ms)" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d98 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] Done -> DEBU 2d99 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] SimulateProposal -> DEBU 2d9a [businesschannel][3bd567df] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9c [businesschannel][3bd567df] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:30.667 UTC [endorser] EndorseWithPlugin -> DEBU 2d9d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9e Sign: plaintext: 0A20DC3953394B8B040B6D3F4AA63DE2...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9f Sign: digest: 003A94C9AA19F2A7BD2F4D207C25170F8B0627B182D7989A95B23B911588F6EA " +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] EndorseWithPlugin -> DEBU 2da0 Exiting {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] endorseProposal -> DEBU 2da1 [businesschannel][3bd567df] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [lockbasedtxmgr] Done -> DEBU 2da2 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [endorser] func1 -> DEBU 2da3 Exit: request from 172.18.0.9:58388" +peer0.org1.example.com | "2019-07-20 02:40:30.668 UTC [comm.grpc.server] 1 -> INFO 2da4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58388 grpc.code=OK grpc.call_duration=8.5178ms +peer0.org1.example.com | "2019-07-20 02:40:30.671 UTC [grpc] infof -> DEBU 2da5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:30.672 UTC [grpc] warningf -> DEBU 2da6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58388: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:40:30.672 UTC [grpc] infof -> DEBU 2da7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:30.847 UTC [endorser] ProcessProposal -> DEBU 2da8 Entering: request from 172.18.0.9:58392" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] ValidateProposalMessage -> DEBU 2da9 ValidateProposalMessage starts for signed proposal 0xc003ec28c0" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] validateChannelHeader -> DEBU 2daa validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dab begin" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp] GetManagerForChain -> DEBU 2dac Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dad creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dae creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2daf Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| +peer0.org1.example.com | 00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" +peer0.org1.example.com | "2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2db0 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| +peer0.org1.example.com | 00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| +peer0.org1.example.com | 00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| +peer0.org1.example.com | 00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| +peer0.org1.example.com | 00000040 54 bb 5c 3a bc ba |T.\:..|" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] checkSignatureFromCreator -> DEBU 2db1 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db2 validateChaincodeProposalMessage starts for proposal 0xc0029ad730, header 0xc003ec2cd0" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db3 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] preProcess -> DEBU 2db4 [businesschannel][398ba62b] processing txid: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2db5 retrieveTransactionByID() - txId = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2db6 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2db7 constructing new tx simulator txid = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] SimulateProposal -> DEBU 2db8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.849 UTC [endorser] callChaincode -> INFO 2db9 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [chaincode] Execute -> DEBU 2dba Entry" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbb acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbc acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func1 -> DEBU 2dc0 0xc003015bc0 gate 1563590430850677600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc1 0xc003015bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc2 0xc003015bc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc003015bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc4 Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| +peer0.org1.example.com | 00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc5 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| +peer0.org1.example.com | 00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| +peer0.org1.example.com | 00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| +peer0.org1.example.com | 00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| +peer0.org1.example.com | 00000040 54 bb 5c 3a bc ba |T.\:..|" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc003015bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc003015bc0 gate 1563590430850677600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [policies] Evaluate -> DEBU 2dcb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] handleMessage -> DEBU 2dcc [398ba62b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dcd [398ba62b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleGetState -> DEBU 2dce [398ba62b] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [stateleveldb] GetState -> DEBU 2dcf GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dd0 [398ba62b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] handleMessage -> DEBU 2dd1 [398ba62b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] Notify -> DEBU 2dd2 [398ba62b] notifying Txid:398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [chaincode] Execute -> DEBU 2dd3 Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.853 UTC [endorser] callChaincode -> INFO 2dd4 [businesschannel][398ba62b] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2dd5 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] Done -> DEBU 2dd6 Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] SimulateProposal -> DEBU 2dd7 [businesschannel][398ba62b] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd9 [businesschannel][398ba62b] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:30.854 UTC [endorser] EndorseWithPlugin -> DEBU 2dda Entering endorsement for {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddb Sign: plaintext: 0A20676545DA82FF5CBA43B1C4F1D73C...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddc Sign: digest: 73A9A672040DBAA62B4709F7BB22774A13A4BCAA9164D02857C67C58BBC2A3BB " +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] EndorseWithPlugin -> DEBU 2ddd Exiting {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] endorseProposal -> DEBU 2dde [businesschannel][398ba62b] Exit" +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [lockbasedtxmgr] Done -> DEBU 2ddf Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [endorser] func1 -> DEBU 2de0 Exit: request from 172.18.0.9:58392" +peer0.org1.example.com | "2019-07-20 02:40:30.855 UTC [comm.grpc.server] 1 -> INFO 2de1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58392 grpc.code=OK grpc.call_duration=7.8945ms +peer0.org1.example.com | "2019-07-20 02:40:30.859 UTC [grpc] infof -> DEBU 2de2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:30.860 UTC [grpc] infof -> DEBU 2de3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [endorser] ProcessProposal -> DEBU 2de4 Entering: request from 172.18.0.9:58396" +peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [protoutils] ValidateProposalMessage -> DEBU 2de5 ValidateProposalMessage starts for signed proposal 0xc003ec3cc0" +peer0.org1.example.com | "2019-07-20 02:40:31.049 UTC [protoutils] validateChannelHeader -> DEBU 2de6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de7 begin" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp] GetManagerForChain -> DEBU 2de8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dea creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2deb Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| +peer0.org1.example.com | 00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2dec Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| +peer0.org1.example.com | 00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| +peer0.org1.example.com | 00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| +peer0.org1.example.com | 00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| +peer0.org1.example.com | 00000040 10 aa 91 93 85 f8 de |.......|" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ded exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:31.050 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2dee validateChaincodeProposalMessage starts for proposal 0xc0029adc00, header 0xc0029960f0" +peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2def validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [endorser] preProcess -> DEBU 2df0 [businesschannel][f13255af] processing txid: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac" +peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2df1 retrieveTransactionByID() - txId = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2df2 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2df3 constructing new tx simulator txid = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [endorser] SimulateProposal -> DEBU 2df4 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [endorser] callChaincode -> INFO 2df5 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [chaincode] Execute -> DEBU 2df6 Entry" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df7 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df8 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002883cb0 gate 1563590431053104100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002883cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002883cb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002883cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e00 Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| +peer0.org1.example.com | 00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e01 Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| +peer0.org1.example.com | 00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| +peer0.org1.example.com | 00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| +peer0.org1.example.com | 00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| +peer0.org1.example.com | 00000040 10 aa 91 93 85 f8 de |.......|" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2e02 0xc002883cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2e03 0xc002883cb0 gate 1563590431053104100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e04 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e06 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.054 UTC [chaincode] handleMessage -> DEBU 2e08 [f13255af] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e09 [f13255af] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleGetState -> DEBU 2e0a [f13255af] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [stateleveldb] GetState -> DEBU 2e0b GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e0c [f13255af] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] handleMessage -> DEBU 2e0d [f13255af] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] Notify -> DEBU 2e0e [f13255af] notifying Txid:f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [chaincode] Execute -> DEBU 2e0f Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [endorser] callChaincode -> INFO 2e10 [businesschannel][f13255af] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-07-20 02:40:31.056 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e11 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [lockbasedtxmgr] Done -> DEBU 2e12 Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] SimulateProposal -> DEBU 2e13 [businesschannel][f13255af] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e14 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e15 [businesschannel][f13255af] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [endorser] EndorseWithPlugin -> DEBU 2e16 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.057 UTC [msp.identity] Sign -> DEBU 2e17 Sign: plaintext: 0A20DF588A2AEA060081019D422F1E99...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [msp.identity] Sign -> DEBU 2e18 Sign: digest: 5FB5760DFBC5340411F4B7D072CF6CC8CD1031849D3597442E767CC02492CC07 " +peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] EndorseWithPlugin -> DEBU 2e19 Exiting {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] endorseProposal -> DEBU 2e1a [businesschannel][f13255af] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [lockbasedtxmgr] Done -> DEBU 2e1b Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +peer0.org1.example.com | "2019-07-20 02:40:31.058 UTC [endorser] func1 -> DEBU 2e1c Exit: request from 172.18.0.9:58396" +peer0.org1.example.com | "2019-07-20 02:40:31.059 UTC [comm.grpc.server] 1 -> INFO 2e1d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58396 grpc.code=OK grpc.call_duration=9.768ms +peer0.org1.example.com | "2019-07-20 02:40:31.062 UTC [grpc] infof -> DEBU 2e1e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.063 UTC [grpc] infof -> DEBU 2e1f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [endorser] ProcessProposal -> DEBU 2e20 Entering: request from 172.18.0.9:58400" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] ValidateProposalMessage -> DEBU 2e21 ValidateProposalMessage starts for signed proposal 0xc002997180" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] validateChannelHeader -> DEBU 2e22 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e23 begin" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp] GetManagerForChain -> DEBU 2e24 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e25 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e26 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e27 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| +peer0.org1.example.com | 00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" +peer0.org1.example.com | "2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e28 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| +peer0.org1.example.com | 00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| +peer0.org1.example.com | 00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| +peer0.org1.example.com | 00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| +peer0.org1.example.com | 00000040 2f 17 bc cb d3 14 14 |/......|" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e29 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2a validateChaincodeProposalMessage starts for proposal 0xc002a5a0e0, header 0xc002997590" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] preProcess -> DEBU 2e2c [businesschannel][3d993208] processing txid: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e2d retrieveTransactionByID() - txId = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2e constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e2f constructing new tx simulator txid = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] SimulateProposal -> DEBU 2e30 [businesschannel][3d993208] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.201 UTC [endorser] callChaincode -> INFO 2e31 [businesschannel][3d993208] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e32 Entry" +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e33 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| +peer0.org1.example.com | 00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e34 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| +peer0.org1.example.com | 00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| +peer0.org1.example.com | 00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| +peer0.org1.example.com | 00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| +peer0.org1.example.com | 00000040 2f 17 bc cb d3 14 14 |/......|" +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] handleMessage -> DEBU 2e35 [3d993208] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Notify -> DEBU 2e36 [3d993208] notifying Txid:3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e37 Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] callChaincode -> INFO 2e38 [businesschannel][3d993208] Exit chaincode: name:"lscc" (1ms)" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e39 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] Done -> DEBU 2e3a Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] SimulateProposal -> DEBU 2e3b [businesschannel][3d993208] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3c [businesschannel][3d993208] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3d [businesschannel][3d993208] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e3e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e3f Sign: plaintext: 0A209E2BEBF5810375D1E37635180076...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e40 Sign: digest: 363FCCE3F7DEB930D82E10E0E713734CE9239405AC545754A93FD1B6565EFB75 " +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e41 Exiting {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e42 [businesschannel][3d993208] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [lockbasedtxmgr] Done -> DEBU 2e43 Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [endorser] func1 -> DEBU 2e44 Exit: request from 172.18.0.9:58400" +peer0.org1.example.com | "2019-07-20 02:40:31.204 UTC [comm.grpc.server] 1 -> INFO 2e45 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58400 grpc.code=OK grpc.call_duration=4.198ms +peer0.org1.example.com | "2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e47 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [endorser] ProcessProposal -> DEBU 2e48 Entering: request from 172.18.0.9:58404" +peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] ValidateProposalMessage -> DEBU 2e49 ValidateProposalMessage starts for signed proposal 0xc00399e690" +peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] validateChannelHeader -> DEBU 2e4a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4b begin" +peer0.org1.example.com | "2019-07-20 02:40:31.352 UTC [msp] GetManagerForChain -> DEBU 2e4c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4e creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e4f Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| +peer0.org1.example.com | 00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e50 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| +peer0.org1.example.com | 00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| +peer0.org1.example.com | 00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| +peer0.org1.example.com | 00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| +peer0.org1.example.com | 00000040 2f d2 8f aa 25 45 75 |/...%Eu|" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e51 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e52 validateChaincodeProposalMessage starts for proposal 0xc002a5ad90, header 0xc00399eaa0" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e53 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [endorser] preProcess -> DEBU 2e54 [businesschannel][7925c232] processing txid: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3" +peer0.org1.example.com | "2019-07-20 02:40:31.353 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e55 retrieveTransactionByID() - txId = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e56 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e57 constructing new tx simulator txid = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [endorser] SimulateProposal -> DEBU 2e58 [businesschannel][7925c232] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [endorser] callChaincode -> INFO 2e59 [businesschannel][7925c232] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [chaincode] Execute -> DEBU 2e5a Entry" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5b acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5c acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e60 0xc003810b80 gate 1563590431355085800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e61 0xc003810b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e62 0xc003810b80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e63 0xc003810b80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| +peer0.org1.example.com | 00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| +peer0.org1.example.com | 00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| +peer0.org1.example.com | 00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| +peer0.org1.example.com | 00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| +peer0.org1.example.com | 00000040 2f d2 8f aa 25 45 75 |/...%Eu|" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e66 0xc003810b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e67 0xc003810b80 gate 1563590431355085800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] handleMessage -> DEBU 2e6c [7925c232] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] HandleTransaction -> DEBU 2e6d [7925c232] handling GET_STATE_BY_RANGE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [leveldbhelper] GetIterator -> DEBU 2e6e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [rwsetutil] AddResult -> DEBU 2e6f Adding a result" +peer0.org1.example.com | "2019-07-20 02:40:31.356 UTC [chaincode] HandleGetStateByRange -> DEBU 2e70 Got keys and values. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e71 [7925c232] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e72 [7925c232] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e73 [7925c232] handling QUERY_STATE_CLOSE from chaincode" +peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e74 [7925c232] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +peer0.org1.example.com | "2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e75 [7925c232] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [chaincode] Notify -> DEBU 2e76 [7925c232] notifying Txid:7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [chaincode] Execute -> DEBU 2e77 Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] callChaincode -> INFO 2e78 [businesschannel][7925c232] Exit chaincode: name:"lscc" (12ms)" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e79 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] Done -> DEBU 2e7a Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] SimulateProposal -> DEBU 2e7b [businesschannel][7925c232] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.366 UTC [endorser] endorseProposal -> DEBU 2e7c [businesschannel][7925c232] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] endorseProposal -> DEBU 2e7d [businesschannel][7925c232] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e7e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e7f Sign: plaintext: 0A209AF619A7859ADC410AEE54B475C5...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e80 Sign: digest: 66D9F0AE6A8B6D0BDFA74EC725FED4FAB07281773EC61CB4846DDF0E5D851AEF " +peer0.org1.example.com | "2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e81 Exiting {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [endorser] endorseProposal -> DEBU 2e82 [businesschannel][7925c232] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [lockbasedtxmgr] Done -> DEBU 2e83 Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [endorser] func1 -> DEBU 2e84 Exit: request from 172.18.0.9:58404" +peer0.org1.example.com | "2019-07-20 02:40:31.368 UTC [comm.grpc.server] 1 -> INFO 2e85 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58404 grpc.code=OK grpc.call_duration=16.3707ms +peer0.org1.example.com | "2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e86 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.719 UTC [endorser] ProcessProposal -> DEBU 2e88 Entering: request from 172.18.0.9:58408" +peer0.org1.example.com | "2019-07-20 02:40:31.719 UTC [protoutils] ValidateProposalMessage -> DEBU 2e89 ValidateProposalMessage starts for signed proposal 0xc003d22410" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] validateChannelHeader -> DEBU 2e8a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8b begin" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp] GetManagerForChain -> DEBU 2e8c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8e creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e8f Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| +peer0.org1.example.com | 00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" +peer0.org1.example.com | "2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e90 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| +peer0.org1.example.com | 00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| +peer0.org1.example.com | 00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| +peer0.org1.example.com | 00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| +peer0.org1.example.com | 00000040 d1 d0 19 37 df b2 |...7..|" +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e91 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e92 validateChaincodeProposalMessage starts for proposal 0xc0029ac1c0, header 0xc003d22870" +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e93 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] preProcess -> DEBU 2e94 [businesschannel][dd8fd934] processing txid: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a" +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e95 retrieveTransactionByID() - txId = [dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a]" +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] SimulateProposal -> DEBU 2e96 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [endorser] callChaincode -> INFO 2e97 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.721 UTC [chaincode] Execute -> DEBU 2e98 Entry" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [qscc] Invoke -> DEBU 2e99 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9b acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003b4c0c0 gate 1563590431722676400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea0 0xc003b4c0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea1 0xc003b4c0c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc003b4c0c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea3 Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| +peer0.org1.example.com | 00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea4 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| +peer0.org1.example.com | 00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| +peer0.org1.example.com | 00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| +peer0.org1.example.com | 00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| +peer0.org1.example.com | 00000040 d1 d0 19 37 df b2 |...7..|" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc003b4c0c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [cauthdsl] func1 -> DEBU 2ea6 0xc003b4c0c0 gate 1563590431722676400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea7 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [policies] Evaluate -> DEBU 2eaa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] handleMessage -> DEBU 2eab [dd8fd934] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] Notify -> DEBU 2eac [dd8fd934] notifying Txid:dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [chaincode] Execute -> DEBU 2ead Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] callChaincode -> INFO 2eae [businesschannel][dd8fd934] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] SimulateProposal -> DEBU 2eaf [businesschannel][dd8fd934] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb0 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb1 [businesschannel][dd8fd934] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:31.724 UTC [endorser] EndorseWithPlugin -> DEBU 2eb2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb3 Sign: plaintext: 0A2070FDD43188AE8CAE2BB47E6B654F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb4 Sign: digest: FDDD85326B9859D771E0B5898B5DF6BDBAF7EE9E62BB1F52B98D226C565011A3 " +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] EndorseWithPlugin -> DEBU 2eb5 Exiting {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] endorseProposal -> DEBU 2eb6 [businesschannel][dd8fd934] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [endorser] func1 -> DEBU 2eb7 Exit: request from 172.18.0.9:58408" +peer0.org1.example.com | "2019-07-20 02:40:31.725 UTC [comm.grpc.server] 1 -> INFO 2eb8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58408 grpc.code=OK grpc.call_duration=6.2471ms +peer0.org1.example.com | "2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [endorser] ProcessProposal -> DEBU 2ebb Entering: request from 172.18.0.9:58412" +peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] ValidateProposalMessage -> DEBU 2ebc ValidateProposalMessage starts for signed proposal 0xc003d23950" +peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] validateChannelHeader -> DEBU 2ebd validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:31.873 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ebe begin" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp] GetManagerForChain -> DEBU 2ebf Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec1 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| +peer0.org1.example.com | 00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| +peer0.org1.example.com | 00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| +peer0.org1.example.com | 00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| +peer0.org1.example.com | 00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ec4 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:31.874 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec5 validateChaincodeProposalMessage starts for proposal 0xc0029ac620, header 0xc003d23db0" +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] preProcess -> DEBU 2ec7 [businesschannel][b2c8af94] processing txid: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67" +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ec8 retrieveTransactionByID() - txId = [b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67]" +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] SimulateProposal -> DEBU 2ec9 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [endorser] callChaincode -> INFO 2eca [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [chaincode] Execute -> DEBU 2ecb Entry" +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [qscc] Invoke -> DEBU 2ecc Invoke function: GetBlockByNumber on chain: businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.875 UTC [aclmgmt] CheckACL -> DEBU 2ecd acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [aclmgmt] CheckACL -> DEBU 2ece acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [cauthdsl] func1 -> DEBU 2ed2 0xc0003ddce0 gate 1563590431876580200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.876 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003ddce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003ddce0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc0003ddce0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| +peer0.org1.example.com | 00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed7 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| +peer0.org1.example.com | 00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| +peer0.org1.example.com | 00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| +peer0.org1.example.com | 00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ed8 0xc0003ddce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [cauthdsl] func1 -> DEBU 2ed9 0xc0003ddce0 gate 1563590431876580200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [policies] Evaluate -> DEBU 2edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2ede retrieveBlockByNumber() - blockNum = [2]" +peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] newBlockfileStream -> DEBU 2edf newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" +peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee0 Remaining bytes=[36402], Going to peek [8] bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee1 Returning blockbytes - length=[23781], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" +peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] handleMessage -> DEBU 2ee2 [b2c8af94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] Notify -> DEBU 2ee3 [b2c8af94] notifying Txid:b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [chaincode] Execute -> DEBU 2ee4 Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [endorser] callChaincode -> INFO 2ee5 [businesschannel][b2c8af94] Exit chaincode: name:"qscc" (4ms)" +peer0.org1.example.com | "2019-07-20 02:40:31.879 UTC [endorser] SimulateProposal -> DEBU 2ee6 [businesschannel][b2c8af94] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee7 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee8 [businesschannel][b2c8af94] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [endorser] EndorseWithPlugin -> DEBU 2ee9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.880 UTC [msp.identity] Sign -> DEBU 2eea Sign: plaintext: 0A2036A3CDEF14D19587AB9EF2BCE767...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [msp.identity] Sign -> DEBU 2eeb Sign: digest: C4F9350E47494E49BCA826CFABD27DC035B15BABCC5B92822587F660B0B5F404 " +peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] EndorseWithPlugin -> DEBU 2eec Exiting {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" +peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] endorseProposal -> DEBU 2eed [businesschannel][b2c8af94] Exit" +peer0.org1.example.com | "2019-07-20 02:40:31.881 UTC [endorser] func1 -> DEBU 2eee Exit: request from 172.18.0.9:58412" +peer0.org1.example.com | "2019-07-20 02:40:31.882 UTC [comm.grpc.server] 1 -> INFO 2eef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58412 grpc.code=OK grpc.call_duration=8.8663ms +peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] warningf -> DEBU 2ef1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58412: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:31.899 UTC [gossip.comm] func1 -> DEBU 2ef3 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.899 UTC [gossip.gossip] handleMessage -> DEBU 2ef4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.gossip] handleMessage -> DEBU 2ef5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef6 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ef7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:31.900 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.902 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0002defe0 gate 1563590431902859400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f00 0xc0002defe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0002defe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0002defe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0002defe0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f04 0xc0002defe0 gate 1563590431902859400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f08 0xc0002df830 gate 1563590431904830900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f09 0xc0002df830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0a 0xc0002df830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0b 0xc0002df830 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.904 UTC [msp.identity] Verify -> DEBU 2f0c Verify: digest = 00000000 4a 3c a8 97 ce 24 57 51 8e 87 51 64 33 0f 25 92 |J<...$WQ..Qd3.%.| +peer0.org1.example.com | 00000010 d8 a5 69 b9 1a 02 bf 17 f5 e4 d6 78 8a 4c 44 3c |..i........x.LD<|" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [msp.identity] Verify -> DEBU 2f0d Verify: sig = 00000000 30 45 02 21 00 e7 e9 e4 66 f3 56 fa 3e 9d 43 8d |0E.!....f.V.>.C.| +peer0.org1.example.com | 00000010 c9 39 a6 3b ef 67 3f 6f 88 29 cb 62 a9 23 d5 4c |.9.;.g?o.).b.#.L| +peer0.org1.example.com | 00000020 ba 6f a8 e8 aa 02 20 7a 33 30 08 47 98 6c 93 c9 |.o.... z30.G.l..| +peer0.org1.example.com | 00000030 29 e1 b6 ab 0c 04 cf 3b 7b 3a 5a e4 e1 9a 9b 6b |)......;{:Z....k| +peer0.org1.example.com | 00000040 61 ae 3f 2f 04 68 dc |a.?/.h.|" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0002df830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [cauthdsl] func1 -> DEBU 2f0f 0xc0002df830 gate 1563590431904830900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f16 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f17 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f19 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f1a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [gossip.discovery] sendMemResponse -> DEBU 2f1c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:31.905 UTC [msp] DeserializeIdentity -> DEBU 2f1d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] Send -> DEBU 2f20 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.discovery] sendMemResponse -> DEBU 2f21 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > alive: " +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f23 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.comm] func1 -> DEBU 2f24 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.gossip] handleMessage -> DEBU 2f25 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [gossip.pull] HandleMessage -> DEBU 2f26 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.931 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f28 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.933 UTC [gossip.pull] SendDigest -> DEBU 2f2d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:31.933 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f2f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] IsLeader -> DEBU 2f30 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f31 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f32 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100B1801 " +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f33 Sign: digest: 2F26E4B97497DB1253FB70B9B9C3E2C6F0505DF73F214674042C23DD57685088 " +peer0.org1.example.com | "2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f34 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f37 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [msp] DeserializeIdentity -> DEBU 2f3a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [cauthdsl] func1 -> DEBU 2f41 0xc000267050 gate 1563590431975107500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.975 UTC [cauthdsl] func2 -> DEBU 2f42 0xc000267050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f43 0xc000267050 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f44 0xc000267050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f45 0xc000267050 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [cauthdsl] func1 -> DEBU 2f46 0xc000267050 gate 1563590431975107500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f4a 0xc0002678d0 gate 1563590431976993400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0002678d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4c 0xc0002678d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4d 0xc0002678d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4e Verify: digest = 00000000 0b 08 da b1 e5 fb 95 4c 01 d7 21 e0 a3 01 36 58 |.......L..!...6X| +peer0.org1.example.com | 00000010 13 e9 fe e7 af 03 d2 1b 72 3d 58 a9 50 b9 92 9e |........r=X.P...|" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4f Verify: sig = 00000000 30 45 02 21 00 80 78 32 b8 90 6b ec fc c7 70 c0 |0E.!..x2..k...p.| +peer0.org1.example.com | 00000010 50 95 d1 12 8f e0 41 8b 80 19 9d bc c7 7d 24 f3 |P.....A......}$.| +peer0.org1.example.com | 00000020 e6 f7 30 50 84 02 20 5d b3 a7 9c e9 7a 6b b0 66 |..0P.. ]....zk.f| +peer0.org1.example.com | 00000030 0b 1c a9 aa 1b 3f 6b 33 fa e0 3e c4 3a 77 06 49 |.....?k3..>.:w.I| +peer0.org1.example.com | 00000040 ad 06 35 1a 4b 87 1e |..5.K..|" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f50 0xc0002678d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f51 0xc0002678d0 gate 1563590431976993400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f54 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:31.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f58 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f59 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f5d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.comm] func1 -> DEBU 2f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [msp] DeserializeIdentity -> DEBU 2f5f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.980 UTC [gossip.gossip] handleMessage -> DEBU 2f60 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f61 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f62 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f64 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f66 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.comm] Send -> DEBU 2f68 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.comm] func1 -> DEBU 2f67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f72 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f75 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.983 UTC [gossip.comm] sendToEndpoint -> DEBU 2f79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:31.984 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.226 UTC [gossip.pull] Hello -> DEBU 2f7d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f7e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f7f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f80 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f81 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] Send -> DEBU 2f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f84 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f85 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f86 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f87 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 2f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f88 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.230 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.pull] HandleMessage -> DEBU 2f8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f90 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f91 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f92 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f94 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f95 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f96 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151024 " +peer0.org1.example.com | "2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f97 Sign: digest: 11880CBF20E9DB2890F54E010AACD2C7F187ED0030E16E6018FEB365E8332922 " +peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f98 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f99 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f9a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [msp] DeserializeIdentity -> DEBU 2f9b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.269 UTC [gossip.comm] Send -> DEBU 2f9c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [msp] DeserializeIdentity -> DEBU 2f9d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.comm] func1 -> DEBU 2fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.272 UTC [gossip.comm] func1 -> DEBU 2fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fac Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" +peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [gossip.comm] func1 -> DEBU 2faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fb0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:32.276 UTC [msp.identity] Verify -> DEBU 2fb1 Verify: sig = 00000000 30 44 02 20 02 0e 0b f7 41 03 4f 30 6b c2 7e 44 |0D. ....A.O0k.~D| +peer0.org1.example.com | 00000010 e6 e7 27 82 f5 81 a2 72 0e 8c 08 b3 3b 39 9e 10 |..'....r....;9..| +peer0.org1.example.com | 00000020 37 a2 5f 39 02 20 7b 0d 90 0c 12 0b 34 94 7f 69 |7._9. {.....4..i| +peer0.org1.example.com | 00000030 16 b8 7f 74 d7 c8 92 18 39 d4 02 65 b9 e2 06 33 |...t....9..e...3| +peer0.org1.example.com | 00000040 7d 37 1e 54 64 9f |}7.Td.|" +peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] isSentByMe -> DEBU 2fb3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fb8 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151025 " +peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fbb Sign: digest: 8009FFDB913E4C620E5BA94DB01E28E781CF96B1CDF79A2614F455E82EFAB0DD " +peer0.org1.example.com | "2019-07-20 02:40:32.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fbc Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fbd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbe Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbf Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:32.280 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2fc0 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc1 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc2 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" +peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fc5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.282 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp.identity] Verify -> DEBU 2fc7 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" +peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.283 UTC [gossip.discovery] isSentByMe -> DEBU 2fcb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fcc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.284 UTC [gossip.comm] Send -> DEBU 2fce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [gossip.comm] Send -> DEBU 2fd2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.285 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +peer0.org1.example.com | 00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [msp.identity] Verify -> DEBU 2fd5 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +peer0.org1.example.com | 00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +peer0.org1.example.com | 00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +peer0.org1.example.com | 00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +peer0.org1.example.com | 00000040 2f 63 20 e5 1e f8 |/c ...|" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] Send -> DEBU 2fd6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fde Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fda Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.discovery] isSentByMe -> DEBU 2fdf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fe0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fe1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.288 UTC [msp] DeserializeIdentity -> DEBU 2fe2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [policies] Evaluate -> DEBU 2fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [cauthdsl] func1 -> DEBU 2fe9 0xc00019d7a0 gate 1563590432290108200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.287 UTC [gossip.gossip] handleMessage -> DEBU 2fdd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.290 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00019d7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.292 UTC [cauthdsl] func2 -> DEBU 2feb 0xc00019d7a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fec 0xc00019d7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fed 0xc00019d7a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [cauthdsl] func1 -> DEBU 2fee 0xc00019d7a0 gate 1563590432290108200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.293 UTC [policies] Evaluate -> DEBU 2fef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc00042a050 gate 1563590432294502100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff3 0xc00042a050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff4 0xc00042a050 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff5 0xc00042a050 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff6 Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| +peer0.org1.example.com | 00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" +peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff7 Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| +peer0.org1.example.com | 00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| +peer0.org1.example.com | 00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| +peer0.org1.example.com | 00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| +peer0.org1.example.com | 00000040 73 f1 a6 87 33 15 00 |s...3..|" +peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc00042a050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.295 UTC [cauthdsl] func1 -> DEBU 2ff9 0xc00042a050 gate 1563590432294502100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.296 UTC [policies] Evaluate -> DEBU 2ffa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ffe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3000 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3001 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +peer0.org1.example.com | 00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +peer0.org1.example.com | "2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3002 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +peer0.org1.example.com | 00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +peer0.org1.example.com | 00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +peer0.org1.example.com | 00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +peer0.org1.example.com | 00000040 26 61 82 2d 44 90 |&a.-D.|" +peer0.org1.example.com | "2019-07-20 02:40:32.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 3003 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 3004 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.303 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3005 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.333 UTC [gossip.comm] func1 -> DEBU 3006 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 3007 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.pull] HandleMessage -> DEBU 3008 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.pull] SendDigest -> DEBU 3009 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 300a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.comm] func1 -> DEBU 300b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3010 Verify: digest = 00000000 3a ad df f3 f8 21 1b 66 29 6b 93 bb b0 c7 a9 21 |:....!.f)k.....!| +peer0.org1.example.com | 00000010 46 2b bb 2d 1d d2 a4 ed fe 33 aa 85 73 15 bf db |F+.-.....3..s...|" +peer0.org1.example.com | "2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3011 Verify: sig = 00000000 30 44 02 20 2e e6 c6 e9 6a 39 29 84 0d 01 e4 17 |0D. ....j9).....| +peer0.org1.example.com | 00000010 3b cd 3a 85 91 34 dd 08 ce 3a 69 bd 38 8a bc 58 |;.:..4...:i.8..X| +peer0.org1.example.com | 00000020 4c 26 68 2d 02 20 50 b3 06 d9 47 f8 a1 69 f9 fc |L&h-. P...G..i..| +peer0.org1.example.com | 00000030 f0 d3 c4 6f 96 ad 6a 95 06 b1 09 08 7f cb 32 2e |...o..j.......2.| +peer0.org1.example.com | 00000040 03 99 3a 23 cf 54 |..:#.T|" +peer0.org1.example.com | "2019-07-20 02:40:32.343 UTC [gossip.discovery] handleAliveMessage -> DEBU 3012 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3013 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3014 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3015 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3016 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3017 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.346 UTC [gossip.discovery] handleAliveMessage -> DEBU 3018 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3019 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.348 UTC [msp] DeserializeIdentity -> DEBU 301f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3021 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3023 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3024 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3025 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3026 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3027 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.357 UTC [gossip.comm] func1 -> DEBU 3028 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.357 UTC [gossip.gossip] handleMessage -> DEBU 3029 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.358 UTC [gossip.gossip] handleMessage -> DEBU 302a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.comm] func1 -> DEBU 302d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.363 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3030 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.363 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3031 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3032 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +peer0.org1.example.com | "2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3033 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" +peer0.org1.example.com | "2019-07-20 02:40:32.365 UTC [msp.identity] Verify -> DEBU 3034 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [msp.identity] Verify -> DEBU 3035 Verify: sig = 00000000 30 45 02 21 00 d7 b3 77 b9 9c a8 b7 cf 62 94 14 |0E.!...w.....b..| +peer0.org1.example.com | 00000010 1e 48 d0 65 39 ba 66 d5 56 10 15 e8 3a 6c d0 4b |.H.e9.f.V...:l.K| +peer0.org1.example.com | 00000020 5a 40 9d bd 3d 02 20 40 35 bb 23 40 27 a8 c3 2b |Z@..=. @5.#@'..+| +peer0.org1.example.com | 00000030 fa 62 36 d6 d0 83 75 12 06 71 21 86 8a 1b 62 d4 |.b6...u..q!...b.| +peer0.org1.example.com | 00000040 b5 0a 81 7a bb ca 3a |...z..:|" +peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 3036 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3037 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3038 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 303d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.366 UTC [endorser] ProcessProposal -> DEBU 3039 Entering: request from 172.18.0.9:58416" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] ValidateProposalMessage -> DEBU 3040 ValidateProposalMessage starts for signed proposal 0xc000193f40" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [gossip.discovery] sendMemResponse -> DEBU 303f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] validateChannelHeader -> DEBU 3041 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3042 begin" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3043 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] GetManagerForChain -> DEBU 3044 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3048 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| +peer0.org1.example.com | 00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" +peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3049 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| +peer0.org1.example.com | 00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| +peer0.org1.example.com | 00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| +peer0.org1.example.com | 00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| +peer0.org1.example.com | 00000040 78 fa ad 48 80 25 b3 |x..H.%.|" +peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] checkSignatureFromCreator -> DEBU 304a exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304b validateChaincodeProposalMessage starts for proposal 0xc00015fc00, header 0xc0003b4780" +peer0.org1.example.com | "2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] preProcess -> DEBU 304d [businesschannel][334c0366] processing txid: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed" +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed]" +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] SimulateProposal -> DEBU 3050 [businesschannel][334c0366] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [endorser] callChaincode -> INFO 3051 [businesschannel][334c0366] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [chaincode] Execute -> DEBU 3052 Entry" +peer0.org1.example.com | "2019-07-20 02:40:32.370 UTC [gossip.comm] Send -> DEBU 304e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [cscc] Invoke -> DEBU 3053 Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3054 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3055 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [gossip.discovery] sendMemResponse -> DEBU 3056 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [policies] Evaluate -> DEBU 3057 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [cauthdsl] func1 -> DEBU 305b 0xc00027f080 gate 1563590432372481400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.372 UTC [cauthdsl] func2 -> DEBU 305c 0xc00027f080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305d 0xc00027f080 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.371 UTC [gossip.comm] sendToEndpoint -> DEBU 3058 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305e 0xc00027f080 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3060 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| +peer0.org1.example.com | 00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" +peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3061 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| +peer0.org1.example.com | 00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| +peer0.org1.example.com | 00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| +peer0.org1.example.com | 00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| +peer0.org1.example.com | 00000040 78 fa ad 48 80 25 b3 |x..H.%.|" +peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [cauthdsl] func2 -> DEBU 3062 0xc00027f080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [cauthdsl] func1 -> DEBU 3063 0xc00027f080 gate 1563590432372481400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.373 UTC [gossip.comm] sendToEndpoint -> DEBU 305f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.374 UTC [policies] Evaluate -> DEBU 3064 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.375 UTC [chaincode] handleMessage -> DEBU 3068 [334c0366] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [chaincode] Notify -> DEBU 3069 [334c0366] notifying Txid:334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [chaincode] Execute -> DEBU 306a Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [endorser] callChaincode -> INFO 306b [businesschannel][334c0366] Exit chaincode: name:"cscc" (6ms)" +peer0.org1.example.com | "2019-07-20 02:40:32.376 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][334c0366] Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306d [businesschannel][334c0366] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306e [businesschannel][334c0366] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [endorser] EndorseWithPlugin -> DEBU 306f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" +peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3070 Sign: plaintext: 0A20C5D1BC40D3FB83F8358FF9F638BD...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3071 Sign: digest: 0D1E7E24711E974B88D241D66A8434CBF47F1068E52FEF7D15CD5BA472B2DBFF " +peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] EndorseWithPlugin -> DEBU 3072 Exiting {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" +peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][334c0366] Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [endorser] func1 -> DEBU 3074 Exit: request from 172.18.0.9:58416" +peer0.org1.example.com | "2019-07-20 02:40:32.378 UTC [comm.grpc.server] 1 -> INFO 3075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58416 grpc.code=OK grpc.call_duration=12.304ms +peer0.org1.example.com | "2019-07-20 02:40:32.386 UTC [grpc] infof -> DEBU 3076 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:32.387 UTC [grpc] infof -> DEBU 3077 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:32.522 UTC [gossip.comm] func1 -> DEBU 3078 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.pull] HandleMessage -> DEBU 307a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 3080 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.pull] SendDigest -> DEBU 3081 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3082 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.526 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3085 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3086 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3087 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [msp] DeserializeIdentity -> DEBU 3088 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3089 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 308f 0xc0005866d0 gate 1563590432528178000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3090 0xc0005866d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3091 0xc0005866d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3092 0xc0005866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3093 0xc0005866d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3094 0xc0005866d0 gate 1563590432528178000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3095 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3096 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3098 0xc000586f10 gate 1563590432528554400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3099 0xc000586f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309a 0xc000586f10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309b 0xc000586f10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 75 6b 5a 52 d7 9b 9c d1 44 a1 76 b9 44 34 63 21 |ukZR....D.v.D4c!| +peer0.org1.example.com | 00000010 86 cb 91 26 5b 43 76 58 40 1e 88 3d 21 f8 e0 dd |...&[CvX@..=!...|" +peer0.org1.example.com | "2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 44 02 20 79 1d 35 71 ba 2e 6f 5e 9c a6 04 a9 |0D. y.5q..o^....| +peer0.org1.example.com | 00000010 22 a8 43 04 e4 cf 7d bd 7a 24 a9 62 17 04 48 f9 |".C...}.z$.b..H.| +peer0.org1.example.com | 00000020 df 3a a5 c2 02 20 4e a2 d3 80 b7 b7 43 df db 5d |.:... N.....C..]| +peer0.org1.example.com | 00000030 7c 93 b9 73 1c e2 93 90 04 1c d9 f3 a7 9c 62 a3 ||..s..........b.| +peer0.org1.example.com | 00000040 ad fe ce c4 0b 32 |.....2|" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [cauthdsl] func2 -> DEBU 309e 0xc000586f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [cauthdsl] func1 -> DEBU 309f 0xc000586f10 gate 1563590432528554400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a6 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.538 UTC [gossip.comm] func1 -> DEBU 30af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.comm] func1 -> DEBU 30b9 Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30bb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bc Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.543 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:32.544 UTC [msp] DeserializeIdentity -> DEBU 30be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func1 -> DEBU 30c5 0xc0006bb3e0 gate 1563590432546561200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c6 0xc0006bb3e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c7 0xc0006bb3e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c8 0xc0006bb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30c9 0xc0006bb3e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ca 0xc0006bb3e0 gate 1563590432546561200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ce 0xc0006bbc60 gate 1563590432547577600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30cf 0xc0006bbc60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30d0 0xc0006bbc60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [cauthdsl] func2 -> DEBU 30d1 0xc0006bbc60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d2 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| +peer0.org1.example.com | 00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" +peer0.org1.example.com | "2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d3 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| +peer0.org1.example.com | 00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| +peer0.org1.example.com | 00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| +peer0.org1.example.com | 00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| +peer0.org1.example.com | 00000040 a7 1d 12 7a d0 f4 9a |...z...|" +peer0.org1.example.com | "2019-07-20 02:40:32.549 UTC [cauthdsl] func2 -> DEBU 30d4 0xc0006bbc60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.549 UTC [cauthdsl] func1 -> DEBU 30d5 0xc0006bbc60 gate 1563590432547577600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [policies] Evaluate -> DEBU 30db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 30dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.555 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.556 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.557 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [gossip.comm] Send -> DEBU 30e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e4 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.562 UTC [gossip.comm] sendToEndpoint -> DEBU 30ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.564 UTC [gossip.discovery] sendMemResponse -> DEBU 30ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:32.564 UTC [msp] DeserializeIdentity -> DEBU 30ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.566 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.567 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.567 UTC [gossip.comm] Send -> DEBU 30f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.discovery] sendMemResponse -> DEBU 30f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:\304:w\006I\255\0065\032K\207\036" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] Send -> DEBU 30f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.comm] sendToEndpoint -> DEBU 30fd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.comm] func1 -> DEBU 30fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.685 UTC [gossip.gossip] handleMessage -> DEBU 30ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.686 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.686 UTC [gossip.comm] func1 -> DEBU 3101 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.688 UTC [gossip.comm] func1 -> DEBU 3102 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.693 UTC [msp] DeserializeIdentity -> DEBU 3103 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3104 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] Send -> DEBU 3105 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3106 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3107 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3108 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3109 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310e Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +peer0.org1.example.com | "2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310f Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +peer0.org1.example.com | "2019-07-20 02:40:32.697 UTC [msp.identity] Verify -> DEBU 3110 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 3111 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:32.704 UTC [msp] DeserializeIdentity -> DEBU 3112 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.708 UTC [msp] DeserializeIdentity -> DEBU 3113 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3114 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3115 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3116 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3117 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3118 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [policies] Evaluate -> DEBU 3119 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [cauthdsl] func1 -> DEBU 311a 0xc0007d57f0 gate 1563590432713529700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.713 UTC [cauthdsl] func2 -> DEBU 311b 0xc0007d57f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311c 0xc0007d57f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311d 0xc0007d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311e 0xc0007d57f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [cauthdsl] func1 -> DEBU 311f 0xc0007d57f0 gate 1563590432713529700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.714 UTC [policies] Evaluate -> DEBU 3120 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func1 -> DEBU 3123 0xc00289c050 gate 1563590432715391700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3124 0xc00289c050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3125 0xc00289c050 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3126 0xc00289c050 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 3129 0xc00289c050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [cauthdsl] func1 -> DEBU 312a 0xc00289c050 gate 1563590432715391700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.716 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.719 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.719 UTC [cauthdsl] func1 -> DEBU 3137 0xc00289d970 gate 1563590432719715300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3138 0xc00289d970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3139 0xc00289d970 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313a 0xc00289d970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313b 0xc00289d970 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.721 UTC [cauthdsl] func1 -> DEBU 313c 0xc00289d970 gate 1563590432719715300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func1 -> DEBU 3140 0xc002932230 gate 1563590432722409700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3141 0xc002932230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3142 0xc002932230 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3143 0xc002932230 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.722 UTC [msp.identity] Verify -> DEBU 3144 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [msp.identity] Verify -> DEBU 3145 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [cauthdsl] func2 -> DEBU 3146 0xc002932230 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [cauthdsl] func1 -> DEBU 3147 0xc002932230 gate 1563590432722409700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3148 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3149 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 314a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [msp] DeserializeIdentity -> DEBU 314c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3150 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3151 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3152 0xc002933360 gate 1563590432725069500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3153 0xc002933360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3154 0xc002933360 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3155 0xc002933360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3156 0xc002933360 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3157 0xc002933360 gate 1563590432725069500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3158 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.726 UTC [policies] Evaluate -> DEBU 315a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.727 UTC [cauthdsl] func1 -> DEBU 315b 0xc002933ba0 gate 1563590432727412100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315c 0xc002933ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315d 0xc002933ba0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 315e 0xc002933ba0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 3161 0xc002933ba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.729 UTC [cauthdsl] func1 -> DEBU 3162 0xc002933ba0 gate 1563590432727412100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3163 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3164 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3165 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3166 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3167 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3168 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.730 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +peer0.org1.example.com | "2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +peer0.org1.example.com | "2019-07-20 02:40:32.732 UTC [msp.identity] Verify -> DEBU 316c Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +peer0.org1.example.com | 00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 316d Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +peer0.org1.example.com | 00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +peer0.org1.example.com | 00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +peer0.org1.example.com | 00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3170 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3171 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3173 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3174 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3175 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func1 -> DEBU 3176 0xc0029d46a0 gate 1563590432734680100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3177 0xc0029d46a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3178 0xc0029d46a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.737 UTC [msp] DeserializeIdentity -> DEBU 3179 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [gossip.pull] Hello -> DEBU 317b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.742 UTC [msp] DeserializeIdentity -> DEBU 317d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.743 UTC [gossip.comm] Send -> DEBU 317e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 317f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3180 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.740 UTC [cauthdsl] func2 -> DEBU 3181 0xc0029d46a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.747 UTC [cauthdsl] func2 -> DEBU 3182 0xc0029d46a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [cauthdsl] func1 -> DEBU 3183 0xc0029d46a0 gate 1563590432734680100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [policies] Evaluate -> DEBU 3185 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.749 UTC [gossip.comm] func1 -> DEBU 3184 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.751 UTC [policies] Evaluate -> DEBU 3186 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [policies] Evaluate -> DEBU 3187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func1 -> DEBU 3188 0xc0029d4ee0 gate 1563590432752494900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 3189 0xc0029d4ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 318a 0xc0029d4ee0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [cauthdsl] func2 -> DEBU 318b 0xc0029d4ee0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318c Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318d Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:32.754 UTC [cauthdsl] func2 -> DEBU 318e 0xc0029d4ee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.755 UTC [cauthdsl] func1 -> DEBU 318f 0xc0029d4ee0 gate 1563590432752494900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.755 UTC [policies] Evaluate -> DEBU 3190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.756 UTC [policies] Evaluate -> DEBU 3191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3192 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3194 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.766 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.767 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.768 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.769 UTC [cauthdsl] func1 -> DEBU 319c 0xc002a626c0 gate 1563590432769533600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.769 UTC [cauthdsl] func2 -> DEBU 319d 0xc002a626c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319e 0xc002a626c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319f 0xc002a626c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [cauthdsl] func2 -> DEBU 31a0 0xc002a626c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [cauthdsl] func1 -> DEBU 31a1 0xc002a626c0 gate 1563590432769533600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.771 UTC [policies] Evaluate -> DEBU 31a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.772 UTC [policies] Evaluate -> DEBU 31a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [policies] Evaluate -> DEBU 31a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [cauthdsl] func1 -> DEBU 31a5 0xc002a63010 gate 1563590432773220600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.773 UTC [cauthdsl] func2 -> DEBU 31a6 0xc002a63010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.774 UTC [cauthdsl] func2 -> DEBU 31a7 0xc002a63010 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [cauthdsl] func2 -> DEBU 31a8 0xc002a63010 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31a9 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31aa Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:32.776 UTC [cauthdsl] func2 -> DEBU 31ab 0xc002a63010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.776 UTC [cauthdsl] func1 -> DEBU 31ac 0xc002a63010 gate 1563590432773220600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.779 UTC [policies] Evaluate -> DEBU 31b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.780 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31b7 0xc002a920f0 gate 1563590432789206000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b8 0xc002a920f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b9 0xc002a920f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31ba 0xc002a920f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31bb 0xc002a920f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31bc 0xc002a920f0 gate 1563590432789206000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31c0 0xc002a92930 gate 1563590432789572500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c1 0xc002a92930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c2 0xc002a92930 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c3 0xc002a92930 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c4 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c5 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [cauthdsl] func2 -> DEBU 31c6 0xc002a92930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [cauthdsl] func1 -> DEBU 31c7 0xc002a92930 gate 1563590432789572500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31ca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31ce Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +peer0.org1.example.com | 00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +peer0.org1.example.com | "2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31cf Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +peer0.org1.example.com | 00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +peer0.org1.example.com | 00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +peer0.org1.example.com | 00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +peer0.org1.example.com | 00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +peer0.org1.example.com | "2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.823 UTC [policies] Evaluate -> DEBU 31d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.824 UTC [cauthdsl] func1 -> DEBU 31d8 0xc002aa0b10 gate 1563590432824014900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31d9 0xc002aa0b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31da 0xc002aa0b10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31db 0xc002aa0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31dc 0xc002aa0b10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [cauthdsl] func1 -> DEBU 31dd 0xc002aa0b10 gate 1563590432824014900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.829 UTC [cauthdsl] func1 -> DEBU 31e1 0xc002aa1350 gate 1563590432829076500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e2 0xc002aa1350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e3 0xc002aa1350 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e4 0xc002aa1350 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e5 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +peer0.org1.example.com | 00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +peer0.org1.example.com | "2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e6 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +peer0.org1.example.com | 00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 31e7 0xc002aa1350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.832 UTC [cauthdsl] func1 -> DEBU 31e8 0xc002aa1350 gate 1563590432829076500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31eb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.836 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.837 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.838 UTC [cauthdsl] func1 -> DEBU 31f5 0xc002ed0b50 gate 1563590432838821700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f6 0xc002ed0b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f7 0xc002ed0b50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f8 0xc002ed0b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f9 0xc002ed0b50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.840 UTC [cauthdsl] func1 -> DEBU 31fa 0xc002ed0b50 gate 1563590432838821700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.861 UTC [policies] Evaluate -> DEBU 31fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.861 UTC [cauthdsl] func1 -> DEBU 31ff 0xc002ed1390 gate 1563590432861553500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.862 UTC [cauthdsl] func2 -> DEBU 3200 0xc002ed1390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3201 0xc002ed1390 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.850 UTC [gossip.comm] func1 -> DEBU 31fd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3202 0xc002ed1390 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3203 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +peer0.org1.example.com | 00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +peer0.org1.example.com | "2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3204 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +peer0.org1.example.com | 00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +peer0.org1.example.com | 00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +peer0.org1.example.com | 00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +peer0.org1.example.com | 00000040 86 55 07 8f d3 65 |.U...e|" +peer0.org1.example.com | "2019-07-20 02:40:32.869 UTC [cauthdsl] func2 -> DEBU 3205 0xc002ed1390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.869 UTC [cauthdsl] func1 -> DEBU 3206 0xc002ed1390 gate 1563590432861553500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3207 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3208 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3209 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 320a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.873 UTC [msp.identity] Verify -> DEBU 320b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:32.879 UTC [msp.identity] Verify -> DEBU 320c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3212 0xc002f5cb10 gate 1563590432880334600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3213 0xc002f5cb10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3214 0xc002f5cb10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3215 0xc002f5cb10 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3216 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3217 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3218 0xc002f5cb10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3219 0xc002f5cb10 gate 1563590432880334600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:32.880 UTC [gossip.gossip] handleMessage -> DEBU 321e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.881 UTC [gossip.gossip] handleMessage -> DEBU 321f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.883 UTC [gossip.comm] func1 -> DEBU 3220 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.884 UTC [gossip.comm] func1 -> DEBU 3221 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.pull] HandleMessage -> DEBU 3222 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3223 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3224 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.886 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3226 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [msp] DeserializeIdentity -> DEBU 3227 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3228 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.892 UTC [gossip.gossip] handleMessage -> DEBU 3229 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.906 UTC [gossip.gossip] handleMessage -> DEBU 322a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.906 UTC [msp.identity] Verify -> DEBU 322b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:32.908 UTC [msp.identity] Verify -> DEBU 322c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.918 UTC [gossip.pull] HandleMessage -> DEBU 322f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.918 UTC [gossip.pull] SendDigest -> DEBU 3230 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3231 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3232 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3233 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3234 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [msp] DeserializeIdentity -> DEBU 3235 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3236 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3237 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [msp] DeserializeIdentity -> DEBU 323a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:32.931 UTC [gossip.gossip] handleMessage -> DEBU 323b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [endorser] ProcessProposal -> DEBU 323c Entering: request from 172.18.0.9:58420" +peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] ValidateProposalMessage -> DEBU 323d ValidateProposalMessage starts for signed proposal 0xc00080e5f0" +peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] validateChannelHeader -> DEBU 323e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:32.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 323f begin" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp] GetManagerForChain -> DEBU 3240 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3241 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3242 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3243 Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| +peer0.org1.example.com | 00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3244 Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| +peer0.org1.example.com | 00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3245 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3246 validateChaincodeProposalMessage starts for proposal 0xc000407260, header 0xc00080ea50" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3247 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] preProcess -> DEBU 3248 [businesschannel][1bc589c4] processing txid: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3249 retrieveTransactionByID() - txId = [1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53]" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 324a [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 324b [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 324c Entry" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [cscc] Invoke -> DEBU 324d Invoke function: GetChannels" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324e Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| +peer0.org1.example.com | 00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324f Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| +peer0.org1.example.com | 00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3250 [1bc589c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Notify -> DEBU 3251 [1bc589c4] notifying Txid:1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, channelID:businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 3252 Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 3253 [businesschannel][1bc589c4] Exit chaincode: name:"cscc" (0ms)" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 3254 [businesschannel][1bc589c4] Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.998 UTC [endorser] endorseProposal -> DEBU 3255 [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 3256 [businesschannel][1bc589c4] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 3257 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3258 Sign: plaintext: 0A20881317A66318D893408174F0D476...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3259 Sign: digest: CC8B57189048DE397745C7CBCF9841266EBCAC1099F471FFCA261265DA217119 " +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 325a Exiting {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 325b [businesschannel][1bc589c4] Exit" +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [endorser] func1 -> DEBU 325c Exit: request from 172.18.0.9:58420" +peer0.org1.example.com | "2019-07-20 02:40:32.999 UTC [comm.grpc.server] 1 -> INFO 325d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58420 grpc.code=OK grpc.call_duration=1.6457ms +peer0.org1.example.com | "2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [gossip.comm] func1 -> DEBU 3260 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [gossip.gossip] handleMessage -> DEBU 3261 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.008 UTC [msp] DeserializeIdentity -> DEBU 3262 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3263 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3264 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.009 UTC [gossip.gossip] handleMessage -> DEBU 3265 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:33.019 UTC [gossip.comm] func1 -> DEBU 3266 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.020 UTC [gossip.gossip] handleMessage -> DEBU 3267 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp] DeserializeIdentity -> DEBU 3268 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 326f 0xc002fe9bb0 gate 1563590433021464800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3270 0xc002fe9bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3271 0xc002fe9bb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3272 0xc002fe9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3273 0xc002fe9bb0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3274 0xc002fe9bb0 gate 1563590433021464800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3275 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3276 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3277 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3278 0xc0030da410 gate 1563590433021793500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3279 0xc0030da410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327a 0xc0030da410 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327b 0xc0030da410 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [cauthdsl] func2 -> DEBU 327e 0xc0030da410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [cauthdsl] func1 -> DEBU 327f 0xc0030da410 gate 1563590433021793500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3280 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3281 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3282 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3283 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.022 UTC [gossip.gossip] handleMessage -> DEBU 3285 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [gossip.comm] func1 -> DEBU 3286 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [gossip.gossip] handleMessage -> DEBU 3287 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.029 UTC [msp] DeserializeIdentity -> DEBU 3288 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 328f 0xc0030dbf30 gate 1563590433031507100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3290 0xc0030dbf30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3291 0xc0030dbf30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3292 0xc0030dbf30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3293 0xc0030dbf30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 3294 0xc0030dbf30 gate 1563590433031507100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func1 -> DEBU 3298 0xc0030f2770 gate 1563590433032125000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 3299 0xc0030f2770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329a 0xc0030f2770 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329b 0xc0030f2770 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329e 0xc0030f2770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [cauthdsl] func1 -> DEBU 329f 0xc0030f2770 gate 1563590433032125000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [msp] DeserializeIdentity -> DEBU 32a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.033 UTC [gossip.gossip] handleMessage -> DEBU 32a5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:33.151 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32aa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:33.163 UTC [gossip.comm] func1 -> DEBU 32ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [gossip.gossip] handleMessage -> DEBU 32ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [msp] DeserializeIdentity -> DEBU 32ae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:33.166 UTC [policies] Evaluate -> DEBU 32b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32b5 0xc0031162a0 gate 1563590433175568500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b6 0xc0031162a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b7 0xc0031162a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b8 0xc0031162a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b9 0xc0031162a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32ba 0xc0031162a0 gate 1563590433175568500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32be 0xc003116c00 gate 1563590433175929200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32bf 0xc003116c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c0 0xc003116c00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c1 0xc003116c00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c2 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c3 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c4 0xc003116c00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [cauthdsl] func1 -> DEBU 32c5 0xc003116c00 gate 1563590433175929200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [msp] DeserializeIdentity -> DEBU 32ca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:33.176 UTC [gossip.gossip] handleMessage -> DEBU 32cb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.comm] func1 -> DEBU 32cc Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32cd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32cf Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:35.901 UTC [policies] Evaluate -> DEBU 32d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32d8 0xc003124d50 gate 1563590435902157400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32d9 0xc003124d50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32da 0xc003124d50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32db 0xc003124d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003124d50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32dd 0xc003124d50 gate 1563590435902157400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e1 0xc003125620 gate 1563590435902535500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e2 0xc003125620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e3 0xc003125620 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003125620 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e5 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| +peer0.org1.example.com | 00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e6 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| +peer0.org1.example.com | 00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| +peer0.org1.example.com | 00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| +peer0.org1.example.com | 00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| +peer0.org1.example.com | 00000040 27 bf 33 e5 cf 8a 00 |'.3....|" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003125620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e8 0xc003125620 gate 1563590435902535500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ef updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.discovery] sendMemResponse -> DEBU 32f5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.903 UTC [gossip.comm] Send -> DEBU 32f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.discovery] sendMemResponse -> DEBU 32fa Exiting, replying with alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.comm] func1 -> DEBU 32fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.gossip] handleMessage -> DEBU 32fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [gossip.pull] HandleMessage -> DEBU 32ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3300 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [gossip.pull] SendDigest -> DEBU 3306 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:35.931 UTC [gossip.gossip] handleMessage -> DEBU 3307 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 3308 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 3309 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.228 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 330f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3310 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3312 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3313 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3317 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 331a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.comm] func1 -> DEBU 331c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.pull] HandleMessage -> DEBU 331e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 3320 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151026 " +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3322 Sign: digest: BD9726F5555E2FF5198D8FD774556AA7FA82CA21D8859FCBF5A7FCF75D6CA8FE " +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 3323 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [msp] DeserializeIdentity -> DEBU 3327 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] Send -> DEBU 332a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3330 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.comm] func1 -> DEBU 3331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3332 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3333 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.273 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3335 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3336 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3337 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3338 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3339 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 333a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333d Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] isSentByMe -> DEBU 3341 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3342 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3343 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3345 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3346 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3348 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3349 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 334a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 334b 0xc003223710 gate 1563590436275755700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334c 0xc003223710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334d 0xc003223710 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334e 0xc003223710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334f 0xc003223710 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 3350 0xc003223710 gate 1563590436275755700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3351 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3353 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 3354 0xc003223f60 gate 1563590436276119600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3355 0xc003223f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3356 0xc003223f60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3357 0xc003223f60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3358 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| +peer0.org1.example.com | 00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3359 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| +peer0.org1.example.com | 00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| +peer0.org1.example.com | 00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| +peer0.org1.example.com | 00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| +peer0.org1.example.com | 00000040 27 bf 33 e5 cf 8a 00 |'.3....|" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 335a 0xc003223f60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 335b 0xc003223f60 gate 1563590436276119600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3360 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3361 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3362 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3363 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3364 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3365 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3366 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3367 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3368 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 3369 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 336a Verify: sig = 00000000 30 45 02 21 00 a5 09 35 d9 10 ed dc 71 72 14 b0 |0E.!...5....qr..| +peer0.org1.example.com | 00000010 82 63 5c ab 58 b6 65 75 18 f5 ea 47 eb ea e0 22 |.c\.X.eu...G..."| +peer0.org1.example.com | 00000020 38 8a 66 cb 74 02 20 51 55 63 f4 c9 d9 6f 05 65 |8.f.t. QUc...o.e| +peer0.org1.example.com | 00000030 90 5e b5 2d fb b2 4a 51 63 f8 5c f3 ef 53 a4 a0 |.^.-..JQc.\..S..| +peer0.org1.example.com | 00000040 d9 93 20 d9 c3 e3 02 |.. ....|" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] isSentByMe -> DEBU 336c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.277 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3370 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] handleMessage -> DEBU 3371 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3372 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +peer0.org1.example.com | 00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3373 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +peer0.org1.example.com | 00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +peer0.org1.example.com | 00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +peer0.org1.example.com | 00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +peer0.org1.example.com | 00000040 b4 3a 38 0a 45 dc |.:8.E.|" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3374 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3375 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3376 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3377 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +peer0.org1.example.com | 00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3378 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +peer0.org1.example.com | 00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +peer0.org1.example.com | 00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +peer0.org1.example.com | 00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +peer0.org1.example.com | 00000040 bb c9 ea 46 07 8a 5e |...F..^|" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3379 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] isSentByMe -> DEBU 337a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 337b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 337c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.278 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 337e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3380 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3384 0xc0033fe550 gate 1563590436279236500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3385 0xc0033fe550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3386 0xc0033fe550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3387 0xc0033fe550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3388 0xc0033fe550 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3389 0xc0033fe550 gate 1563590436279236500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 338d 0xc0033fefe0 gate 1563590436279489000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338e 0xc0033fefe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338f 0xc0033fefe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3390 0xc0033fefe0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3391 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| +peer0.org1.example.com | 00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3392 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| +peer0.org1.example.com | 00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| +peer0.org1.example.com | 00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| +peer0.org1.example.com | 00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| +peer0.org1.example.com | 00000040 a7 1d 12 7a d0 f4 9a |...z...|" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3393 0xc0033fefe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3394 0xc0033fefe0 gate 1563590436279489000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3397 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 3399 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 339a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.comm] func1 -> DEBU 339c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.pull] SendDigest -> DEBU 339f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 33a0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.comm] func1 -> DEBU 33a1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.356 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a6 Verify: digest = 00000000 bf e2 70 70 3b c9 af 04 88 68 c0 25 62 b0 c1 87 |..pp;....h.%b...| +peer0.org1.example.com | 00000010 0e 4c 72 03 b6 4d db 15 8a 80 e6 7d b1 e4 f2 77 |.Lr..M.....}...w|" +peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a7 Verify: sig = 00000000 30 44 02 20 28 df c9 fb 93 61 15 b4 ca d0 2e 53 |0D. (....a.....S| +peer0.org1.example.com | 00000010 1f 6b 28 45 16 9c 6a c0 55 0a 61 c0 74 7d b5 30 |.k(E..j.U.a.t}.0| +peer0.org1.example.com | 00000020 b1 8c a7 d5 02 20 7d 03 4d 41 f9 c9 5b dc 85 f5 |..... }.MA..[...| +peer0.org1.example.com | 00000030 24 1b a5 72 0b a9 d2 65 21 a7 a9 d7 66 be ab ab |$..r...e!...f...| +peer0.org1.example.com | 00000040 d5 6d 82 e1 fd f8 |.m....|" +peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a9 Verify: sig = 00000000 30 44 02 20 42 62 be ee 71 e2 97 23 1a 72 f7 54 |0D. Bb..q..#.r.T| +peer0.org1.example.com | 00000010 be 0d 92 c7 64 25 98 b6 48 51 40 33 f5 ba 18 4f |....d%..HQ@3...O| +peer0.org1.example.com | 00000020 b8 38 23 a1 02 20 1d 27 ec 74 10 b6 a3 72 4b 14 |.8#.. .'.t...rK.| +peer0.org1.example.com | 00000030 ae 32 b3 d5 fd 80 18 14 95 3c cf b3 4f bb c5 c1 |.2.......<..O...| +peer0.org1.example.com | 00000040 43 db 68 e8 b6 65 |C.h..e|" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.comm] Send -> DEBU 33b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +peer0.org1.example.com | "2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.comm] func1 -> DEBU 33b9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.gossip] handleMessage -> DEBU 33ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [gossip.pull] HandleMessage -> DEBU 33bb GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.525 UTC [gossip.pull] SendDigest -> DEBU 33c2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:36.525 UTC [gossip.gossip] handleMessage -> DEBU 33c3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.544 UTC [gossip.comm] func1 -> DEBU 33c4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.544 UTC [gossip.gossip] handleMessage -> DEBU 33c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.gossip] handleMessage -> DEBU 33c6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d0 0xc0035100a0 gate 1563590436545487300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d1 0xc0035100a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d2 0xc0035100a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d3 0xc0035100a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d4 0xc0035100a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d5 0xc0035100a0 gate 1563590436545487300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0035108e0 gate 1563590436545752600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33da 0xc0035108e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33db 0xc0035108e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0035108e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33dd Verify: digest = 00000000 7b 8f 87 ef db 70 1f 05 1f dc 0f ad fb ae e8 3a |{....p.........:| +peer0.org1.example.com | 00000010 7d e3 42 b9 c2 d9 da 90 6f 32 4f b1 c0 e2 97 12 |}.B.....o2O.....|" +peer0.org1.example.com | "2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33de Verify: sig = 00000000 30 45 02 21 00 89 81 30 96 cd db 39 a2 b8 66 ff |0E.!...0...9..f.| +peer0.org1.example.com | 00000010 4c 07 4f 87 55 6d dd bf 0b 25 de 6e 64 4d f0 c5 |L.O.Um...%.ndM..| +peer0.org1.example.com | 00000020 0b 47 1a ac 2f 02 20 35 cc ec 2c ca 41 16 06 0e |.G../. 5..,.A...| +peer0.org1.example.com | 00000030 69 26 87 96 ca b0 04 57 a5 4f 0c ae 65 ab 89 cd |i&.....W.O..e...| +peer0.org1.example.com | 00000040 a3 c2 07 ee 3b da 97 |....;..|" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [cauthdsl] func2 -> DEBU 33df 0xc0035108e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [cauthdsl] func1 -> DEBU 33e0 0xc0035108e0 gate 1563590436545752600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e7 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ec Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33f0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] Send -> DEBU 33f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" > alive: alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.682 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] Send -> DEBU 33f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [gossip.comm] func1 -> DEBU 33fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [gossip.gossip] handleMessage -> DEBU 33ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3401 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3402 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3403 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3404 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3407 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.684 UTC [cauthdsl] func1 -> DEBU 3409 0xc0035b47f0 gate 1563590436684969900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340a 0xc0035b47f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340b 0xc0035b47f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340c 0xc0035b47f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340d 0xc0035b47f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 340e 0xc0035b47f0 gate 1563590436684969900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 340f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3411 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3412 0xc0035b5040 gate 1563590436685298700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3413 0xc0035b5040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3414 0xc0035b5040 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3415 0xc0035b5040 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3416 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3417 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3418 0xc0035b5040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3419 0xc0035b5040 gate 1563590436685298700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341e Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341f Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3420 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3421 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3424 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3425 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3426 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3429 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func1 -> DEBU 342a 0xc003647650 gate 1563590436686687400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342b 0xc003647650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342c 0xc003647650 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342d 0xc003647650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342e 0xc003647650 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 342f 0xc003647650 gate 1563590436686687400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3430 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3431 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3432 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 3433 0xc003647fb0 gate 1563590436687349300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3434 0xc003647fb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3435 0xc003647fb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3436 0xc003647fb0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3437 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3438 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [cauthdsl] func2 -> DEBU 3439 0xc003647fb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [cauthdsl] func1 -> DEBU 343a 0xc003647fb0 gate 1563590436687349300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.688 UTC [gossip.gossip] handleMessage -> DEBU 343f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3442 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3443 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3444 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3445 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3446 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 344a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 344b 0xc003541730 gate 1563590436693379500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344c 0xc003541730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344d 0xc003541730 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344e 0xc003541730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344f 0xc003541730 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3450 0xc003541730 gate 1563590436693379500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3451 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3453 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3454 0xc003541f70 gate 1563590436693729200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3455 0xc003541f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3456 0xc003541f70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3457 0xc003541f70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3458 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3459 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [cauthdsl] func2 -> DEBU 345a 0xc003541f70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [cauthdsl] func1 -> DEBU 345b 0xc003541f70 gate 1563590436693729200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3460 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3461 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3462 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3463 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3466 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3467 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 346c 0xc0036866f0 gate 1563590436695671100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346d 0xc0036866f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346e 0xc0036866f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346f 0xc0036866f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 3470 0xc0036866f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 3471 0xc0036866f0 gate 1563590436695671100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 3475 0xc003687050 gate 1563590436696063500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3476 0xc003687050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3477 0xc003687050 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3478 0xc003687050 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 3479 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 347a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 347b 0xc003687050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 347c 0xc003687050 gate 1563590436696063500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.696 UTC [gossip.gossip] handleMessage -> DEBU 3481 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.697 UTC [gossip.comm] func1 -> DEBU 3482 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.697 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3484 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3485 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3486 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3487 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3488 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3489 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 348a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3490 0xc00369fb60 gate 1563590436699245600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3491 0xc00369fb60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3492 0xc00369fb60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3493 0xc00369fb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3494 0xc00369fb60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3495 0xc00369fb60 gate 1563590436699245600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3498 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3499 0xc0036b24b0 gate 1563590436699489000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349a 0xc0036b24b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349b 0xc0036b24b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349c 0xc0036b24b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349f 0xc0036b24b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 34a0 0xc0036b24b0 gate 1563590436699489000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34ad 0xc0036b3c80 gate 1563590436700195900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34ae 0xc0036b3c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34af 0xc0036b3c80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b0 0xc0036b3c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b1 0xc0036b3c80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b2 0xc0036b3c80 gate 1563590436700195900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b6 0xc0036c4500 gate 1563590436700460800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b7 0xc0036c4500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b8 0xc0036c4500 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b9 0xc0036c4500 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.700 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0036c4500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [cauthdsl] func1 -> DEBU 34bd 0xc0036c4500 gate 1563590436700460800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.704 UTC [gossip.gossip] handleMessage -> DEBU 34c2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [gossip.pull] Hello -> DEBU 34c5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] Send -> DEBU 34c8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34ca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.747 UTC [gossip.comm] func1 -> DEBU 34cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.748 UTC [gossip.gossip] handleMessage -> DEBU 34cc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.749 UTC [gossip.pull] HandleMessage -> DEBU 34cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.750 UTC [gossip.gossip] handleMessage -> DEBU 34ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [gossip.comm] func1 -> DEBU 34cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [gossip.gossip] handleMessage -> DEBU 34d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.845 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.comm] func1 -> DEBU 34d4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.pull] HandleMessage -> DEBU 34d6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.pull] SendDigest -> DEBU 34d7 Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] IsLeader -> DEBU 34da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp] GetDefaultSigningIdentity -> DEBU 34db Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dc Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100C1801 " +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dd Sign: digest: 1B78485C66C4756B9D42225FAB4CE1C790E01C21A93694B1C2B8F1C403FEBC34 " +peer0.org1.example.com | "2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34de c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.comm] func1 -> DEBU 34df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34e3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [msp] DeserializeIdentity -> DEBU 34e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34eb 0xc0036eb550 gate 1563590436971658300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ec 0xc0036eb550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ed 0xc0036eb550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ee 0xc0036eb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ef 0xc0036eb550 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f0 0xc0036eb550 gate 1563590436971658300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f4 0xc0036ebd90 gate 1563590436971953500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f5 0xc0036ebd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f6 0xc0036ebd90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f7 0xc0036ebd90 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f8 Verify: digest = 00000000 26 df 49 f8 3f 7b e1 94 4e 01 29 2d c7 af 47 40 |&.I.?{..N.)-..G@| +peer0.org1.example.com | 00000010 4c 78 11 f1 2b f8 e2 79 69 30 ff 55 94 2d 6e 4a |Lx..+..yi0.U.-nJ|" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f9 Verify: sig = 00000000 30 45 02 21 00 df 98 33 75 f9 69 d0 40 55 0a 3b |0E.!...3u.i.@U.;| +peer0.org1.example.com | 00000010 da de 7c a1 0c 38 ed 61 63 71 ba ab 2a 7d 6e a6 |..|..8.acq..*}n.| +peer0.org1.example.com | 00000020 7f 2c 2c 42 8c 02 20 66 14 35 b5 9e f3 a6 dc 45 |.,,B.. f.5.....E| +peer0.org1.example.com | 00000030 13 fd 9f 8e 41 72 6e e2 53 88 4e 4b 1d 8b e2 d2 |....Arn.S.NK....| +peer0.org1.example.com | 00000040 b4 07 5f 1d c2 61 08 |.._..a.|" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34fa 0xc0036ebd90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [cauthdsl] func1 -> DEBU 34fb 0xc0036ebd90 gate 1563590436971953500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3500 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3501 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3502 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3503 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3504 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3505 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3506 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3507 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3509 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [gossip.comm] Send -> DEBU 350c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3510 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3511 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3512 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3514 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3515 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3516 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3517 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3518 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3519 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.comm] func1 -> DEBU 351d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3520 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3521 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.comm] func1 -> DEBU 3522 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3523 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3524 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3526 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.007 UTC [gossip.comm] func1 -> DEBU 3527 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.007 UTC [gossip.gossip] handleMessage -> DEBU 3528 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 3529 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.008 UTC [gossip.gossip] handleMessage -> DEBU 352c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.146 UTC [gossip.comm] func1 -> DEBU 352d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.146 UTC [gossip.gossip] handleMessage -> DEBU 352e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.147 UTC [gossip.gossip] handleMessage -> DEBU 3532 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3533 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3534 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151027 " +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3535 Sign: digest: EF598D4BA71D68883581531AA57270E0ABB11DBA25246FB693F61EFAC554FFBB " +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3536 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3537 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3538 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:37.282 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3539 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [gossip.comm] Send -> DEBU 353d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 353f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3541 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3542 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.comm] func1 -> DEBU 3547 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3549 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 354a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 354b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354c Verify: digest = 00000000 98 8b b6 ea 63 6c 28 c5 81 cc fc 32 bc ba 47 44 |....cl(....2..GD| +peer0.org1.example.com | 00000010 ea 06 ac a5 80 7a 18 18 87 75 03 4d ed 29 ca 31 |.....z...u.M.).1|" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354d Verify: sig = 00000000 30 45 02 21 00 e4 0c 73 62 cd e2 a3 44 56 f0 91 |0E.!...sb...DV..| +peer0.org1.example.com | 00000010 df b4 11 07 ac ff 34 83 0c 60 55 4a a5 7d fe 3d |......4..`UJ.}.=| +peer0.org1.example.com | 00000020 4d 38 05 0f 3a 02 20 78 12 92 81 07 2e 52 0a c9 |M8..:. x.....R..| +peer0.org1.example.com | 00000030 7f 39 b6 dc 66 ea 24 d3 0d 45 66 11 e6 6e 93 4f |.9..f.$..Ef..n.O| +peer0.org1.example.com | 00000040 51 bb f6 02 a4 ee 6d |Q.....m|" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 354e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 3554 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.338 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3555 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.comm] func1 -> DEBU 3560 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3561 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3562 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3563 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3564 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.comm] func1 -> DEBU 3565 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3566 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3567 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3568 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3569 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.comm] func1 -> DEBU 356a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 356e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:37.522 UTC [msp] DeserializeIdentity -> DEBU 356f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3570 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3571 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3572 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3573 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3574 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3575 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3576 0xc0039bcdf0 gate 1563590437523295700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3577 0xc0039bcdf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3578 0xc0039bcdf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3579 0xc0039bcdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 357a 0xc0039bcdf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357b 0xc0039bcdf0 gate 1563590437523295700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357f 0xc0039bd630 gate 1563590437523623400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3580 0xc0039bd630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3581 0xc0039bd630 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3582 0xc0039bd630 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3583 Verify: digest = 00000000 26 fc 28 ac 88 f9 f3 87 de 93 74 3c 3d 76 8e 42 |&.(.......t<=v.B| +peer0.org1.example.com | 00000010 b5 84 89 8d f7 05 59 de 8b 52 64 19 7f b9 a0 ff |......Y..Rd.....|" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3584 Verify: sig = 00000000 30 44 02 20 65 be 11 a3 8d 9c 28 c9 4d 98 c2 b4 |0D. e.....(.M...| +peer0.org1.example.com | 00000010 0d 34 0c 31 29 b9 f4 36 51 01 aa 83 98 69 9f 86 |.4.1)..6Q....i..| +peer0.org1.example.com | 00000020 4a bc c1 f1 02 20 3f 80 eb de c3 95 42 34 e2 f1 |J.... ?.....B4..| +peer0.org1.example.com | 00000030 7e 58 a1 ce 51 ae 5d d4 34 a1 82 2e ca 2c 53 95 |~X..Q.].4....,S.| +peer0.org1.example.com | 00000040 ee 18 7e 26 ce 0a |..~&..|" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3585 0xc0039bd630 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3586 0xc0039bd630 gate 1563590437523623400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3587 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3588 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3589 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 358a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 358b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358d updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 3590 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 3591 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.comm] func1 -> DEBU 3592 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3593 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3594 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3597 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.comm] func1 -> DEBU 3598 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 3599 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 359a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.535 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.900 UTC [gossip.comm] func1 -> DEBU 35ab Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ad Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35af Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:39.907 UTC [cauthdsl] func1 -> DEBU 35b7 0xc003a8ce70 gate 1563590439907231300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b8 0xc003a8ce70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b9 0xc003a8ce70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35ba 0xc003a8ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [cauthdsl] func2 -> DEBU 35bb 0xc003a8ce70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [cauthdsl] func1 -> DEBU 35bc 0xc003a8ce70 gate 1563590439907231300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:39.909 UTC [policies] Evaluate -> DEBU 35bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [cauthdsl] func1 -> DEBU 35c0 0xc003a8d6b0 gate 1563590439910435600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:39.910 UTC [cauthdsl] func2 -> DEBU 35c1 0xc003a8d6b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c2 0xc003a8d6b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c3 0xc003a8d6b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:39.911 UTC [msp.identity] Verify -> DEBU 35c4 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| +peer0.org1.example.com | 00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" +peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [msp.identity] Verify -> DEBU 35c5 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| +peer0.org1.example.com | 00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| +peer0.org1.example.com | 00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| +peer0.org1.example.com | 00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| +peer0.org1.example.com | 00000040 e6 b6 2c 4d af 22 19 |..,M.".|" +peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [cauthdsl] func2 -> DEBU 35c6 0xc003a8d6b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [cauthdsl] func1 -> DEBU 35c7 0xc003a8d6b0 gate 1563590439910435600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:39.912 UTC [policies] Evaluate -> DEBU 35c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35ca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:39.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 35cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ce updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cf Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [gossip.discovery] sendMemResponse -> DEBU 35d4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [msp] DeserializeIdentity -> DEBU 35d7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] Send -> DEBU 35d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35da Exiting" +peer0.org1.example.com | "2019-07-20 02:40:39.916 UTC [gossip.discovery] sendMemResponse -> DEBU 35db Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020+" signature:"0E\002!\000\344\014sb\315\342\243DV\360\221\337\264\021\007\254\3774\203\014`UJ\245}\376=M8\005\017:\002 x\022\222\201\007.R\n\311\1779\266\334f\352$\323\rEf\021\346n\223OQ\273\366\002\244\356m" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.comm] func1 -> DEBU 35dc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.gossip] handleMessage -> DEBU 35dd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [gossip.pull] HandleMessage -> DEBU 35de GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:39.932 UTC [msp] DeserializeIdentity -> DEBU 35df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:39.933 UTC [gossip.pull] SendDigest -> DEBU 35e5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:39.934 UTC [gossip.gossip] handleMessage -> DEBU 35e6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.231 UTC [gossip.pull] Hello -> DEBU 35e7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:40.231 UTC [gossip.comm] Send -> DEBU 35e8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35ea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] func1 -> DEBU 35eb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.232 UTC [gossip.pull] Hello -> DEBU 35ec Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ed Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.pull] Hello -> DEBU 35ee Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.235 UTC [gossip.gossip] handleMessage -> DEBU 35f4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.236 UTC [gossip.pull] HandleMessage -> DEBU 35f5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.237 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.236 UTC [gossip.comm] func1 -> DEBU 35f6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.pull] HandleMessage -> DEBU 35f9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35fa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.comm] func1 -> DEBU 35fb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.239 UTC [gossip.pull] HandleMessage -> DEBU 35fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.240 UTC [gossip.gossip] handleMessage -> DEBU 35fe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 35ff Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3600 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151028 " +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3601 Sign: digest: 0A3BB45DB1F5C8EAA3328930FC5D9B22EF7414C203CE4D29C9118912D79EAC98 " +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 3602 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3603 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3604 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:40.274 UTC [gossip.comm] Send -> DEBU 3605 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3606 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3608 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] Send -> DEBU 3609 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.277 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 3611 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.gossip] handleMessage -> DEBU 3612 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3610 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.280 UTC [gossip.gossip] handleMessage -> DEBU 3613 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3614 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.281 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3615 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3616 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +peer0.org1.example.com | "2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 360f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [gossip.gossip] handleMessage -> DEBU 3618 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [gossip.comm] func1 -> DEBU 3617 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" +peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361b Verify: sig = 00000000 30 45 02 21 00 bd 14 2e 87 ca ed f1 6f d1 29 68 |0E.!........o.)h| +peer0.org1.example.com | 00000010 7d 2a 6f e8 b1 f6 83 ed da fb 4f a9 6d ea 92 5b |}*o.......O.m..[| +peer0.org1.example.com | 00000020 db a3 ff 5d 5f 02 20 12 d9 06 3d f1 de 82 e1 d3 |...]_. ...=.....| +peer0.org1.example.com | 00000030 97 44 5a 18 4c f8 48 62 8a 53 0c ad a5 cc 41 b3 |.DZ.L.Hb.S....A.| +peer0.org1.example.com | 00000040 30 53 5a 99 d3 4d 7f |0SZ..M.|" +peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] isSentByMe -> DEBU 361d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 361f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3620 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3621 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3622 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3623 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3624 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3625 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3626 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] isSentByMe -> DEBU 3627 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3628 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3629 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 362a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 362b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] handleMessage -> DEBU 362c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +peer0.org1.example.com | 00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +peer0.org1.example.com | 00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +peer0.org1.example.com | 00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +peer0.org1.example.com | 00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +peer0.org1.example.com | 00000040 df fe cf 90 da 0d 55 |......U|" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 362f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] isSentByMe -> DEBU 3630 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3632 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.285 UTC [msp] DeserializeIdentity -> DEBU 3633 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3635 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3636 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363a 0xc003c5cbf0 gate 1563590440286448700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363b 0xc003c5cbf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363c 0xc003c5cbf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363d 0xc003c5cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363e 0xc003c5cbf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363f 0xc003c5cbf0 gate 1563590440286448700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func1 -> DEBU 3643 0xc003c5d430 gate 1563590440287616200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3644 0xc003c5d430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3645 0xc003c5d430 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3646 0xc003c5d430 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3647 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| +peer0.org1.example.com | 00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" +peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3648 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| +peer0.org1.example.com | 00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| +peer0.org1.example.com | 00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| +peer0.org1.example.com | 00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| +peer0.org1.example.com | 00000040 e6 b6 2c 4d af 22 19 |..,M.".|" +peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [cauthdsl] func2 -> DEBU 3649 0xc003c5d430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [cauthdsl] func1 -> DEBU 364a 0xc003c5d430 gate 1563590440287616200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.288 UTC [policies] Evaluate -> DEBU 364b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.289 UTC [policies] Evaluate -> DEBU 364c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 364f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3650 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3651 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.335 UTC [gossip.comm] func1 -> DEBU 3652 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.335 UTC [gossip.gossip] handleMessage -> DEBU 3653 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.336 UTC [gossip.pull] HandleMessage -> DEBU 3654 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.336 UTC [gossip.pull] SendDigest -> DEBU 3655 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:40.337 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.358 UTC [gossip.comm] func1 -> DEBU 3657 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.358 UTC [gossip.gossip] handleMessage -> DEBU 3658 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.359 UTC [gossip.gossip] handleMessage -> DEBU 3659 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 365a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.360 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365c Verify: digest = 00000000 fb dc 02 43 57 88 bb 80 98 63 10 d2 3f 04 93 d2 |...CW....c..?...| +peer0.org1.example.com | 00000010 93 84 7e 83 65 4b 08 94 62 c6 2f 60 b1 ed ae 3b |..~.eK..b./`...;|" +peer0.org1.example.com | "2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365d Verify: sig = 00000000 30 44 02 20 19 8c a5 29 75 ff 31 ca 2c fd 17 48 |0D. ...)u.1.,..H| +peer0.org1.example.com | 00000010 66 f2 fd fd db 73 53 2f 7f 26 3f ef 96 f5 9a bd |f....sS/.&?.....| +peer0.org1.example.com | 00000020 1c 0c 88 e9 02 20 32 8c 99 1d 21 5a de 73 c3 dd |..... 2...!Z.s..| +peer0.org1.example.com | 00000030 36 93 18 43 30 6b cd 7a 56 eb f7 63 2a f9 3f ef |6..C0k.zV..c*.?.| +peer0.org1.example.com | 00000040 b0 4e 51 c0 54 c3 |.NQ.T.|" +peer0.org1.example.com | "2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 44 02 20 64 89 b2 7f d6 93 e1 aa 26 0e 23 01 |0D. d.......&.#.| +peer0.org1.example.com | 00000010 18 0b f4 7e 51 5a d6 7d 7a aa 6f 90 77 af 57 69 |...~QZ.}z.o.w.Wi| +peer0.org1.example.com | 00000020 c5 20 b3 61 02 20 7e 33 7f 90 90 ec 6f 5e bc 9a |. .a. ~3....o^..| +peer0.org1.example.com | 00000030 cc ff 54 37 03 96 f5 87 ed ce ba 6e fe 55 e8 31 |..T7.......n.U.1| +peer0.org1.example.com | 00000040 01 1c 4b f1 54 f4 |..K.T.|" +peer0.org1.example.com | "2019-07-20 02:40:40.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 3661 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3662 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3663 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3664 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3665 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 3666 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3667 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [gossip.discovery] sendMemResponse -> DEBU 3668 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.comm] Send -> DEBU 366b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.discovery] sendMemResponse -> DEBU 366c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:40.366 UTC [gossip.comm] sendToEndpoint -> DEBU 366d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.367 UTC [gossip.comm] sendToEndpoint -> DEBU 366e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.524 UTC [gossip.comm] func1 -> DEBU 366f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [gossip.gossip] handleMessage -> DEBU 3670 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [gossip.pull] HandleMessage -> DEBU 3671 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.525 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.526 UTC [msp] DeserializeIdentity -> DEBU 3673 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.527 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.528 UTC [msp] DeserializeIdentity -> DEBU 3675 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3676 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3677 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [gossip.pull] SendDigest -> DEBU 3678 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:40.529 UTC [gossip.gossip] handleMessage -> DEBU 3679 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.comm] func1 -> DEBU 367a Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367d Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 367e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3681 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3682 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3683 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3684 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3685 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 3686 0xc003d44800 gate 1563590440550548800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3687 0xc003d44800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3688 0xc003d44800 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3689 0xc003d44800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 368a 0xc003d44800 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368b 0xc003d44800 gate 1563590440550548800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368f 0xc003d45040 gate 1563590440550925000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3690 0xc003d45040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3691 0xc003d45040 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3692 0xc003d45040 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3693 Verify: digest = 00000000 5f f2 6b 78 bc a6 fb 49 6d f3 62 88 dc 48 6c 55 |_.kx...Im.b..HlU| +peer0.org1.example.com | 00000010 16 57 83 14 e8 fb a8 28 77 08 c6 70 0f 6e 7b dd |.W.....(w..p.n{.|" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3694 Verify: sig = 00000000 30 44 02 20 54 be fe 36 a5 43 b2 55 ab 8e 71 5e |0D. T..6.C.U..q^| +peer0.org1.example.com | 00000010 39 d1 80 9b 97 1e 33 a3 b0 f2 53 e2 1a c2 f7 d1 |9.....3...S.....| +peer0.org1.example.com | 00000020 f0 0f 25 f9 02 20 34 5c b7 f5 2c 4b 34 49 6c f6 |..%.. 4\..,K4Il.| +peer0.org1.example.com | 00000030 59 f6 21 76 6e 3e 7c 6c 1e 76 0a 10 f5 f6 82 54 |Y.!vn>|l.v.....T| +peer0.org1.example.com | 00000040 45 b1 75 e4 0b 44 |E.u..D|" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3695 0xc003d45040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [cauthdsl] func1 -> DEBU 3696 0xc003d45040 gate 1563590440550925000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.551 UTC [policies] Evaluate -> DEBU 3697 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.552 UTC [policies] Evaluate -> DEBU 3698 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 3699 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 369a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 369b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 369c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369d updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.555 UTC [gossip.discovery] sendMemResponse -> DEBU 36a3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:40.555 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.556 UTC [gossip.comm] Send -> DEBU 36a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.discovery] sendMemResponse -> DEBU 36a8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" > alive:|l\036v\n\020\365\366\202TE\261u\344\013D" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] Send -> DEBU 36ad Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [gossip.comm] func1 -> DEBU 36b4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [gossip.gossip] handleMessage -> DEBU 36b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b6 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b7 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b8 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b9 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36be Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c2 0xc003dc47c0 gate 1563590440687798600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003dc47c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c4 0xc003dc47c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c5 0xc003dc47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003dc47c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003dc47c0 gate 1563590440687798600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36cb 0xc003dc5030 gate 1563590440688085400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cc 0xc003dc5030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cd 0xc003dc5030 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36ce 0xc003dc5030 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36cf Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36d0 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36d1 0xc003dc5030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36d2 0xc003dc5030 gate 1563590440688085400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.688 UTC [msp] DeserializeIdentity -> DEBU 36d7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [msp] DeserializeIdentity -> DEBU 36d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36da Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36db Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.693 UTC [cauthdsl] func1 -> DEBU 36df 0xc003e14800 gate 1563590440693923400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.693 UTC [cauthdsl] func2 -> DEBU 36e0 0xc003e14800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e1 0xc003e14800 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e2 0xc003e14800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e3 0xc003e14800 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [cauthdsl] func1 -> DEBU 36e4 0xc003e14800 gate 1563590440693923400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.696 UTC [cauthdsl] func1 -> DEBU 36e8 0xc003e15160 gate 1563590440694341600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.696 UTC [cauthdsl] func2 -> DEBU 36e9 0xc003e15160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36ea 0xc003e15160 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36eb 0xc003e15160 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ec Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ed Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [cauthdsl] func2 -> DEBU 36ee 0xc003e15160 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [cauthdsl] func1 -> DEBU 36ef 0xc003e15160 gate 1563590440694341600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.comm] func1 -> DEBU 36f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3700 0xc003e330d0 gate 1563590440700808900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3701 0xc003e330d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3702 0xc003e330d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3703 0xc003e330d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3704 0xc003e330d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3705 0xc003e330d0 gate 1563590440700808900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 3706 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3709 0xc003e33910 gate 1563590440701086700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370a 0xc003e33910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370b 0xc003e33910 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370c 0xc003e33910 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370d Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370e Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370f 0xc003e33910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3710 0xc003e33910 gate 1563590440701086700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3711 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3712 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3715 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3716 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3717 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3718 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 3719 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 371b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3721 0xc003f4bf90 gate 1563590440702568500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3722 0xc003f4bf90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3723 0xc003f4bf90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3724 0xc003f4bf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3725 0xc003f4bf90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3726 0xc003f4bf90 gate 1563590440702568500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3727 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3729 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 372a 0xc003f7c830 gate 1563590440702846900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372b 0xc003f7c830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372c 0xc003f7c830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372d 0xc003f7c830 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [cauthdsl] func2 -> DEBU 3730 0xc003f7c830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [cauthdsl] func1 -> DEBU 3731 0xc003f7c830 gate 1563590440702846900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3732 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3733 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3734 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3735 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3736 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.comm] func1 -> DEBU 3737 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3738 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 3739 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 373a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [gossip.privdata] run -> DEBU 373b Start reconcile missing private info" +peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [leveldbhelper] GetIterator -> DEBU 373c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [msp] DeserializeIdentity -> DEBU 373d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.707 UTC [gossip.privdata] reconcile -> DEBU 373e Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 373f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3740 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3741 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [cauthdsl] func1 -> DEBU 3745 0xc0029c84a0 gate 1563590440708859500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.708 UTC [cauthdsl] func2 -> DEBU 3746 0xc0029c84a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.712 UTC [cauthdsl] func2 -> DEBU 3747 0xc0029c84a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3748 0xc0029c84a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3749 0xc0029c84a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374a 0xc0029c84a0 gate 1563590440708859500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374e 0xc0029c8ce0 gate 1563590440715840100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 374f 0xc0029c8ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 3750 0xc0029c8ce0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3751 0xc0029c8ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3752 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3753 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3754 0xc0029c8ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [cauthdsl] func1 -> DEBU 3755 0xc0029c8ce0 gate 1563590440715840100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3756 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3758 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3759 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3760 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3761 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3762 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3763 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3764 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3765 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [cauthdsl] func1 -> DEBU 3766 0xc002f47300 gate 1563590440720911600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.720 UTC [cauthdsl] func2 -> DEBU 3767 0xc002f47300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3768 0xc002f47300 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3769 0xc002f47300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 376a 0xc002f47300 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376b 0xc002f47300 gate 1563590440720911600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376f 0xc002f47b50 gate 1563590440727644500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3770 0xc002f47b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3771 0xc002f47b50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3772 0xc002f47b50 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3773 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3774 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [cauthdsl] func2 -> DEBU 3775 0xc002f47b50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [cauthdsl] func1 -> DEBU 3776 0xc002f47b50 gate 1563590440727644500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3777 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3778 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3779 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 377a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:40.728 UTC [gossip.gossip] handleMessage -> DEBU 377b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.746 UTC [msp] DeserializeIdentity -> DEBU 377c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.747 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.748 UTC [gossip.pull] Hello -> DEBU 377e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:40.748 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.749 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.749 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3782 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3783 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.comm] func1 -> DEBU 3784 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3785 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.pull] HandleMessage -> DEBU 3786 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3787 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.842 UTC [gossip.comm] func1 -> DEBU 3788 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 3789 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 378c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:40.881 UTC [gossip.comm] func1 -> DEBU 378d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 378e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.pull] HandleMessage -> DEBU 378f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.pull] SendDigest -> DEBU 3790 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 3791 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [gossip.comm] func1 -> DEBU 3792 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3794 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3795 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3796 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.009 UTC [gossip.gossip] handleMessage -> DEBU 3797 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.146 UTC [gossip.comm] func1 -> DEBU 3798 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [gossip.gossip] handleMessage -> DEBU 3799 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.148 UTC [gossip.gossip] handleMessage -> DEBU 379d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [gossip.election] waitForInterrupt -> DEBU 379e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [gossip.election] IsLeader -> DEBU 379f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [msp] GetDefaultSigningIdentity -> DEBU 37a0 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:41.977 UTC [msp.identity] Sign -> DEBU 37a1 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100D1801 " +peer0.org1.example.com | "2019-07-20 02:40:41.978 UTC [msp.identity] Sign -> DEBU 37a2 Sign: digest: 90CF7BA600D99E7061E75602966A7ACEBD4D65E00E52CA59FBA09EBA2578E66C " +peer0.org1.example.com | "2019-07-20 02:40:41.978 UTC [gossip.election] waitForInterrupt -> DEBU 37a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.comm] func1 -> DEBU 37a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [msp] DeserializeIdentity -> DEBU 37a9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ab Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func1 -> DEBU 37b0 0xc00379b440 gate 1563590441983735900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00379b440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00379b440 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b3 0xc00379b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37b4 0xc00379b440 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b5 0xc00379b440 gate 1563590441983735900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b9 0xc00379bc80 gate 1563590441984447200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00379bc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bb 0xc00379bc80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bc 0xc00379bc80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 6a d4 8c 78 44 12 7c 84 07 4f 31 f8 71 4b 46 8c |j..xD.|..O1.qKF.| +peer0.org1.example.com | 00000010 59 e9 55 6f cb 0a d5 40 e8 f3 82 ba 01 92 53 d7 |Y.Uo...@......S.|" +peer0.org1.example.com | "2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 45 02 21 00 d1 61 2a 45 0d fb 73 e0 58 2a 80 |0E.!..a*E..s.X*.| +peer0.org1.example.com | 00000010 a0 53 59 88 00 24 11 25 b3 fa b1 59 ab 5f 88 84 |.SY..$.%...Y._..| +peer0.org1.example.com | 00000020 57 0b f9 a6 c2 02 20 10 64 04 4b 06 fe ec 7b 58 |W..... .d.K...{X| +peer0.org1.example.com | 00000030 2e f0 0a 57 ad fa bd d3 42 6b d8 1b 4f a9 9c 8e |...W....Bk..O...| +peer0.org1.example.com | 00000040 76 03 d0 44 2a 69 f7 |v..D*i.|" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [cauthdsl] func2 -> DEBU 37bf 0xc00379bc80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [cauthdsl] func1 -> DEBU 37c0 0xc00379bc80 gate 1563590441984447200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c7 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] learnExistingMembers -> DEBU 37ca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 37cb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:41.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.comm] func1 -> DEBU 37cd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37cf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.comm] func1 -> DEBU 37d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.007 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37eb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.285 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ec Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151029 " +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ee Sign: digest: 94EFC5E19F8DD13AD2602D31D781B764FAB9DD7174490DFBF95DEC6967F5BDC4 " +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ef Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:42.286 UTC [gossip.discovery] periodicalSendAlive -> DEBU 37f2 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:42.297 UTC [msp] DeserializeIdentity -> DEBU 37f3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.298 UTC [gossip.comm] Send -> DEBU 37f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [msp] DeserializeIdentity -> DEBU 37f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37ff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.341 UTC [gossip.comm] func1 -> DEBU 3800 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3801 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3802 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3803 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.343 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3804 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3805 Verify: digest = 00000000 6e 25 38 69 35 0a 9a dc 10 bb 95 88 85 ae 8f 00 |n%8i5...........| +peer0.org1.example.com | 00000010 ac be 7b 41 91 22 32 ef ff ac ef b4 6a 54 27 d7 |..{A."2.....jT'.|" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3806 Verify: sig = 00000000 30 44 02 20 3f 2a 3f 73 a4 52 9b 59 d6 ad d5 53 |0D. ?*?s.R.Y...S| +peer0.org1.example.com | 00000010 e4 6f 34 43 48 06 7a 71 0c 9a c2 bd 2d 7a 1a 29 |.o4CH.zq....-z.)| +peer0.org1.example.com | 00000020 c2 5f 21 fd 02 20 27 4f ba b8 95 b6 ff f8 ec b8 |._!.. 'O........| +peer0.org1.example.com | 00000030 ac 68 dd da f3 b4 bb 76 f4 0e 59 aa 66 14 6f 56 |.h.....v..Y.f.oV| +peer0.org1.example.com | 00000040 4a b8 dd f8 bc 62 |J....b|" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3808 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3809 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 380d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 380e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.comm] func1 -> DEBU 380f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3810 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3811 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3813 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3815 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3816 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] Send -> DEBU 3817 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3818 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3819 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.386 UTC [gossip.comm] func1 -> DEBU 381a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.387 UTC [gossip.gossip] handleMessage -> DEBU 381b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.389 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.531 UTC [gossip.comm] func1 -> DEBU 3823 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3824 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3825 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3827 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [msp] DeserializeIdentity -> DEBU 3828 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3829 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:42.532 UTC [cauthdsl] func1 -> DEBU 382f 0xc003efbca0 gate 1563590442532929200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3830 0xc003efbca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3831 0xc003efbca0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3832 0xc003efbca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3833 0xc003efbca0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3834 0xc003efbca0 gate 1563590442532929200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3835 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3838 0xc003e724e0 gate 1563590442533746600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3839 0xc003e724e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383a 0xc003e724e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383b 0xc003e724e0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383c Verify: digest = 00000000 93 21 6e 6e 92 29 b5 ae 81 18 25 f6 6e 7c 1c 5d |.!nn.)....%.n|.]| +peer0.org1.example.com | 00000010 73 1d 71 0b 62 1d c3 f4 41 1e b3 69 99 7e 47 fa |s.q.b...A..i.~G.|" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383d Verify: sig = 00000000 30 44 02 20 6a 4e e2 fb d7 02 f9 ef 09 ec a2 f4 |0D. jN..........| +peer0.org1.example.com | 00000010 54 a3 d2 b1 5f cf b8 f8 c4 07 15 2c 36 b5 a2 f3 |T..._......,6...| +peer0.org1.example.com | 00000020 52 e7 11 24 02 20 6a 73 aa ea 6b 9b c2 56 de 5c |R..$. js..k..V.\| +peer0.org1.example.com | 00000030 64 6b a0 6d 38 4e d9 ea 0c 2c 50 ff a0 eb 3f 7c |dk.m8N...,P...?|| +peer0.org1.example.com | 00000040 0b 96 59 e7 42 30 |..Y.B0|" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [cauthdsl] func2 -> DEBU 383e 0xc003e724e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [cauthdsl] func1 -> DEBU 383f 0xc003e724e0 gate 1563590442533746600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3844 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3845 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3846 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3847 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 384a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.539 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3850 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3851 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3852 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.552 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3856 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.553 UTC [gossip.comm] Send -> DEBU 3857 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3858 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:42.561 UTC [gossip.comm] func1 -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.561 UTC [gossip.gossip] handleMessage -> DEBU 385b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.gossip] handleMessage -> DEBU 385c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] Send -> DEBU 385f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3860 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3861 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3862 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:42.570 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.903 UTC [gossip.comm] func1 -> DEBU 3864 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3865 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3866 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3867 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3868 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [msp] DeserializeIdentity -> DEBU 3869 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 386a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3870 0xc002fc40e0 gate 1563590443909523300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3871 0xc002fc40e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3872 0xc002fc40e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3873 0xc002fc40e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3874 0xc002fc40e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3875 0xc002fc40e0 gate 1563590443909523300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3876 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func1 -> DEBU 3879 0xc002fc4920 gate 1563590443909926800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387a 0xc002fc4920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387b 0xc002fc4920 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [cauthdsl] func2 -> DEBU 387c 0xc002fc4920 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387d Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| +peer0.org1.example.com | 00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" +peer0.org1.example.com | "2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387e Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| +peer0.org1.example.com | 00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| +peer0.org1.example.com | 00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| +peer0.org1.example.com | 00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| +peer0.org1.example.com | 00000040 34 ca 7e d9 29 ed |4.~.).|" +peer0.org1.example.com | "2019-07-20 02:40:43.923 UTC [cauthdsl] func2 -> DEBU 387f 0xc002fc4920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [cauthdsl] func1 -> DEBU 3880 0xc002fc4920 gate 1563590443909926800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3883 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:43.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 3885 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3886 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3887 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3888 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 3889 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 388a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.928 UTC [gossip.discovery] sendMemResponse -> DEBU 388c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:43.928 UTC [msp] DeserializeIdentity -> DEBU 388d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.comm] func1 -> DEBU 388e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 388f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3894 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3895 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3896 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.pull] SendDigest -> DEBU 3897 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.929 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:43.946 UTC [gossip.comm] Send -> DEBU 389b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.discovery] sendMemResponse -> DEBU 389c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020-" signature:"0D\002 ?*?s\244R\233Y\326\255\325S\344o4CH\006zq\014\232\302\275-z\032)\302_!\375\002 'O\272\270\225\266\377\370\354\270\254h\335\332\363\264\273v\364\016Y\252f\024oVJ\270\335\370\274b" > alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:43.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 389f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a4 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38aa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38ab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38ac Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38ae GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.238 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38b8 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38b9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102A " +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38ba Sign: digest: 78526B430FABB76C2F0EFFB53CC4A7E03B04B1CF0637703092B63814E852806D " +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38bb Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38be Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [msp] DeserializeIdentity -> DEBU 38bf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38c0 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [msp] DeserializeIdentity -> DEBU 38c1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] Send -> DEBU 38c2 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.281 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38ca Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38cb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38ce Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38cf Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d1 Verify: sig = 00000000 30 45 02 21 00 e8 97 b9 e2 df a3 5b 1a 44 d3 d2 |0E.!.......[.D..| +peer0.org1.example.com | 00000010 14 6b 2c 3e 1a 2b fd 80 27 e0 13 1c 7d 8d ca d3 |.k,>.+..'...}...| +peer0.org1.example.com | 00000020 cf 62 bc da 85 02 20 4c d5 48 47 5e 6c 94 06 45 |.b.... L.HG^l..E| +peer0.org1.example.com | 00000030 27 fb 96 88 12 57 4d a3 95 aa da c6 fa 51 63 08 |'....WM......Qc.| +peer0.org1.example.com | 00000040 50 c7 e3 ff 2c 61 81 |P...,a.|" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] isSentByMe -> DEBU 38d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.comm] func1 -> DEBU 38d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38da Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38db Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38dc Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] isSentByMe -> DEBU 38de Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [msp] DeserializeIdentity -> DEBU 38e1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38e8 0xc0032ae3f0 gate 1563590444284004900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38e9 0xc0032ae3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ea 0xc0032ae3f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38eb 0xc0032ae3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ec 0xc0032ae3f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38ed 0xc0032ae3f0 gate 1563590444284004900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f1 0xc0032aec30 gate 1563590444284337300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f2 0xc0032aec30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f3 0xc0032aec30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f4 0xc0032aec30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| +peer0.org1.example.com | 00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| +peer0.org1.example.com | 00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| +peer0.org1.example.com | 00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| +peer0.org1.example.com | 00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| +peer0.org1.example.com | 00000040 34 ca 7e d9 29 ed |4.~.).|" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f7 0xc0032aec30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f8 0xc0032aec30 gate 1563590444284337300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.comm] func1 -> DEBU 3900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3901 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3902 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3904 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3905 Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +peer0.org1.example.com | 00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3906 Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +peer0.org1.example.com | 00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +peer0.org1.example.com | 00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +peer0.org1.example.com | 00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +peer0.org1.example.com | 00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3907 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] isSentByMe -> DEBU 3908 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3909 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.comm] func1 -> DEBU 390b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.pull] HandleMessage -> DEBU 390d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.pull] SendDigest -> DEBU 390e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3911 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3912 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3913 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3914 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3915 Verify: digest = 00000000 05 fc fa 54 47 c8 42 70 a1 2b 49 aa 1c dd b7 c0 |...TG.Bp.+I.....| +peer0.org1.example.com | 00000010 1a af a2 74 05 76 a0 14 ba 99 56 3a 2a 67 0f 2e |...t.v....V:*g..|" +peer0.org1.example.com | "2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3916 Verify: sig = 00000000 30 44 02 20 16 00 3f 59 47 5f 23 40 41 9e 56 ac |0D. ..?YG_#@A.V.| +peer0.org1.example.com | 00000010 c9 2c ed db 73 62 b0 08 7b b0 bd 5c cd 34 9f 00 |.,..sb..{..\.4..| +peer0.org1.example.com | 00000020 83 da e2 5c 02 20 7c 3f de 43 69 c1 a9 7b 57 ee |...\. |?.Ci..{W.| +peer0.org1.example.com | 00000030 a9 5f 73 72 2e bf 10 e7 b2 88 d2 09 eb ea 82 04 |._sr............| +peer0.org1.example.com | 00000040 80 3e 04 d5 ec 6b |.>...k|" +peer0.org1.example.com | "2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 44 02 20 4a 5a 26 af 1f 21 e7 0f c9 b0 4a 42 |0D. JZ&..!....JB| +peer0.org1.example.com | 00000010 7a 0b bd d6 37 7a 7e b6 56 a2 1a 1b 6f 45 e9 c4 |z...7z~.V...oE..| +peer0.org1.example.com | 00000020 25 69 04 88 02 20 5d 50 f8 7b dc fd 7a 5f e6 3e |%i... ]P.{..z_.>| +peer0.org1.example.com | 00000030 ed df de 7e b9 de 0b be 88 fe cc 91 6e 44 c3 4f |...~........nD.O| +peer0.org1.example.com | 00000040 4d 88 17 b9 07 4b |M....K|" +peer0.org1.example.com | "2019-07-20 02:40:44.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3919 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.367 UTC [gossip.discovery] sendMemResponse -> DEBU 3920 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:44.367 UTC [msp] DeserializeIdentity -> DEBU 3921 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [msp] DeserializeIdentity -> DEBU 3922 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] Send -> DEBU 3923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.discovery] sendMemResponse -> DEBU 3924 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3925 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3926 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.594 UTC [gossip.comm] func1 -> DEBU 3928 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.594 UTC [gossip.gossip] handleMessage -> DEBU 3929 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.595 UTC [gossip.pull] HandleMessage -> DEBU 392a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.595 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [msp] DeserializeIdentity -> DEBU 3930 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [gossip.pull] SendDigest -> DEBU 3931 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:44.601 UTC [gossip.gossip] handleMessage -> DEBU 3932 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.625 UTC [gossip.comm] func1 -> DEBU 3933 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 3934 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3935 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3936 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [msp] DeserializeIdentity -> DEBU 3937 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3939 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 393a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func1 -> DEBU 393e 0xc003c94b80 gate 1563590444637999900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 393f 0xc003c94b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3940 0xc003c94b80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3941 0xc003c94b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3942 0xc003c94b80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [cauthdsl] func1 -> DEBU 3943 0xc003c94b80 gate 1563590444637999900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [policies] Evaluate -> DEBU 3946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func1 -> DEBU 3947 0xc003c953c0 gate 1563590444640125400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3948 0xc003c953c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3949 0xc003c953c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 394a 0xc003c953c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394b Verify: digest = 00000000 3b 74 8c 70 3a 0e 1a b2 79 e8 52 db fa 61 da 07 |;t.p:...y.R..a..| +peer0.org1.example.com | 00000010 d8 78 6d 5f 67 5f d6 5e 95 7c 35 77 12 57 28 f2 |.xm_g_.^.|5w.W(.|" +peer0.org1.example.com | "2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394c Verify: sig = 00000000 30 45 02 21 00 f8 a2 a3 57 f1 f9 29 1d 8b b4 9a |0E.!....W..)....| +peer0.org1.example.com | 00000010 88 f8 52 f4 5f e9 b9 2e f4 00 2f 5a 4d e9 e9 3d |..R._...../ZM..=| +peer0.org1.example.com | 00000020 aa 15 ec f7 9f 02 20 43 22 09 5b 58 7e d9 95 a9 |...... C".[X~...| +peer0.org1.example.com | 00000030 6a 44 46 1c b3 33 57 bf 36 30 1e 29 0a 65 ab f8 |jDF..3W.60.).e..| +peer0.org1.example.com | 00000040 e0 c6 6b fc 4e 97 cc |..k.N..|" +peer0.org1.example.com | "2019-07-20 02:40:44.642 UTC [cauthdsl] func2 -> DEBU 394e 0xc003c953c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [cauthdsl] func1 -> DEBU 394f 0xc003c953c0 gate 1563590444640125400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 394d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3950 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3952 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3953 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 3955 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3956 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 395a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 395b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.652 UTC [gossip.discovery] sendMemResponse -> DEBU 395c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:44.653 UTC [msp] DeserializeIdentity -> DEBU 395d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.654 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" > alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3964 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] Send -> DEBU 3966 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3967 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3968 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3969 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 396a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [gossip.comm] func1 -> DEBU 396d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [gossip.gossip] handleMessage -> DEBU 396e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3970 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3972 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3973 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3974 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3976 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func1 -> DEBU 3978 0xc0032b4e30 gate 1563590444688095000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 3979 0xc0032b4e30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 397a 0xc0032b4e30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.693 UTC [cauthdsl] func2 -> DEBU 397d 0xc0032b4e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 397e 0xc0032b4e30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 397f 0xc0032b4e30 gate 1563590444688095000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3980 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3982 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 3983 0xc0032b5670 gate 1563590444694800600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3984 0xc0032b5670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3985 0xc0032b5670 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3986 0xc0032b5670 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3987 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3988 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3989 0xc0032b5670 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [cauthdsl] func1 -> DEBU 398a 0xc0032b5670 gate 1563590444694800600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 398f Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3990 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3991 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3992 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:44.696 UTC [msp] DeserializeIdentity -> DEBU 3993 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [msp] DeserializeIdentity -> DEBU 3994 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3995 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3996 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3997 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 399a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [cauthdsl] func1 -> DEBU 399b 0xc003331c80 gate 1563590444697832100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.697 UTC [cauthdsl] func2 -> DEBU 399c 0xc003331c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399d 0xc003331c80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399e 0xc003331c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399f 0xc003331c80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a0 0xc003331c80 gate 1563590444697832100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a4 0xc0033ce4c0 gate 1563590444698460000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0033ce4c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0033ce4c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0033ce4c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [cauthdsl] func2 -> DEBU 39aa 0xc0033ce4c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [cauthdsl] func1 -> DEBU 39ab 0xc0033ce4c0 gate 1563590444698460000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.700 UTC [policies] Evaluate -> DEBU 39b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.701 UTC [cauthdsl] func1 -> DEBU 39bb 0xc0033cffe0 gate 1563590444701730900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.704 UTC [cauthdsl] func2 -> DEBU 39bc 0xc0033cffe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bd 0xc0033cffe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39be 0xc0033cffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bf 0xc0033cffe0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c0 0xc0033cffe0 gate 1563590444701730900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c4 0xc003f056c0 gate 1563590444705686500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c5 0xc003f056c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c6 0xc003f056c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c7 0xc003f056c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [cauthdsl] func2 -> DEBU 39ca 0xc003f056c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [cauthdsl] func1 -> DEBU 39cb 0xc003f056c0 gate 1563590444705686500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39ce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d0 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d1 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d2 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d3 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.707 UTC [cauthdsl] func1 -> DEBU 39dc 0xc003423cd0 gate 1563590444707234900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39dd 0xc003423cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39de 0xc003423cd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39df 0xc003423cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39e0 0xc003423cd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [cauthdsl] func1 -> DEBU 39e1 0xc003423cd0 gate 1563590444707234900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func1 -> DEBU 39e5 0xc003502510 gate 1563590444710199200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e6 0xc003502510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e7 0xc003502510 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e8 0xc003502510 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39e9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39ea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [cauthdsl] func2 -> DEBU 39eb 0xc003502510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [cauthdsl] func1 -> DEBU 39ec 0xc003502510 gate 1563590444710199200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.712 UTC [gossip.gossip] handleMessage -> DEBU 39f1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.713 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.713 UTC [msp.identity] Verify -> DEBU 39f3 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f4 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f5 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f6 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.718 UTC [policies] Evaluate -> DEBU 39fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.718 UTC [cauthdsl] func1 -> DEBU 39ff 0xc00350ed60 gate 1563590444718592300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a00 0xc00350ed60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a01 0xc00350ed60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a02 0xc00350ed60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a03 0xc00350ed60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.719 UTC [cauthdsl] func1 -> DEBU 3a04 0xc00350ed60 gate 1563590444718592300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [policies] Evaluate -> DEBU 3a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [cauthdsl] func1 -> DEBU 3a08 0xc00350f5a0 gate 1563590444721413600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.721 UTC [cauthdsl] func2 -> DEBU 3a09 0xc00350f5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc00350f5a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0b 0xc00350f5a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0c Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0d Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:44.723 UTC [cauthdsl] func2 -> DEBU 3a0e 0xc00350f5a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.723 UTC [cauthdsl] func1 -> DEBU 3a0f 0xc00350f5a0 gate 1563590444721413600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a12 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a17 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a18 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.728 UTC [cauthdsl] func1 -> DEBU 3a1c 0xc003606d70 gate 1563590444728548600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.728 UTC [cauthdsl] func2 -> DEBU 3a1d 0xc003606d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1e 0xc003606d70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1f 0xc003606d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:44.730 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003606d70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.730 UTC [cauthdsl] func1 -> DEBU 3a21 0xc003606d70 gate 1563590444728548600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.732 UTC [policies] Evaluate -> DEBU 3a24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:44.732 UTC [cauthdsl] func1 -> DEBU 3a25 0xc0036075b0 gate 1563590444732725700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a26 0xc0036075b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a27 0xc0036075b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [cauthdsl] func2 -> DEBU 3a28 0xc0036075b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a29 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a2a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc0036075b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [cauthdsl] func1 -> DEBU 3a2c 0xc0036075b0 gate 1563590444732725700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:44.736 UTC [policies] Evaluate -> DEBU 3a2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:44.738 UTC [gossip.gossip] handleMessage -> DEBU 3a31 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [gossip.pull] Hello -> DEBU 3a34 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a35 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a36 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] Send -> DEBU 3a37 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a39 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.755 UTC [gossip.comm] func1 -> DEBU 3a3a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.755 UTC [gossip.gossip] handleMessage -> DEBU 3a3b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.756 UTC [gossip.pull] HandleMessage -> DEBU 3a3c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3a3d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.855 UTC [gossip.comm] func1 -> DEBU 3a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.855 UTC [gossip.gossip] handleMessage -> DEBU 3a3f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:44.857 UTC [gossip.gossip] handleMessage -> DEBU 3a42 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:44.898 UTC [gossip.comm] func1 -> DEBU 3a43 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.gossip] handleMessage -> DEBU 3a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.pull] HandleMessage -> DEBU 3a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:44.899 UTC [gossip.pull] SendDigest -> DEBU 3a46 Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:44.900 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.009 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.009 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.147 UTC [gossip.comm] func1 -> DEBU 3a4e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.147 UTC [gossip.gossip] handleMessage -> DEBU 3a4f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a50 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.149 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a55 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.189 UTC [policies] Evaluate -> DEBU 3a56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.191 UTC [cauthdsl] func1 -> DEBU 3a59 0xc00377e010 gate 1563590445191649300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5a 0xc00377e010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5b 0xc00377e010 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5c 0xc00377e010 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.192 UTC [msp.identity] Verify -> DEBU 3a5d Verify: digest = 00000000 96 9a dc 26 d2 06 fc 8f 84 64 fa 05 e1 8e 6a 27 |...&.....d....j'| +peer0.org1.example.com | 00000010 d1 ff d3 b3 c0 f2 30 ca d0 c0 63 5e df dd 39 d2 |......0...c^..9.|" +peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [msp.identity] Verify -> DEBU 3a5e Verify: sig = 00000000 30 45 02 21 00 f1 a2 5b a0 26 b4 0f c5 13 18 a1 |0E.!...[.&......| +peer0.org1.example.com | 00000010 46 65 a7 e0 4a e7 af b6 23 0e a5 b2 a8 2e 3a ae |Fe..J...#.....:.| +peer0.org1.example.com | 00000020 3d c2 90 8d 39 02 20 18 47 1d c1 ff 4a 42 4d d2 |=...9. .G...JBM.| +peer0.org1.example.com | 00000030 60 3e 51 8e 91 f6 0f e4 29 18 5e 13 10 48 63 06 |`>Q.....).^..Hc.| +peer0.org1.example.com | 00000040 b4 dd 5a be 3a a9 aa |..Z.:..|" +peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc00377e010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.193 UTC [cauthdsl] func1 -> DEBU 3a60 0xc00377e010 gate 1563590445191649300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a63 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a65 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a66 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a67 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a68 [businesschannel] Gossiping block [6], peers number [3]" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a69 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a6a [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-07-20 02:40:45.195 UTC [gossip.privdata] StoreBlock -> INFO 3a6b [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [gossip.privdata] StoreBlock -> DEBU 3a6c [businesschannel] Validating block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6d [businesschannel] START Block Validation for block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6e expecting 1 block validation responses" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [committer.txvalidator] validateTx -> DEBU 3a6f [businesschannel] validateTx starts for block 0xc000695640 env 0xc003781400 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a70 ValidateTransactionEnvelope starts for envelope 0xc003781400" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [gossip.channel] AddToMsgStore -> DEBU 3a71 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [gossip.pull] Add -> DEBU 3a73 Added 6, total items: 6" +peer0.org1.example.com | "2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a72 Header is channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " +peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [protoutils] validateChannelHeader -> DEBU 3a74 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-07-20 02:40:45.197 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a75 begin" +peer0.org1.example.com | "2019-07-20 02:40:45.198 UTC [msp] GetManagerForChain -> DEBU 3a76 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-07-20 02:40:45.198 UTC [msp] DeserializeIdentity -> DEBU 3a77 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.199 UTC [msp.identity] newIdentity -> DEBU 3a78 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a79 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-07-20 02:40:45.200 UTC [msp] Validate -> DEBU 3a7a MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.203 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.204 UTC [gossip.comm] Send -> DEBU 3a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a80 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a81 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a83 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.205 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a84 creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a85 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| +peer0.org1.example.com | 00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" +peer0.org1.example.com | "2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a86 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| +peer0.org1.example.com | 00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| +peer0.org1.example.com | 00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| +peer0.org1.example.com | 00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| +peer0.org1.example.com | 00000040 63 b0 56 6b 0a |c.Vk.|" +peer0.org1.example.com | "2019-07-20 02:40:45.208 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a87 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:45.209 UTC [protoutils] validateConfigTransaction -> DEBU 3a88 validateConfigTransaction starts for data 0xc00305a000, header channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " +peer0.org1.example.com | "2019-07-20 02:40:45.210 UTC [committer.txvalidator] validateTx -> DEBU 3a89 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.214 UTC [common.configtx] addToMap -> DEBU 3a8a Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8b Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8c Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8d Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8e Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8f Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a90 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a91 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a92 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a93 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a94 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a95 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a96 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a97 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a98 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a99 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a9a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 3a9b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3a9f Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3aa0 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 3aa1 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 3aa2 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa3 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 3aa5 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.227 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa6 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa8 Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.229 UTC [common.configtx] policyForItem -> DEBU 3aa9 Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aaa Manager Channel looking up path []" +peer0.org1.example.com | "2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aab Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:40:45.232 UTC [policies] Manager -> DEBU 3aac Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aad Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aae Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3aaf Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3ab0 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab1 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab2 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | "2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.240 UTC [policies] Evaluate -> DEBU 3ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-07-20 02:40:45.241 UTC [cauthdsl] deduplicate -> WARN 3ab6 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-07-20 02:40:45.241 UTC [cauthdsl] func1 -> DEBU 3ab7 0xc0039f8cc0 gate 1563590445241470500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab8 0xc0039f8cc0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab9 0xc0039f8cc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3aba 0xc0039f8cc0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abb Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +peer0.org1.example.com | 00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +peer0.org1.example.com | "2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abc Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +peer0.org1.example.com | 00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +peer0.org1.example.com | 00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +peer0.org1.example.com | 00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +peer0.org1.example.com | 00000040 ed 0f 29 74 0b 84 |..)t..|" +peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [cauthdsl] func2 -> DEBU 3abd 0xc0039f8cc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [cauthdsl] func1 -> DEBU 3abe 0xc0039f8cc0 gate 1563590445241470500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.244 UTC [policies] Evaluate -> DEBU 3abf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.245 UTC [policies] Evaluate -> DEBU 3ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.247 UTC [policies] Evaluate -> DEBU 3ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] deduplicate -> WARN 3ac2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] func1 -> DEBU 3ac3 0xc0039f92f0 gate 1563590445248608200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.248 UTC [cauthdsl] func2 -> DEBU 3ac4 0xc0039f92f0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac5 0xc0039f92f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0039f92f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0039f92f0 processing identity 1 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.250 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ac8 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.251 UTC [cauthdsl] func2 -> DEBU 3ac9 0xc0039f92f0 principal matched by identity 1" +peer0.org1.example.com | "2019-07-20 02:40:45.251 UTC [msp.identity] Verify -> DEBU 3aca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +peer0.org1.example.com | 00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +peer0.org1.example.com | "2019-07-20 02:40:45.252 UTC [msp.identity] Verify -> DEBU 3acb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +peer0.org1.example.com | 00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +peer0.org1.example.com | 00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +peer0.org1.example.com | 00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +peer0.org1.example.com | 00000040 6a a2 e2 e3 7c fb |j...|.|" +peer0.org1.example.com | "2019-07-20 02:40:45.261 UTC [cauthdsl] func2 -> DEBU 3acc 0xc0039f92f0 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-07-20 02:40:45.261 UTC [cauthdsl] func1 -> DEBU 3acd 0xc0039f92f0 gate 1563590445248608200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3ace Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad0 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.264 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad2 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad3 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad7 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad8 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ad9 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ada Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adb Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adc Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3add Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3ade Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3adf Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae2 Setting policy for key Admins to " +peer0.org1.example.com | "2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae3 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae4 Setting policy for key LifecycleEndorsement to " +peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae5 Setting policy for key Readers to " +peer0.org1.example.com | "2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae6 Setting policy for key Writers to " +peer0.org1.example.com | "2019-07-20 02:40:45.274 UTC [common.configtx] recurseConfigMap -> DEBU 3ae7 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.275 UTC [common.configtx] recurseConfigMap -> DEBU 3ae8 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3ae9 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aea Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aeb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.277 UTC [common.configtx] recurseConfigMap -> DEBU 3aec Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.280 UTC [common.configtx] recurseConfigMap -> DEBU 3aed Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.282 UTC [common.configtx] recurseConfigMap -> DEBU 3aee Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.284 UTC [common.configtx] recurseConfigMap -> DEBU 3aef Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.285 UTC [common.configtx] recurseConfigMap -> DEBU 3af0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-07-20 02:40:45.287 UTC [common.channelconfig] NewStandardValues -> DEBU 3af1 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af2 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af3 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af4 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af5 Processing field: Consortium" +peer0.org1.example.com | "2019-07-20 02:40:45.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af6 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] NewStandardValues -> DEBU 3af7 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af8 Processing field: ACLs" +peer0.org1.example.com | "2019-07-20 02:40:45.294 UTC [comm.grpc.server] 1 -> INFO 3af9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.293Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.1µs +peer0.org1.example.com | "2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afa Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.303 UTC [common.channelconfig] NewStandardValues -> DEBU 3afb Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afc Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] NewStandardValues -> DEBU 3afd Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afe Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.304 UTC [common.channelconfig] Validate -> DEBU 3aff Anchor peers for org Org3MSP are " +peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [common.channelconfig] validateMSP -> DEBU 3b00 Setting up MSP for org Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [msp] newBccspMsp -> DEBU 3b01 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b02 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b03 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b04 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b05 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:34150" +peer0.org1.example.com | "2019-07-20 02:40:45.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b06 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34150" +peer0.org1.example.com | "2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 be 5f 24 6f 9b 2e 79 cd 7b 8c b2 |0E.!.._$o..y.{..| +peer0.org1.example.com | 00000010 37 cf 5e 2c 50 16 db ab 74 30 02 39 8d 06 6c 42 |7.^,P...t0.9..lB| +peer0.org1.example.com | 00000020 0d e8 3d 51 de 02 20 12 f9 a6 96 80 2e 96 d1 be |..=Q.. .........| +peer0.org1.example.com | 00000030 fd 33 cf 4a 1a f7 4b 07 01 e8 c6 0d e3 58 b3 0e |.3.J..K......X..| +peer0.org1.example.com | 00000040 4b be 81 51 0f c3 af |K..Q...|" +peer0.org1.example.com | "2019-07-20 02:40:45.313 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b09 Authenticated 172.18.0.6:34150" +peer0.org1.example.com | "2019-07-20 02:40:45.313 UTC [gossip.comm] GossipStream -> DEBU 3b0a Servicing 172.18.0.6:34150" +peer0.org1.example.com | "2019-07-20 02:40:45.314 UTC [gossip.comm] serviceConnection -> DEBU 3b0b Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:40:45.314 UTC [gossip.comm] writeToStream -> DEBU 3b0c Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.316 UTC [gossip.comm] readFromStream -> DEBU 3b0d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:40:45.305 UTC [msp] New -> DEBU 3b0e Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.317 UTC [msp] Setup -> DEBU 3b0f Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.317 UTC [grpc] infof -> DEBU 3b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.318 UTC [gossip.comm] readFromStream -> DEBU 3b11 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:40:45.318 UTC [gossip.comm] func2 -> DEBU 3b12 Client 172.18.0.6:34150 disconnected" +peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [comm.grpc.server] 1 -> INFO 3b13 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.306Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9498ms +peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [grpc] infof -> DEBU 3b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.319 UTC [gossip.comm] writeToStream -> DEBU 3b15 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b18 Checking if identity satisfies role [CLIENT] for Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] Validate -> DEBU 3b19 MSP Org3MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.324 UTC [msp] getCertificationChain -> DEBU 3b1a MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [msp] hasOURole -> DEBU 3b1b MSP Org3MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [msp] getCertificationChain -> DEBU 3b1c MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b1e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b20 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.325 UTC [common.channelconfig] Validate -> DEBU 3b21 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-07-20 02:40:45.326 UTC [common.channelconfig] validateMSP -> DEBU 3b22 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.334 UTC [msp] newBccspMsp -> DEBU 3b23 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.334 UTC [msp] New -> DEBU 3b24 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.335 UTC [msp] Setup -> DEBU 3b25 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.337 UTC [msp.identity] newIdentity -> DEBU 3b26 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.339 UTC [msp.identity] newIdentity -> DEBU 3b27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b28 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.341 UTC [msp] Validate -> DEBU 3b29 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.343 UTC [msp] getCertificationChain -> DEBU 3b2a MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.345 UTC [msp] hasOURole -> DEBU 3b2b MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:40:45.345 UTC [msp] getCertificationChain -> DEBU 3b2c MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.346 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2d Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b2e Processing field: AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:40:45.347 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b30 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [common.channelconfig] Validate -> DEBU 3b31 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [common.channelconfig] validateMSP -> DEBU 3b32 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.348 UTC [msp] newBccspMsp -> DEBU 3b33 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.349 UTC [msp] New -> DEBU 3b34 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.350 UTC [msp] Setup -> DEBU 3b35 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b36 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b38 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [msp] Validate -> DEBU 3b39 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.354 UTC [comm.grpc.server] 1 -> INFO 3b3a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.353Z grpc.peer_address=172.18.0.6:34152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=525.1µs +peer0.org1.example.com | "2019-07-20 02:40:45.355 UTC [msp] getCertificationChain -> DEBU 3b3b MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [msp] hasOURole -> DEBU 3b3c MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [msp] getCertificationChain -> DEBU 3b3d MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.357 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3e Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b3f Processing field: ConsensusType" +peer0.org1.example.com | "2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b41 Processing field: BatchSize" +peer0.org1.example.com | "2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b42 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b43 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b44 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b45 Processing field: Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] NewStandardValues -> DEBU 3b46 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b47 Processing field: Endpoints" +peer0.org1.example.com | "2019-07-20 02:40:45.358 UTC [comm.grpc.server] 1 -> INFO 3b40 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.355Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.6µs +peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3b48 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b49 Processing field: MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [common.channelconfig] validateMSP -> DEBU 3b4a Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [msp] newBccspMsp -> DEBU 3b4b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.361 UTC [msp] New -> DEBU 3b4c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-07-20 02:40:45.362 UTC [msp] Setup -> DEBU 3b4d Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-07-20 02:40:45.362 UTC [msp.identity] newIdentity -> DEBU 3b4e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.363 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b4f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.364 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.365 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.366 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b53 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b54 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:34152" +peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b55 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34152" +peer0.org1.example.com | "2019-07-20 02:40:45.367 UTC [msp.identity] Verify -> DEBU 3b56 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-07-20 02:40:45.368 UTC [msp.identity] Verify -> DEBU 3b57 Verify: sig = 00000000 30 44 02 20 1f f0 4d a2 e6 96 82 59 a5 ec 6b 9c |0D. ..M....Y..k.| +peer0.org1.example.com | 00000010 34 89 fa 02 72 ee 06 88 36 da 46 9c ed 01 62 f5 |4...r...6.F...b.| +peer0.org1.example.com | 00000020 8f e5 fd 27 02 20 09 db aa f3 d2 09 14 81 36 40 |...'. ........6@| +peer0.org1.example.com | 00000030 8c 02 70 d7 6f cd 16 82 bf b9 5b 96 a1 b3 45 a8 |..p.o.....[...E.| +peer0.org1.example.com | 00000040 12 28 f0 7b 8d 41 |.(.{.A|" +peer0.org1.example.com | "2019-07-20 02:40:45.366 UTC [msp.identity] Sign -> DEBU 3b58 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.368 UTC [msp.identity] Sign -> DEBU 3b59 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.369 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:59100" +peer0.org1.example.com | "2019-07-20 02:40:45.370 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5b Authenticated 172.18.0.6:34152" +peer0.org1.example.com | "2019-07-20 02:40:45.370 UTC [gossip.comm] GossipStream -> DEBU 3b5c Servicing 172.18.0.6:34152" +peer0.org1.example.com | "2019-07-20 02:40:45.364 UTC [msp.identity] newIdentity -> DEBU 3b50 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Validate -> DEBU 3b5d MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5e Setting up the MSP manager (4 msps)" +peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5f MSP manager setup complete, setup 4 msps" +peer0.org1.example.com | "2019-07-20 02:40:45.373 UTC [policies] NewManagerImpl -> DEBU 3b60 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b61 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b62 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b64 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b65 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b66 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b67 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b68 Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b69 Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6a Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6b Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6c Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6d Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6e Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6f Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b70 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b71 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b72 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b73 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b74 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b75 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b76 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b77 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b78 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b79 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b7a Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7b Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7c Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7d Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b7f Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b80 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b81 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b82 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b83 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b84 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.387 UTC [common.configtx] addToMap -> DEBU 3b85 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b87 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b88 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8b Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b92 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b93 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b94 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b95 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b96 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b97 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b99 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b9a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [gossip.comm] func1 -> DEBU 3ba2 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.372 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b86 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:59100" +peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [grpc] infof -> DEBU 3ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [comm.grpc.server] 1 -> INFO 3b9f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.391Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=406.8µs +peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.gossip] handleMessage -> DEBU 3ba8 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba9 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.396 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bae Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3baf Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb0 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb1 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb2 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb3 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb4 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb5 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb6 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb7 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb8 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.401 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bb9 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bba As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbb Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbc Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbd Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbe Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbf Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bc0 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [policies] Manager -> DEBU 3bc1 Manager Channel/Application has managers Org3MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc2 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc3 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc4 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc5 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc8 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc9 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcb As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcc As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcd As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bce Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bcf Channel capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd0 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd1 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd2 Org3MSP anchor peers: []" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd3 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd4 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd5 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.405 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3bdc 0xc003d6ac20 gate 1563590445406453400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdd 0xc003d6ac20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bde 0xc003d6ac20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdf 0xc003d6ac20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3be0 0xc003d6ac20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3be1 0xc003d6ac20 gate 1563590445406453400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3be5 0xc003d6b460 gate 1563590445407305700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be6 0xc003d6b460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be7 0xc003d6b460 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be8 0xc003d6b460 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3be9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3bea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003d6b460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3bec 0xc003d6b460 gate 1563590445407305700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [msp] DeserializeIdentity -> DEBU 3bf1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.408 UTC [cauthdsl] func1 -> DEBU 3bf7 0xc003da0540 gate 1563590445408927800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf8 0xc003da0540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf9 0xc003da0540 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfa 0xc003da0540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfb 0xc003da0540 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [cauthdsl] func1 -> DEBU 3bfc 0xc003da0540 gate 1563590445408927800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func1 -> DEBU 3c00 0xc003da0d80 gate 1563590445409998800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c01 0xc003da0d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c02 0xc003da0d80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c03 0xc003da0d80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.410 UTC [msp.identity] Verify -> DEBU 3c04 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [msp.identity] Verify -> DEBU 3c05 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003da0d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [cauthdsl] func1 -> DEBU 3c07 0xc003da0d80 gate 1563590445409998800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [msp] DeserializeIdentity -> DEBU 3c0a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c10 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c12 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.412 UTC [msp.identity] Sign -> DEBU 3c11 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [msp.identity] Sign -> DEBU 3c14 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c15 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60470" +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c16 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60470" +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [msp] DeserializeIdentity -> DEBU 3c17 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.414 UTC [policies] Evaluate -> DEBU 3c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c22 0xc0032cb6a0 gate 1563590445415359700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c23 0xc0032cb6a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c24 0xc0032cb6a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c25 0xc0032cb6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c26 0xc0032cb6a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c27 0xc0032cb6a0 gate 1563590445415359700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func1 -> DEBU 3c2b 0xc0032cbee0 gate 1563590445416337000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2c 0xc0032cbee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc0032cbee0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc0032cbee0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c2f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c30 Verify: sig = 00000000 30 44 02 20 70 77 0e 41 05 b8 58 44 c5 ef d4 1d |0D. pw.A..XD....| +peer0.org1.example.com | 00000010 4b f0 23 2e 27 24 6e 26 fd 6a 3f e0 b6 46 1c c4 |K.#.'$n&.j?..F..| +peer0.org1.example.com | 00000020 28 04 83 d7 02 20 17 2f 47 a5 c0 02 2e 97 66 9c |(.... ./G.....f.| +peer0.org1.example.com | 00000030 8c 3f d5 3f 6a 11 42 3b 76 cb 41 89 39 f1 3d 56 |.?.?j.B;v.A.9.=V| +peer0.org1.example.com | 00000040 64 af ca 3d fb 2f |d..=./|" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [cauthdsl] func2 -> DEBU 3c31 0xc0032cbee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [cauthdsl] func1 -> DEBU 3c32 0xc0032cbee0 gate 1563590445416337000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c35 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c37 Authenticated 172.18.0.8:60470" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [gossip.comm] GossipStream -> DEBU 3c38 Servicing 172.18.0.8:60470" +peer0.org1.example.com | "2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [policies] Evaluate -> DEBU 3c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func1 -> DEBU 3c40 0xc000551290 gate 1563590445418202500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c41 0xc000551290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c42 0xc000551290 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c43 0xc000551290 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c44 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c45 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c46 0xc000551290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [cauthdsl] func1 -> DEBU 3c47 0xc000551290 gate 1563590445418202500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c48 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] JoinChan -> INFO 3c4c Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4d No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4f Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c50 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c51 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c52 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.420 UTC [gossip.service] updateEndpoints -> DEBU 3c53 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c56 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.421 UTC [peer] updateTrustedRoots -> DEBU 3c58 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.413 UTC [policies] Evaluate -> DEBU 3c13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func1 -> DEBU 3c5b 0xc003a9dac0 gate 1563590445422859400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5c 0xc003a9dac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5d 0xc003a9dac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5e 0xc003a9dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5f 0xc003a9dac0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c60 0xc003a9dac0 gate 1563590445422859400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c64 0xc0032d0300 gate 1563590445423362000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c65 0xc0032d0300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c66 0xc0032d0300 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c67 0xc0032d0300 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c68 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c69 Verify: sig = 00000000 30 44 02 20 5a 4b 1c 6b e9 16 61 35 b6 6b cd 1d |0D. ZK.k..a5.k..| +peer0.org1.example.com | 00000010 f8 85 de a9 54 4b da a8 5f a0 5a 65 5c a9 53 be |....TK.._.Ze\.S.| +peer0.org1.example.com | 00000020 87 46 2f 03 02 20 76 56 31 1e 7d 54 8b 82 2d da |.F/.. vV1.}T..-.| +peer0.org1.example.com | 00000030 06 aa ad f2 74 96 12 2b 00 a1 68 56 61 66 27 b1 |....t..+..hVaf'.| +peer0.org1.example.com | 00000040 51 92 4a 15 68 d0 |Q.J.h.|" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc0032d0300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c6b 0xc0032d0300 gate 1563590445423362000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.423 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c70 Authenticated 172.18.0.7:59100" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] GossipStream -> DEBU 3c71 Servicing 172.18.0.7:59100" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] writeToStream -> DEBU 3c72 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] serviceConnection -> DEBU 3c73 Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c74 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c75 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [gossip.comm] func2 -> DEBU 3c76 Client 172.18.0.7:59100 disconnected" +peer0.org1.example.com | "2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 3c77 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.366Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.3508ms +peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c78 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] serviceConnection -> DEBU 3c7a Closing reading from stream" +peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c7b Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c7c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [gossip.comm] readFromStream -> DEBU 3c7d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-07-20 02:40:45.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3baa Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func1 -> DEBU 3c85 0xc0034ee7d0 gate 1563590445427855200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c86 0xc0034ee7d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c87 0xc0034ee7d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c88 0xc0034ee7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c89 0xc0034ee7d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8a 0xc0034ee7d0 gate 1563590445427855200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8e 0xc0034ef010 gate 1563590445428220700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc0034ef010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c90 0xc0034ef010 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c91 0xc0034ef010 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c92 Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| +peer0.org1.example.com | 00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c93 Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| +peer0.org1.example.com | 00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| +peer0.org1.example.com | 00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| +peer0.org1.example.com | 00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| +peer0.org1.example.com | 00000040 8a df fb b1 35 84 93 |....5..|" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0034ef010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c95 0xc0034ef010 gate 1563590445428220700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c98 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca2 Got message: GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca4 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| +peer0.org1.example.com | 00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca5 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| +peer0.org1.example.com | 00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| +peer0.org1.example.com | 00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| +peer0.org1.example.com | 00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| +peer0.org1.example.com | 00000040 bf d9 c4 e8 12 c3 65 |......e|" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca7 Verify: sig = 00000000 30 45 02 21 00 d3 7f 31 bd 6b fd 66 e1 af e4 66 |0E.!...1.k.f...f| +peer0.org1.example.com | 00000010 e3 a5 67 bc dc c8 e0 e8 a1 ae 66 4e c4 e2 59 08 |..g.......fN..Y.| +peer0.org1.example.com | 00000020 4f 5d b5 b4 ec 02 20 11 e0 84 4f 9f 54 96 a0 2d |O].... ...O.T..-| +peer0.org1.example.com | 00000030 cc 52 79 6d bf 62 c4 04 cd 88 93 a2 ed 36 ca f9 |.Rym.b.......6..| +peer0.org1.example.com | 00000040 bd b0 f4 e1 9d 56 e1 |.....V.|" +peer0.org1.example.com | "2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ca9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3caa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cab Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cac Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cad Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3caf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.432 UTC [gossip.comm] Send -> DEBU 3cb3 Entering, sending GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:45.432 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.434 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:45.434 UTC [msp] DeserializeIdentity -> DEBU 3cb8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.435 UTC [gossip.comm] Send -> DEBU 3cbb Entering, sending GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.discovery] sendMemResponse -> DEBU 3cbc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive: alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3cbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.436 UTC [gossip.comm] createConnection -> DEBU 3cbe Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cbf parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cc0 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] watcher -> DEBU 3cc1 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] switchBalancer -> DEBU 3cc2 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:40:45.442 UTC [grpc] HandleSubConnStateChange -> DEBU 3cc3 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:40:45.443 UTC [gossip.gossip] handleMessage -> DEBU 3cc4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [gossip.comm] readFromStream -> DEBU 3cc5 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [gossip.comm] func2 -> DEBU 3cc6 Client 172.18.0.8:60470 disconnected" +peer0.org1.example.com | "2019-07-20 02:40:45.445 UTC [comm.grpc.server] 1 -> INFO 3cc7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.411Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5484ms +peer0.org1.example.com | "2019-07-20 02:40:45.446 UTC [grpc] infof -> DEBU 3cc8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.446 UTC [gossip.comm] writeToStream -> DEBU 3cc9 Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cca updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccb adding app root CAs for MSP [Org3MSP]" +peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccc adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccd adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cce adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3ccf config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3cd1 [businesschannel] validateTx completes for block 0xc000695640 env 0xc003781400 txn 0" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> DEBU 3cd2 got result for idx 0, code 0" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> INFO 3cd3 [businesschannel] Validated block [6] in 260ms" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3cd4 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [gossip.privdata] StoreBlock -> DEBU 3cd5 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [committer] preCommit -> DEBU 3cd6 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [kvledger] CommitWithPvtData -> DEBU 3cd7 [businesschannel] Validating state for block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd8 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd9 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cda Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdb ValidateAndPrepareBatch() for block number = [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdc preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] preprocessProtoBlock -> DEBU 3cdd txType=CONFIG" +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cde Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cdf Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3ce0 constructing new tx simulator" +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3ce1 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-07-20 02:40:45.459 UTC [peer] GenerateSimulationResults -> DEBU 3ce2 Processing CONFIG" +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce3 parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce4 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [peer] processChannelConfigTx -> DEBU 3ce5 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3ce7 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] Done -> DEBU 3ce8 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3ce9 Block [6] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valinternal] ApplyWriteSet -> DEBU 3cea txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003517ac0)}" +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ceb validating rwset..." +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cec postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ced ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-07-20 02:40:45.461 UTC [kvledger] CommitWithPvtData -> DEBU 3cee [businesschannel] Adding CommitHash to the block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.462 UTC [kvledger] CommitWithPvtData -> DEBU 3cef [businesschannel] Committing block [6] to storage" +peer0.org1.example.com | "2019-07-20 02:40:45.462 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3cf0 Writing block [6] to pvt block store" +peer0.org1.example.com | "2019-07-20 02:40:45.463 UTC [pvtdatastorage] Prepare -> DEBU 3cf1 Saved 0 private data write sets for block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.464 UTC [comm.grpc.server] 1 -> INFO 3cf2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.463Z grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.1µs +peer0.org1.example.com | "2019-07-20 02:40:45.456 UTC [grpc] HandleSubConnStateChange -> DEBU 3cd0 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, READY" +peer0.org1.example.com | "2019-07-20 02:40:45.466 UTC [fsblkstorage] indexBlock -> DEBU 3cf3 Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= +peer0.org1.example.com | txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf4 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to txid-index" +peer0.org1.example.com | "2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf5 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx number:[0] ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to blockNumTranNum index" +peer0.org1.example.com | "2019-07-20 02:40:45.468 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cf6 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [fsblkstorage] updateCheckpoint -> DEBU 3cf7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118997], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cf8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cfa Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cfb Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cfc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.460 UTC [grpc] watcher -> DEBU 3ce6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [grpc] switchBalancer -> DEBU 3cfe ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:40:45.471 UTC [grpc] HandleSubConnStateChange -> DEBU 3cff pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:40:45.469 UTC [pvtdatastorage] Commit -> DEBU 3cf9 Committing private data for block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.470 UTC [msp.identity] Sign -> DEBU 3cfd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.474 UTC [msp.identity] Sign -> DEBU 3d00 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d02 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60474" +peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d03 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60474" +peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d04 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d05 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d06 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.483 UTC [msp.identity] newIdentity -> DEBU 3d0a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.479 UTC [msp.identity] newIdentity -> DEBU 3d07 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:45.475 UTC [pvtdatastorage] Commit -> DEBU 3d01 Committed private data for block [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.484 UTC [grpc] HandleSubConnStateChange -> DEBU 3d0b pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, READY" +peer0.org1.example.com | "2019-07-20 02:40:45.486 UTC [msp] Validate -> DEBU 3d0c MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [msp] getCertificationChain -> DEBU 3d0e MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.487 UTC [msp] DeserializeIdentity -> DEBU 3d10 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.489 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.490 UTC [policies] Evaluate -> DEBU 3d18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [policies] Evaluate -> DEBU 3d1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func1 -> DEBU 3d1b 0xc003ef7610 gate 1563590445491328500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003ef7610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1d 0xc003ef7610 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1e 0xc003ef7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1f 0xc003ef7610 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [cauthdsl] func1 -> DEBU 3d20 0xc003ef7610 gate 1563590445491328500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.490 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d19 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.488 UTC [msp] Validate -> DEBU 3d14 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.486 UTC [kvledger] CommitWithPvtData -> DEBU 3d0d [businesschannel] Committing block [6] transactions to state database" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.493 UTC [policies] Evaluate -> DEBU 3d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [msp.identity] Sign -> DEBU 3d23 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [msp.identity] Sign -> DEBU 3d27 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d28 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d29 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.494 UTC [cauthdsl] func1 -> DEBU 3d2b 0xc003ee11e0 gate 1563590445493562900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2c 0xc003ee11e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc003ee11e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [msp] DeserializeIdentity -> DEBU 3d2f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d30 0xc003ee11e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [cauthdsl] func2 -> DEBU 3d31 0xc003ee11e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [cauthdsl] func1 -> DEBU 3d32 0xc003ee11e0 gate 1563590445493562900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [msp] DeserializeIdentity -> DEBU 3d34 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d38 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d39 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func1 -> DEBU 3d3c 0xc003ee1a40 gate 1563590445497309900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3d 0xc003ee1a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3e 0xc003ee1a40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3f Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.498 UTC [msp] Validate -> DEBU 3d40 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.499 UTC [msp] getCertificationChain -> DEBU 3d41 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [cauthdsl] func2 -> DEBU 3d42 0xc003ee1a40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d43 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d44 Verify: sig = 00000000 30 45 02 21 00 cc 72 66 4d f3 aa 62 27 67 82 1d |0E.!..rfM..b'g..| +peer0.org1.example.com | 00000010 99 71 b4 0e 9c a8 af 3e a8 79 15 1c 73 cb bc 67 |.q.....>.y..s..g| +peer0.org1.example.com | 00000020 49 75 71 2b e8 02 20 29 70 7a 3d c2 2f 23 ba 52 |Iuq+.. )pz=./#.R| +peer0.org1.example.com | 00000030 bf 65 fd 50 14 83 46 01 8a f7 ef fd a3 c3 3a 36 |.e.P..F.......:6| +peer0.org1.example.com | 00000040 c9 40 0f 81 41 8b 00 |.@..A..|" +peer0.org1.example.com | "2019-07-20 02:40:45.500 UTC [grpc] infof -> DEBU 3d45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [lockbasedtxmgr] Commit -> DEBU 3d25 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d46 Committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3d47 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d48 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [stateleveldb] ApplyUpdates -> DEBU 3d49 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-07-20 02:40:45.501 UTC [cauthdsl] func2 -> DEBU 3d4a 0xc003ee1a40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc003ee1a40 gate 1563590445497309900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d4e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [lockbasedtxmgr] Commit -> DEBU 3d4f Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d50 Preparing potential purge list working-set for expiringAtBlk [7]" +peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [leveldbhelper] GetIterator -> DEBU 3d51 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d52 No expiry entry found for expiringAtBlk [7]" +peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [lockbasedtxmgr] func1 -> DEBU 3d53 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [kvledger] CommitWithPvtData -> DEBU 3d54 [businesschannel] Committing block [6] transactions to history database" +peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d55 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +peer0.org1.example.com | "2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d56 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [historyleveldb] Commit -> DEBU 3d58 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [kvledger] CommitWithPvtData -> INFO 3d59 [businesschannel] Committed block [6] with 1 transaction(s) in 48ms (state_validation=4ms block_and_pvtdata_commit=24ms state_commit=17ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.506 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08071A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: 3413AB16E454D4D11A5CF1F1C30B239DD040FF9B6C404041B3848980D2DF491C " +peer0.org1.example.com | "2019-07-20 02:40:45.497 UTC [policies] Evaluate -> DEBU 3d3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [gossip.state] commitBlock -> DEBU 3d5e [businesschannel] Committed block [6] with 1 transaction(s)" +peer0.org1.example.com | "2019-07-20 02:40:45.492 UTC [msp] getCertificationChain -> DEBU 3d24 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d65 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d66 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.508 UTC [policies] Evaluate -> DEBU 3d67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6a 0xc0030083a0 gate 1563590445509237900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6b 0xc0030083a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0030083a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0030083a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0030083a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6f 0xc0030083a0 gate 1563590445509237900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d70 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d73 0xc003008c00 gate 1563590445510074100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d74 0xc003008c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003008c00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003008c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d77 0xc003008c00 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d78 0xc003008c00 gate 1563590445510074100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d79 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d7c 0xc003009460 gate 1563590445510800100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003009460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003009460 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d7f Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] Validate -> DEBU 3d80 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp] getCertificationChain -> DEBU 3d81 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [cauthdsl] func2 -> DEBU 3d82 0xc003009460 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d83 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d84 Verify: sig = 00000000 30 44 02 20 70 4f 30 67 42 46 82 f2 1b 9c a8 81 |0D. pO0gBF......| +peer0.org1.example.com | 00000010 11 8c 1f 81 39 d0 51 f4 ae c4 c7 b9 f0 8a 1d d7 |....9.Q.........| +peer0.org1.example.com | 00000020 b9 02 2d ca 02 20 05 6c ed 25 61 84 a2 6d fd d3 |..-.. .l.%a..m..| +peer0.org1.example.com | 00000030 91 b9 b4 96 f9 d6 b6 9d 33 c7 e6 9f ea ed d9 f4 |........3.......| +peer0.org1.example.com | 00000040 67 d9 13 e9 43 de |g...C.|" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [cauthdsl] func2 -> DEBU 3d85 0xc003009460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [cauthdsl] func1 -> DEBU 3d86 0xc003009460 gate 1563590445510800100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d89 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8b Authenticated 172.18.0.7:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] createConnection -> DEBU 3d8c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.512 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d5f Authenticated 172.18.0.8:60474" +peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] GossipStream -> DEBU 3d8e Servicing 172.18.0.8:60474" +peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] readFromStream -> DEBU 3d8f Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.comm] func2 -> DEBU 3d90 Client 172.18.0.8:60474 disconnected" +peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [comm.grpc.server] 1 -> INFO 3d91 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5281ms +peer0.org1.example.com | "2019-07-20 02:40:45.513 UTC [gossip.gossip] handleMessage -> DEBU 3d92 Entering, 172.18.0.8:60474 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d95 Got message: GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [msp] DeserializeIdentity -> DEBU 3d97 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func1 -> DEBU 3d9e 0xc003f25a40 gate 1563590445515383000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3d9f 0xc003f25a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da0 0xc003f25a40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da1 0xc003f25a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da2 0xc003f25a40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [cauthdsl] func1 -> DEBU 3da3 0xc003f25a40 gate 1563590445515383000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func1 -> DEBU 3da7 0xc003f36280 gate 1563590445516956200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da8 0xc003f36280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da9 0xc003f36280 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3daa 0xc003f36280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3dab 0xc003f36280 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3dac 0xc003f36280 gate 1563590445516956200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3db0 0xc003f36ac0 gate 1563590445518968000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db1 0xc003f36ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db2 0xc003f36ac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db3 0xc003f36ac0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.519 UTC [msp.identity] Verify -> DEBU 3db4 Verify: digest = 00000000 a5 36 9f 8b 2f a8 4d c1 63 6e 58 db 08 90 2e f7 |.6../.M.cnX.....| +peer0.org1.example.com | 00000010 10 64 1f a4 b2 1b e8 16 22 90 1f ef f7 e1 28 f5 |.d......".....(.|" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [msp.identity] Verify -> DEBU 3db5 Verify: sig = 00000000 30 45 02 21 00 f8 58 21 d0 7b 04 cb b7 9d 1e 37 |0E.!..X!.{.....7| +peer0.org1.example.com | 00000010 a0 e6 f5 fd 5f eb 98 b0 61 6a 78 ff 57 e0 45 23 |...._...ajx.W.E#| +peer0.org1.example.com | 00000020 1e 3e d0 b2 15 02 20 65 75 64 99 d9 d0 01 28 ab |.>.... eud....(.| +peer0.org1.example.com | 00000030 4c 04 4e bb 5e e6 cc 5d 00 0c 2d 71 1e 01 f4 71 |L.N.^..]..-q...q| +peer0.org1.example.com | 00000040 83 c7 79 dd 2c 1a 7f |..y.,..|" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [cauthdsl] func2 -> DEBU 3db6 0xc003f36ac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [cauthdsl] func1 -> DEBU 3db7 0xc003f36ac0 gate 1563590445518968000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dba Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbe updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbf Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dc3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc4 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [msp] DeserializeIdentity -> DEBU 3dc7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] Send -> DEBU 3dc8 Entering, sending GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > alive: alive:9\232\322V\2358\311\017}\365J" > " +peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] sendToEndpoint -> DEBU 3dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.524 UTC [gossip.comm] createConnection -> DEBU 3dcb Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [gossip.comm] writeToStream -> DEBU 3dcc Closing writing to stream" +peer0.org1.example.com | "2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dcd 0xc003e8cbe0 gate 1563590445526119800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dce 0xc003e8cbe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc003e8cbe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd0 0xc003e8cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc003e8cbe0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc003e8cbe0 gate 1563590445526119800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd6 0xc003e8d420 gate 1563590445526559500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd7 0xc003e8d420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd8 0xc003e8d420 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003e8d420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dda 0xc003e8d420 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddb 0xc003e8d420 gate 1563590445526559500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3dde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddf 0xc003e8dc60 gate 1563590445527196500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de0 0xc003e8dc60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de1 0xc003e8dc60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de2 0xc003e8dc60 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3de3 parsed scheme: """ +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de4 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de5 Verify: sig = 00000000 30 44 02 20 15 44 8b 82 00 ab 3b 37 3d 6f 79 e0 |0D. .D....;7=oy.| +peer0.org1.example.com | 00000010 81 20 9b 49 c9 2e 8a 26 7d b6 61 35 f9 29 00 7c |. .I...&}.a5.).|| +peer0.org1.example.com | 00000020 b2 ba a1 71 02 20 42 34 7a 79 64 3c 4b 12 a3 a5 |...q. B4zyd DEBU 3de6 0xc003e8dc60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [cauthdsl] func1 -> DEBU 3de7 0xc003e8dc60 gate 1563590445527196500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3dea Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3deb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3dec Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dee Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3def Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102F " +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df0 Sign: digest: FF22BF917C50A5A69FE384EC283EBBAB43EA18EC2DAE339B6AE8BFEA098F946E " +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3df1 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [msp.identity] Sign -> DEBU 3df3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [gossip.comm] Send -> DEBU 3df5 Entering, sending GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:45.529 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] infof -> DEBU 3df7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3df8 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] watcher -> DEBU 3df9 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-07-20 02:40:45.530 UTC [grpc] switchBalancer -> DEBU 3dfa ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-07-20 02:40:45.531 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfb pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, CONNECTING" +peer0.org1.example.com | "2019-07-20 02:40:45.542 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfc pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, READY" +peer0.org1.example.com | "2019-07-20 02:40:45.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dfd Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:45.544 UTC [msp.identity] Sign -> DEBU 3dfe Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-07-20 02:40:45.545 UTC [msp.identity] Sign -> DEBU 3dff Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-07-20 02:40:45.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e00 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e01 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [msp] DeserializeIdentity -> DEBU 3e02 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.551 UTC [msp] DeserializeIdentity -> DEBU 3e04 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e08 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e09 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e0d 0xc0006e0230 gate 1563590445552375400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0e 0xc0006e0230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0f 0xc0006e0230 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e10 0xc0006e0230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e11 0xc0006e0230 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e12 0xc0006e0230 gate 1563590445552375400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e16 0xc0006e0a70 gate 1563590445553036600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e17 0xc0006e0a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e18 0xc0006e0a70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e19 0xc0006e0a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e1a 0xc0006e0a70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1b 0xc0006e0a70 gate 1563590445553036600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1f 0xc0006e12b0 gate 1563590445553401800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e20 0xc0006e12b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e21 0xc0006e12b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e22 0xc0006e12b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e23 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e24 Verify: sig = 00000000 30 45 02 21 00 f5 da 01 a3 70 51 a3 33 5f 1a f2 |0E.!.....pQ.3_..| +peer0.org1.example.com | 00000010 ac 08 fc d6 ef 1b 74 df ba ed 57 50 ae 50 ea 05 |......t...WP.P..| +peer0.org1.example.com | 00000020 8a bc 1b 00 2e 02 20 4d 26 16 73 50 ac 0e 33 ce |...... M&.sP..3.| +peer0.org1.example.com | 00000030 54 53 f1 34 5a c6 ca ff 8a 55 a6 11 48 4c 2d ef |TS.4Z....U..HL-.| +peer0.org1.example.com | 00000040 36 54 a9 63 7a a6 da |6T.cz..|" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e25 0xc0006e12b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e26 0xc0006e12b0 gate 1563590445553401800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e27 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e29 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e2a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e2b Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] createConnection -> DEBU 3e2c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.comm] func1 -> DEBU 3e2f Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e30 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e31 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e32 Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e33 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e34 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| +peer0.org1.example.com | 00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e35 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| +peer0.org1.example.com | 00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| +peer0.org1.example.com | 00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| +peer0.org1.example.com | 00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| +peer0.org1.example.com | 00000040 bf d9 c4 e8 12 c3 65 |......e|" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e37 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e38 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 ff 22 bf 91 7c 50 a5 a6 9f e3 84 ec 28 3e bb ab |."..|P......(>..| +peer0.org1.example.com | 00000010 43 ea 18 ec 2d ae 33 9b 6a e8 bf ea 09 8f 94 6e |C...-.3.j......n|" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 f5 f5 83 7b ac 43 de e2 2f bf 91 |0E.!....{.C../..| +peer0.org1.example.com | 00000010 a4 b7 be 7d 67 36 c7 16 82 ca 9c 37 61 1d f8 f1 |...}g6.....7a...| +peer0.org1.example.com | 00000020 33 04 07 23 a5 02 20 47 34 61 9f b8 48 46 3b cb |3..#.. G4a..HF;.| +peer0.org1.example.com | 00000030 ad b1 a0 42 7d 88 7a 23 7f d1 1a 87 24 7f 6d 6e |...B}.z#....$.mn| +peer0.org1.example.com | 00000040 e6 e3 c3 b9 9a c7 b5 |.......|" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] isSentByMe -> DEBU 3e3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e3e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:45.559 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e42 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e46 0xc000702730 gate 1563590445560383100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e47 0xc000702730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e48 0xc000702730 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e49 0xc000702730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e4a 0xc000702730 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e4b 0xc000702730 gate 1563590445560383100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e4f 0xc000702f70 gate 1563590445561132700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e50 0xc000702f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e51 0xc000702f70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e52 0xc000702f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e53 0xc000702f70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e54 0xc000702f70 gate 1563590445561132700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e58 0xc0007037b0 gate 1563590445561877900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e59 0xc0007037b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5a 0xc0007037b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5b 0xc0007037b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5c Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| +peer0.org1.example.com | 00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5d Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| +peer0.org1.example.com | 00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| +peer0.org1.example.com | 00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| +peer0.org1.example.com | 00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| +peer0.org1.example.com | 00000040 8a df fb b1 35 84 93 |....5..|" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0007037b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [cauthdsl] func1 -> DEBU 3e5f 0xc0007037b0 gate 1563590445561877900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e62 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e65 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:45.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e66 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [gossip.election] waitForInterrupt -> DEBU 3e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [gossip.election] IsLeader -> DEBU 3e68 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:46.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e69 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100E1801 " +peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6b Sign: digest: C94717FA5498C76CBFD070F87C29A8E58419A2CDB66B3A48BC32D35A9FA13C03 " +peer0.org1.example.com | "2019-07-20 02:40:46.979 UTC [gossip.election] waitForInterrupt -> DEBU 3e6c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e70 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [gossip.comm] Send -> DEBU 3e71 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e72 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e74 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:46.982 UTC [msp] DeserializeIdentity -> DEBU 3e75 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.comm] func1 -> DEBU 3e76 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e78 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:46.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:46.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:46.999 UTC [msp] DeserializeIdentity -> DEBU 3e7b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.000 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:47.002 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func1 -> DEBU 3e82 0xc0006efa40 gate 1563590447004336100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0006efa40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e84 0xc0006efa40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0006efa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0006efa40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [gossip.gossip] handleMessage -> DEBU 3e87 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [cauthdsl] func1 -> DEBU 3e88 0xc0006efa40 gate 1563590447004336100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e89 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e8c 0xc000763130 gate 1563590447006150600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc000763130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc000763130 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc000763130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e90 0xc000763130 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e91 0xc000763130 gate 1563590447006150600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [cauthdsl] func1 -> DEBU 3e95 0xc000763970 gate 1563590447007816600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.007 UTC [cauthdsl] func2 -> DEBU 3e96 0xc000763970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e97 0xc000763970 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e98 0xc000763970 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e99 Verify: digest = 00000000 cf 94 cc bf 56 cf f7 61 c6 08 be 0a 5a fa 83 fe |....V..a....Z...| +peer0.org1.example.com | 00000010 db 51 21 ae 39 c6 6a 65 af 46 59 ec aa 84 2e 99 |.Q!.9.je.FY.....|" +peer0.org1.example.com | "2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e9a Verify: sig = 00000000 30 44 02 20 30 58 3e 03 05 1c 60 f6 aa 1e 0d 5d |0D. 0X>...`....]| +peer0.org1.example.com | 00000010 02 6e 70 7d 5a f5 63 2c 5e dd e7 33 47 95 09 69 |.np}Z.c,^..3G..i| +peer0.org1.example.com | 00000020 dd ad 21 4e 02 20 0b 55 36 0d b2 9c 17 0a b6 ea |..!N. .U6.......| +peer0.org1.example.com | 00000030 1e 76 ba b8 be ad dd 38 9d 50 bc 4a 85 a5 09 b7 |.v.....8.P.J....| +peer0.org1.example.com | 00000040 6a e6 a6 64 bd 14 |j..d..|" +peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [cauthdsl] func2 -> DEBU 3e9b 0xc000763970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [cauthdsl] func1 -> DEBU 3e9c 0xc000763970 gate 1563590447007816600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3e9f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3ea0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea3 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.gossip] handleMessage -> DEBU 3eaa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eab Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3eac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3ead Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.017 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eaf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.020 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.193 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3eba Sleeping 25s" +peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebb Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebc Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151030 " +peer0.org1.example.com | "2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebd Sign: digest: F4B2374751D92F8187A330159D35521A45201DE2EE917285D294724B2D5FFEE1 " +peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebe Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ebf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ec0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:47.289 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ec1 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [gossip.comm] Send -> DEBU 3ec5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3ec8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3eca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.301 UTC [gossip.comm] sendToEndpoint -> DEBU 3ece Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ecf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ed1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed3 Verify: digest = 00000000 c0 8b 97 e5 b3 08 ab 1c 23 62 0d 3c a8 64 f1 4f |........#b.<.d.O| +peer0.org1.example.com | 00000010 12 44 bf 7c 3a 44 dc 2a b4 02 fc ce 31 ca 47 78 |.D.|:D.*....1.Gx|" +peer0.org1.example.com | "2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed4 Verify: sig = 00000000 30 45 02 21 00 ea 77 67 83 45 6e 40 a5 3c ac d6 |0E.!..wg.En@.<..| +peer0.org1.example.com | 00000010 74 2c ee 43 4d 48 2f bc 87 08 96 11 2e d9 2c b5 |t,.CMH/.......,.| +peer0.org1.example.com | 00000020 5c 64 72 27 41 02 20 78 2d 65 40 1b b7 cd 24 1d |\dr'A. x-e@...$.| +peer0.org1.example.com | 00000030 0d 4d bb 00 af be 5f 94 8e 7d 97 15 9a d8 5a fb |.M...._..}....Z.| +peer0.org1.example.com | 00000040 97 81 74 60 73 de 2a |..t`s.*|" +peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.333 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3edc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3ede Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee0 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [msp] DeserializeIdentity -> DEBU 3ee1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.342 UTC [gossip.comm] func1 -> DEBU 3ee7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.342 UTC [gossip.gossip] handleMessage -> DEBU 3ee8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.gossip] handleMessage -> DEBU 3ee9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eeb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.531 UTC [gossip.comm] func1 -> DEBU 3eec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.532 UTC [gossip.gossip] handleMessage -> DEBU 3eee Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [msp] DeserializeIdentity -> DEBU 3ef1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func1 -> DEBU 3ef8 0xc003843490 gate 1563590447534529400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc003843490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3efa 0xc003843490 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efb 0xc003843490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efc 0xc003843490 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [cauthdsl] func1 -> DEBU 3efd 0xc003843490 gate 1563590447534529400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3efe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f01 0xc003843cd0 gate 1563590447536109800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f02 0xc003843cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f03 0xc003843cd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f04 0xc003843cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f05 0xc003843cd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f06 0xc003843cd0 gate 1563590447536109800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc00385a510 gate 1563590447537724800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.537 UTC [cauthdsl] func2 -> DEBU 3f0b 0xc00385a510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc00385a510 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc00385a510 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0e Verify: digest = 00000000 c3 1f 8e d6 f3 6b b3 b6 11 47 45 89 17 35 18 ff |.....k...GE..5..| +peer0.org1.example.com | 00000010 b2 3c 16 4b 3a d5 5c 86 f6 fe 41 f9 81 5b f0 40 |.<.K:.\...A..[.@|" +peer0.org1.example.com | "2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0f Verify: sig = 00000000 30 44 02 20 10 e7 1b 40 4b be ad e9 7d bc 6c c1 |0D. ...@K...}.l.| +peer0.org1.example.com | 00000010 9e 54 22 95 87 7e fb f0 54 70 a1 5a 24 c4 49 b6 |.T"..~..Tp.Z$.I.| +peer0.org1.example.com | 00000020 87 78 b9 d0 02 20 4c be d5 bc 5a ee 8a a8 17 87 |.x... L...Z.....| +peer0.org1.example.com | 00000030 49 61 f7 ce 43 29 b0 e8 04 28 8c 6e b9 03 73 a0 |Ia..C)...(.n..s.| +peer0.org1.example.com | 00000040 51 42 95 aa 64 92 |QB..d.|" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [cauthdsl] func2 -> DEBU 3f10 0xc00385a510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [cauthdsl] func1 -> DEBU 3f11 0xc00385a510 gate 1563590447537724800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f14 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f18 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f19 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f1d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.542 UTC [gossip.comm] func1 -> DEBU 3f1e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.542 UTC [gossip.gossip] handleMessage -> DEBU 3f1f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f20 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f21 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f23 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f25 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [gossip.gossip] handleMessage -> DEBU 3f26 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f27 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.938 UTC [gossip.comm] func1 -> DEBU 3f35 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.938 UTC [gossip.gossip] handleMessage -> DEBU 3f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.939 UTC [gossip.gossip] handleMessage -> DEBU 3f37 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:47.940 UTC [msp] DeserializeIdentity -> DEBU 3f3a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [policies] Evaluate -> DEBU 3f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f41 0xc0028e6010 gate 1563590447942285300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f42 0xc0028e6010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f43 0xc0028e6010 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f44 0xc0028e6010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f45 0xc0028e6010 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f46 0xc0028e6010 gate 1563590447942285300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f47 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func1 -> DEBU 3f4a 0xc0028e6850 gate 1563590447943384400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc0028e6850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4c 0xc0028e6850 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4d 0xc0028e6850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc0028e6850 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0028e6850 gate 1563590447943384400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f53 0xc0028e7090 gate 1563590447944666000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:47.944 UTC [cauthdsl] func2 -> DEBU 3f54 0xc0028e7090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f55 0xc0028e7090 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f56 0xc0028e7090 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f57 Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| +peer0.org1.example.com | 00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f58 Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| +peer0.org1.example.com | 00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| +peer0.org1.example.com | 00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| +peer0.org1.example.com | 00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| +peer0.org1.example.com | 00000040 d3 ec c6 8c 3d c1 4c |....=.L|" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0028e7090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:47.945 UTC [cauthdsl] func1 -> DEBU 3f5a 0xc0028e7090 gate 1563590447944666000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [policies] Evaluate -> DEBU 3f5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f61 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f62 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f64 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f65 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f66 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f67 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f68 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.comm] Send -> DEBU 3f6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0207" signature:"0E\002!\000\352wg\203En@\245<\254\326t,\356CMH/\274\207\010\226\021.\331,\265\\dr'A\002 x-e@\033\267\315$\035\rM\273\000\257\276_\224\216}\227\025\232\330Z\373\227\201t`s\336*" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:47.954 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.955 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.comm] func1 -> DEBU 3f6f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.gossip] handleMessage -> DEBU 3f70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.956 UTC [gossip.pull] HandleMessage -> DEBU 3f71 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f75 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f76 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f77 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:47.959 UTC [gossip.pull] SendDigest -> DEBU 3f78 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:47.959 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.235 UTC [gossip.pull] Hello -> DEBU 3f7a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:48.235 UTC [gossip.comm] Send -> DEBU 3f7b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f80 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f81 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f83 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f84 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f85 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.238 UTC [gossip.comm] func1 -> DEBU 3f86 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.239 UTC [gossip.gossip] handleMessage -> DEBU 3f87 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.240 UTC [gossip.pull] HandleMessage -> DEBU 3f88 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.241 UTC [gossip.gossip] handleMessage -> DEBU 3f8a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.240 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.pull] HandleMessage -> DEBU 3f8c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f8e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.pull] HandleMessage -> DEBU 3f8f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f90 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f91 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f92 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151031 " +peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f93 Sign: digest: 4F74B096134B36ADCB78D9C03AE46F229A5A99113888D4169E87246C9DD09824 " +peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f94 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f95 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp.identity] Sign -> DEBU 3f96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f98 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f9a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] Send -> DEBU 3f9b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.comm] func1 -> DEBU 3fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fa6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.comm] func1 -> DEBU 3fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [gossip.gossip] handleMessage -> DEBU 3fa8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.285 UTC [msp.identity] Verify -> DEBU 3fa9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [msp.identity] Verify -> DEBU 3faa Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fab Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] isSentByMe -> DEBU 3fac Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fad Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fb0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.287 UTC [msp] DeserializeIdentity -> DEBU 3fb1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fb8 0xc00404e2b0 gate 1563590448288246900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fb9 0xc00404e2b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fba 0xc00404e2b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbb 0xc00404e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbc 0xc00404e2b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fbd 0xc00404e2b0 gate 1563590448288246900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc1 0xc00404eaf0 gate 1563590448288608400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc00404eaf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc3 0xc00404eaf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc00404eaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc00404eaf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc00404eaf0 gate 1563590448288608400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fca 0xc00404f330 gate 1563590448288892800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc00404f330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc00404f330 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc00404f330 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fce Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| +peer0.org1.example.com | 00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fcf Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| +peer0.org1.example.com | 00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| +peer0.org1.example.com | 00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| +peer0.org1.example.com | 00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| +peer0.org1.example.com | 00000040 d3 ec c6 8c 3d c1 4c |....=.L|" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc00404f330 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [cauthdsl] func1 -> DEBU 3fd1 0xc00404f330 gate 1563590448288892800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.289 UTC [gossip.discovery] isSentByMe -> DEBU 3fdc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fde Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe4 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +peer0.org1.example.com | 00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe5 Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +peer0.org1.example.com | 00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +peer0.org1.example.com | 00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +peer0.org1.example.com | 00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +peer0.org1.example.com | 00000040 b5 ce 5b 25 de 56 |..[%.V|" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: sig = 00000000 30 45 02 21 00 9d b8 1e 88 45 28 58 1c 6b 97 a2 |0E.!.....E(X.k..| +peer0.org1.example.com | 00000010 07 40 cd 30 8f cc 13 2b 52 fc bd 7f ba 82 f6 b7 |.@.0...+R.......| +peer0.org1.example.com | 00000020 ca ea e8 ff fa 02 20 07 e1 9b b7 a0 ea a7 91 cd |...... .........| +peer0.org1.example.com | 00000030 9f 46 66 da 28 f8 65 b3 65 1b 15 fe f4 a6 ca 62 |.Ff.(.e.e......b| +peer0.org1.example.com | 00000040 66 3d 21 b8 a0 da 43 |f=!...C|" +peer0.org1.example.com | "2019-07-20 02:40:48.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.294 UTC [gossip.discovery] isSentByMe -> DEBU 3fe9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fea Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.pull] HandleMessage -> DEBU 3fed GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.336 UTC [gossip.pull] SendDigest -> DEBU 3fee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:48.337 UTC [gossip.gossip] handleMessage -> DEBU 3fef Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff4 Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +peer0.org1.example.com | "2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff5 Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +peer0.org1.example.com | "2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff7 Verify: sig = 00000000 30 45 02 21 00 94 e0 00 3e 3a 01 b1 51 f0 f7 8e |0E.!....>:..Q...| +peer0.org1.example.com | 00000010 46 3d 0d 48 fc 27 cc fe f3 27 d5 5c 95 64 3f 93 |F=.H.'...'.\.d?.| +peer0.org1.example.com | 00000020 65 f5 57 cf 0e 02 20 7a 1d 11 1d 3a 13 18 73 b8 |e.W... z...:..s.| +peer0.org1.example.com | 00000030 58 0a c3 bd f3 fc dd 75 f0 16 fb b4 20 62 90 70 |X......u.... b.p| +peer0.org1.example.com | 00000040 2b fa 22 1d f8 89 78 |+."...x|" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffe Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fff Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4001 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] Send -> DEBU 4003 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.discovery] sendMemResponse -> DEBU 4004 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4006 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.comm] func1 -> DEBU 4007 Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4008 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4009 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400a Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 400b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:48.581 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4013 0xc0040758f0 gate 1563590448582349900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4014 0xc0040758f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4015 0xc0040758f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4016 0xc0040758f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4017 0xc0040758f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4018 0xc0040758f0 gate 1563590448582349900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 401c 0xc0040ae130 gate 1563590448582767000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401d 0xc0040ae130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401e 0xc0040ae130 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401f 0xc0040ae130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4020 0xc0040ae130 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4021 0xc0040ae130 gate 1563590448582767000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func1 -> DEBU 4025 0xc0040ae970 gate 1563590448583184400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4026 0xc0040ae970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4027 0xc0040ae970 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4028 0xc0040ae970 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| +peer0.org1.example.com | 00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" +peer0.org1.example.com | "2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 402a Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| +peer0.org1.example.com | 00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| +peer0.org1.example.com | 00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| +peer0.org1.example.com | 00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| +peer0.org1.example.com | 00000040 6c 39 6d f0 af 9f 8c |l9m....|" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [cauthdsl] func2 -> DEBU 402b 0xc0040ae970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [cauthdsl] func1 -> DEBU 402c 0xc0040ae970 gate 1563590448583184400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4031 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4032 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4033 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4034 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4035 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4036 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4037 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.589 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4038 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 4039 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 403e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 403f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.comm] func1 -> DEBU 4041 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.gossip] handleMessage -> DEBU 4042 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.pull] HandleMessage -> DEBU 4043 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4044 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4045 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4046 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4047 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4048 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.598 UTC [gossip.pull] SendDigest -> DEBU 404a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:48.599 UTC [gossip.gossip] handleMessage -> DEBU 404b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.682 UTC [gossip.comm] Send -> DEBU 404e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 404f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4050 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4051 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4052 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4053 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4054 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [gossip.comm] func1 -> DEBU 4055 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [gossip.gossip] handleMessage -> DEBU 4056 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.686 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4058 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4059 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405a Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405b Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:48.694 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.695 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.698 UTC [gossip.comm] func1 -> DEBU 4060 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.698 UTC [msp] DeserializeIdentity -> DEBU 4061 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4062 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [gossip.comm] Send -> DEBU 4063 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4064 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4065 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4067 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4068 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4069 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 406c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [policies] Evaluate -> DEBU 406f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4070 0xc0040e7a20 gate 1563590448701695400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4071 0xc0040e7a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4072 0xc0040e7a20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4073 0xc0040e7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4074 0xc0040e7a20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4075 0xc0040e7a20 gate 1563590448701695400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4076 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4078 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4079 0xc0040fe260 gate 1563590448702099200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407a 0xc0040fe260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407b 0xc0040fe260 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407c 0xc0040fe260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407d 0xc0040fe260 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 407e 0xc0040fe260 gate 1563590448702099200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 407f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4082 0xc0040feaa0 gate 1563590448702416400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4083 0xc0040feaa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4084 0xc0040feaa0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4085 0xc0040feaa0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4088 0xc0040feaa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4089 0xc0040feaa0 gate 1563590448702416400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.703 UTC [policies] Evaluate -> DEBU 408d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.703 UTC [msp] DeserializeIdentity -> DEBU 408e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.706 UTC [msp] DeserializeIdentity -> DEBU 408f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4090 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4091 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4092 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4093 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4094 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [cauthdsl] func1 -> DEBU 4096 0xc004112270 gate 1563590448707849800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.707 UTC [cauthdsl] func2 -> DEBU 4097 0xc004112270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4098 0xc004112270 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4099 0xc004112270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 409a 0xc004112270 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409b 0xc004112270 gate 1563590448707849800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409f 0xc004112ab0 gate 1563590448708285200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a0 0xc004112ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a1 0xc004112ab0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a2 0xc004112ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a3 0xc004112ab0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a4 0xc004112ab0 gate 1563590448708285200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a8 0xc0041132f0 gate 1563590448708639300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a9 0xc0041132f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40aa 0xc0041132f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40ab 0xc0041132f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ac Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ad Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [cauthdsl] func2 -> DEBU 40ae 0xc0041132f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [cauthdsl] func1 -> DEBU 40af 0xc0041132f0 gate 1563590448708639300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.721 UTC [msp] DeserializeIdentity -> DEBU 40b4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40ba 0xc0041283d0 gate 1563590448723144800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0041283d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bc 0xc0041283d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bd 0xc0041283d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40be 0xc0041283d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40bf 0xc0041283d0 gate 1563590448723144800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c3 0xc004128c10 gate 1563590448723461300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c4 0xc004128c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c5 0xc004128c10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c6 0xc004128c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c7 0xc004128c10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c8 0xc004128c10 gate 1563590448723461300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40cc 0xc004129450 gate 1563590448723726100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cd 0xc004129450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40ce 0xc004129450 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cf 0xc004129450 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d0 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d1 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40d2 0xc004129450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40d3 0xc004129450 gate 1563590448723726100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40da Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40db Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40df Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40e4 0xc004133580 gate 1563590448724944600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40e5 0xc004133580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.725 UTC [cauthdsl] func2 -> DEBU 40e6 0xc004133580 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004133580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004133580 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40e9 0xc004133580 gate 1563590448724944600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ea Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40ed 0xc004133dc0 gate 1563590448727397200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.727 UTC [cauthdsl] func2 -> DEBU 40ee 0xc004133dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40ef 0xc004133dc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004133dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004133dc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [cauthdsl] func1 -> DEBU 40f2 0xc004133dc0 gate 1563590448727397200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.729 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004150600 gate 1563590448728648400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.729 UTC [cauthdsl] func2 -> DEBU 40f7 0xc004150600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.731 UTC [cauthdsl] func2 -> DEBU 40f8 0xc004150600 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40f9 0xc004150600 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fa Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +peer0.org1.example.com | 00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fb Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +peer0.org1.example.com | 00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +peer0.org1.example.com | 00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +peer0.org1.example.com | 00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +peer0.org1.example.com | 00000040 c6 3a 0c 54 03 2f |.:.T./|" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40fc 0xc004150600 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [cauthdsl] func1 -> DEBU 40fd 0xc004150600 gate 1563590448728648400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.732 UTC [policies] Evaluate -> DEBU 40fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 40ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4100 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4103 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4104 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4106 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4107 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4108 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4109 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func1 -> DEBU 410a 0xc004151dd0 gate 1563590448733828600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410b 0xc004151dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410c 0xc004151dd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410d 0xc004151dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410e 0xc004151dd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 410f 0xc004151dd0 gate 1563590448733828600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4110 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4112 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4113 0xc004162610 gate 1563590448734115800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4114 0xc004162610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4115 0xc004162610 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4116 0xc004162610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4117 0xc004162610 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4118 0xc004162610 gate 1563590448734115800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4119 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 411c 0xc004162e50 gate 1563590448734427300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411d 0xc004162e50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411e 0xc004162e50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411f 0xc004162e50 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4120 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4121 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4122 0xc004162e50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4123 0xc004162e50 gate 1563590448734427300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4124 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4126 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4127 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4128 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4129 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp] DeserializeIdentity -> DEBU 412f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [msp.identity] newIdentity -> DEBU 4130 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func1 -> DEBU 4131 0xc004172550 gate 1563590448735661200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4132 0xc004172550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4133 0xc004172550 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4134 0xc004172550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4135 0xc004172550 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 4136 0xc004172550 gate 1563590448735661200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4137 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 413a 0xc0041736d0 gate 1563590448738604100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413b 0xc0041736d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413c 0xc0041736d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 413d Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] Validate -> DEBU 413e MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [msp] getCertificationChain -> DEBU 413f MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 4140 0xc0041736d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4141 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4142 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [cauthdsl] func2 -> DEBU 4143 0xc0041736d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [cauthdsl] func1 -> DEBU 4144 0xc0041736d0 gate 1563590448738604100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4145 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4146 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4147 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4148 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 4149 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 414a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp] DeserializeIdentity -> DEBU 414b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414c Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +peer0.org1.example.com | 00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +peer0.org1.example.com | "2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414d Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +peer0.org1.example.com | 00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +peer0.org1.example.com | 00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +peer0.org1.example.com | 00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +peer0.org1.example.com | 00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414e Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +peer0.org1.example.com | 00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414f Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +peer0.org1.example.com | 00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +peer0.org1.example.com | 00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +peer0.org1.example.com | 00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +peer0.org1.example.com | 00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4150 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4151 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4152 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4153 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4154 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4158 0xc0041a23a0 gate 1563590448740710900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4159 0xc0041a23a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415a 0xc0041a23a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415b 0xc0041a23a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415c 0xc0041a23a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 415d 0xc0041a23a0 gate 1563590448740710900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4161 0xc0041a2be0 gate 1563590448740959800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4162 0xc0041a2be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4163 0xc0041a2be0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4164 0xc0041a2be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4165 0xc0041a2be0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4166 0xc0041a2be0 gate 1563590448740959800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4167 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4168 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 416a 0xc0041a3420 gate 1563590448741207600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416b 0xc0041a3420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416c 0xc0041a3420 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416d 0xc0041a3420 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416e Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +peer0.org1.example.com | 00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416f Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +peer0.org1.example.com | 00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +peer0.org1.example.com | 00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +peer0.org1.example.com | 00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +peer0.org1.example.com | 00000040 5d 44 00 4b 5c 2a |]D.K\*|" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4170 0xc0041a3420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4171 0xc0041a3420 gate 1563590448741207600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4172 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4173 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4177 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4178 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 417e 0xc0041b2bf0 gate 1563590448742219200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 417f 0xc0041b2bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4180 0xc0041b2bf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4181 0xc0041b2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4182 0xc0041b2bf0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4183 0xc0041b2bf0 gate 1563590448742219200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4187 0xc0041b3430 gate 1563590448742640000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4188 0xc0041b3430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4189 0xc0041b3430 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418a 0xc0041b3430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418b 0xc0041b3430 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 418c 0xc0041b3430 gate 1563590448742640000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4190 0xc0041b3c70 gate 1563590448742879200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4191 0xc0041b3c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4192 0xc0041b3c70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4193 0xc0041b3c70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4194 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4195 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 4196 0xc0041b3c70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 4197 0xc0041b3c70 gate 1563590448742879200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4198 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4199 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [msp] DeserializeIdentity -> DEBU 419c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a2 0xc0041c6d50 gate 1563590448744544700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a3 0xc0041c6d50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a4 0xc0041c6d50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a5 0xc0041c6d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a6 0xc0041c6d50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a7 0xc0041c6d50 gate 1563590448744544700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41ab 0xc0041c7590 gate 1563590448744793600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ac 0xc0041c7590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ad 0xc0041c7590 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ae 0xc0041c7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41af 0xc0041c7590 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41b0 0xc0041c7590 gate 1563590448744793600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [cauthdsl] func1 -> DEBU 41b4 0xc0041c7dd0 gate 1563590448745079700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:48.745 UTC [cauthdsl] func2 -> DEBU 41b5 0xc0041c7dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b6 0xc0041c7dd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b7 0xc0041c7dd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.746 UTC [msp.identity] Verify -> DEBU 41b8 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [msp.identity] Verify -> DEBU 41b9 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [cauthdsl] func2 -> DEBU 41ba 0xc0041c7dd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [cauthdsl] func1 -> DEBU 41bb 0xc0041c7dd0 gate 1563590448745079700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:48.747 UTC [gossip.gossip] handleMessage -> DEBU 41c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [gossip.pull] Hello -> DEBU 41c3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] Send -> DEBU 41c6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.757 UTC [gossip.gossip] handleMessage -> DEBU 41c9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.758 UTC [gossip.pull] HandleMessage -> DEBU 41ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.758 UTC [gossip.gossip] handleMessage -> DEBU 41cb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.842 UTC [gossip.gossip] handleMessage -> DEBU 41cc Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41cd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41ce Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41cf Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41d0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.852 UTC [gossip.comm] func1 -> DEBU 41d1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d2 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d3 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d6 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d7 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:48.857 UTC [msp] DeserializeIdentity -> DEBU 41d8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.857 UTC [gossip.gossip] handleMessage -> DEBU 41d9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.859 UTC [gossip.comm] func1 -> DEBU 41da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [gossip.gossip] handleMessage -> DEBU 41db Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dc Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dd Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:48.862 UTC [msp] DeserializeIdentity -> DEBU 41de Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:48.862 UTC [gossip.gossip] handleMessage -> DEBU 41df Exiting" +peer0.org1.example.com | "2019-07-20 02:40:48.899 UTC [gossip.gossip] handleMessage -> DEBU 41e0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.900 UTC [gossip.pull] HandleMessage -> DEBU 41e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:48.901 UTC [gossip.pull] SendDigest -> DEBU 41e2 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:48.901 UTC [gossip.gossip] handleMessage -> DEBU 41e3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:49.008 UTC [gossip.comm] func1 -> DEBU 41e4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.009 UTC [gossip.gossip] handleMessage -> DEBU 41e5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.009 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.010 UTC [gossip.gossip] handleMessage -> DEBU 41e9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:49.013 UTC [gossip.comm] func1 -> DEBU 41ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.013 UTC [gossip.gossip] handleMessage -> DEBU 41eb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [msp] DeserializeIdentity -> DEBU 41ec Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [cauthdsl] func1 -> DEBU 41f3 0xc00421c6e0 gate 1563590449015768400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.015 UTC [cauthdsl] func2 -> DEBU 41f4 0xc00421c6e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f5 0xc00421c6e0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f6 0xc00421c6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f7 0xc00421c6e0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [cauthdsl] func1 -> DEBU 41f8 0xc00421c6e0 gate 1563590449015768400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.016 UTC [policies] Evaluate -> DEBU 41f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func1 -> DEBU 41fc 0xc00421cf20 gate 1563590449017318300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fd 0xc00421cf20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fe 0xc00421cf20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41ff 0xc00421cf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 4200 0xc00421cf20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4201 0xc00421cf20 gate 1563590449017318300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4205 0xc00421d760 gate 1563590449018686100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.018 UTC [cauthdsl] func2 -> DEBU 4206 0xc00421d760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4207 0xc00421d760 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4208 0xc00421d760 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 4209 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 420a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [cauthdsl] func2 -> DEBU 420b 0xc00421d760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [cauthdsl] func1 -> DEBU 420c 0xc00421d760 gate 1563590449018686100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [msp] DeserializeIdentity -> DEBU 4211 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.021 UTC [gossip.gossip] handleMessage -> DEBU 4212 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [gossip.comm] func1 -> DEBU 4213 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [gossip.gossip] handleMessage -> DEBU 4214 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.022 UTC [msp] DeserializeIdentity -> DEBU 4215 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4216 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4217 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4218 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 4219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func1 -> DEBU 421c 0xc00422d230 gate 1563590449023690300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421d 0xc00422d230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421e 0xc00422d230 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421f 0xc00422d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4220 0xc00422d230 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4221 0xc00422d230 gate 1563590449023690300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4222 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4223 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4224 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4225 0xc00422da70 gate 1563590449024695200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4226 0xc00422da70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4227 0xc00422da70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4228 0xc00422da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4229 0xc00422da70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422a 0xc00422da70 gate 1563590449024695200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422e 0xc0042442b0 gate 1563590449025626500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 422f 0xc0042442b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4230 0xc0042442b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4231 0xc0042442b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4232 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4233 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [cauthdsl] func2 -> DEBU 4234 0xc0042442b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [cauthdsl] func1 -> DEBU 4235 0xc0042442b0 gate 1563590449025626500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4236 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4237 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4238 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4239 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [msp] DeserializeIdentity -> DEBU 423a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.027 UTC [gossip.gossip] handleMessage -> DEBU 423b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:49.146 UTC [gossip.comm] func1 -> DEBU 423c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.147 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.147 UTC [msp] DeserializeIdentity -> DEBU 423e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 423f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.148 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:49.159 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.159 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:49.160 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4245 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4246 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4248 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4249 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.162 UTC [cauthdsl] func1 -> DEBU 424b 0xc004245d80 gate 1563590449162855900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424c 0xc004245d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424d 0xc004245d80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424e 0xc004245d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [cauthdsl] func2 -> DEBU 424f 0xc004245d80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [cauthdsl] func1 -> DEBU 4250 0xc004245d80 gate 1563590449162855900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4251 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4252 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4253 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.165 UTC [cauthdsl] func1 -> DEBU 4254 0xc00426a5c0 gate 1563590449165223100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.165 UTC [cauthdsl] func2 -> DEBU 4255 0xc00426a5c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4256 0xc00426a5c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4257 0xc00426a5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4258 0xc00426a5c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.166 UTC [cauthdsl] func1 -> DEBU 4259 0xc00426a5c0 gate 1563590449165223100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func1 -> DEBU 425d 0xc00426ae00 gate 1563590449168326000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425e 0xc00426ae00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425f 0xc00426ae00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [cauthdsl] func2 -> DEBU 4260 0xc00426ae00 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4261 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4262 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [cauthdsl] func2 -> DEBU 4263 0xc00426ae00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [cauthdsl] func1 -> DEBU 4264 0xc00426ae00 gate 1563590449168326000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:49.170 UTC [policies] Evaluate -> DEBU 4265 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4267 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:49.172 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:49.172 UTC [gossip.gossip] handleMessage -> DEBU 426a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.comm] func1 -> DEBU 426b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 426e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 426f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func1 -> DEBU 4277 0xc0042881f0 gate 1563590451934376800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4278 0xc0042881f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4279 0xc0042881f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427a 0xc0042881f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427b 0xc0042881f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 427c 0xc0042881f0 gate 1563590451934376800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4280 0xc004288a30 gate 1563590451939377300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4281 0xc004288a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4282 0xc004288a30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4283 0xc004288a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4284 0xc004288a30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4285 0xc004288a30 gate 1563590451939377300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4286 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4287 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4289 0xc004289270 gate 1563590451940033300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428a 0xc004289270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428b 0xc004289270 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428c 0xc004289270 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428d Verify: digest = 00000000 fe b5 10 6f 4b 6c 86 45 a2 e0 2d f2 5e ee 45 a8 |...oKl.E..-.^.E.| +peer0.org1.example.com | 00000010 c3 67 ab 53 5c a7 f3 35 ea 66 82 2a c9 1a b1 e5 |.g.S\..5.f.*....|" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428e Verify: sig = 00000000 30 44 02 20 49 3a 0d e2 dd 57 ea c9 f8 6c bb 8b |0D. I:...W...l..| +peer0.org1.example.com | 00000010 b0 df f7 01 71 8e b4 67 e0 85 ba cc 62 62 0c 00 |....q..g....bb..| +peer0.org1.example.com | 00000020 bf 58 f7 72 02 20 10 4b 5b d0 1d 18 dd 6e 7f 09 |.X.r. .K[....n..| +peer0.org1.example.com | 00000030 a8 5a 2d a2 67 fa a0 ce a3 55 74 79 9f 76 b9 86 |.Z-.g....Uty.v..| +peer0.org1.example.com | 00000040 0d f5 5a 69 c7 57 |..Zi.W|" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428f 0xc004289270 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4290 0xc004289270 gate 1563590451940033300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4291 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4292 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4293 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4294 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 4295 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4296 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4297 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4298 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4299 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 429a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 429b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.948 UTC [gossip.discovery] sendMemResponse -> DEBU 429c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] Send -> DEBU 42a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.discovery] sendMemResponse -> DEBU 42a1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.951 UTC [gossip.comm] func1 -> DEBU 42a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.951 UTC [gossip.gossip] handleMessage -> DEBU 42a6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.pull] HandleMessage -> DEBU 42a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42aa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.pull] SendDigest -> DEBU 42ae Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:51.952 UTC [gossip.gossip] handleMessage -> DEBU 42af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] IsLeader -> DEBU 42b1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp] GetDefaultSigningIdentity -> DEBU 42b2 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100F1801 " +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b4 Sign: digest: 856682469DC7D1E9347963F414AE0038209189ADEBB806E700FC601EF802B0D4 " +peer0.org1.example.com | "2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42b9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] Send -> DEBU 42ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42be Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42c2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:51.992 UTC [msp] DeserializeIdentity -> DEBU 42c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func1 -> DEBU 42ca 0xc0042c8620 gate 1563590451993384600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0042c8620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0042c8620 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cd 0xc0042c8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42ce 0xc0042c8620 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42cf 0xc0042c8620 gate 1563590451993384600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42d3 0xc0042c8e60 gate 1563590451995584800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0042c8e60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0042c8e60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d6 0xc0042c8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d7 0xc0042c8e60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42d8 0xc0042c8e60 gate 1563590451995584800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42dc 0xc0042c96a0 gate 1563590451996956400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0042c96a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42de 0xc0042c96a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42df 0xc0042c96a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e0 Verify: digest = 00000000 07 65 f8 b1 46 c6 71 bc 91 63 50 c6 61 e6 b3 0b |.e..F.q..cP.a...| +peer0.org1.example.com | 00000010 a3 db 09 f6 ea e5 83 3f 51 8b 3e fc 4c 29 55 92 |.......?Q.>.L)U.|" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e1 Verify: sig = 00000000 30 45 02 21 00 d4 75 c4 4b 1d b3 ed 99 a8 76 08 |0E.!..u.K.....v.| +peer0.org1.example.com | 00000010 1a 73 87 c0 4c f3 1d d3 80 c8 f5 bd 83 b8 96 64 |.s..L..........d| +peer0.org1.example.com | 00000020 b0 85 bf 62 5c 02 20 64 c7 e6 be ea c5 6b ca bf |...b\. d.....k..| +peer0.org1.example.com | 00000030 bc f6 48 a6 f1 ce a6 12 ff 4f 6b 90 22 f4 d5 2b |..H......Ok."..+| +peer0.org1.example.com | 00000040 f8 91 6e 2e f1 09 c8 |..n....|" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42e2 0xc0042c96a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [cauthdsl] func1 -> DEBU 42e3 0xc0042c96a0 gate 1563590451996956400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 42e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ea updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:51.998 UTC [gossip.comm] func1 -> DEBU 42eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.998 UTC [gossip.gossip] handleMessage -> DEBU 42ec Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.999 UTC [gossip.comm] func1 -> DEBU 42ed Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ee Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42f0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.002 UTC [gossip.gossip] handleMessage -> DEBU 42f8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.009 UTC [msp] DeserializeIdentity -> DEBU 42fa Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42fe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42ff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 4300 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] Send -> DEBU 4301 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4302 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4303 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4304 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4305 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.013 UTC [gossip.comm] Send -> DEBU 4306 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4307 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.237 UTC [gossip.pull] Hello -> DEBU 4309 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.242 UTC [gossip.comm] sendToEndpoint -> DEBU 430f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4310 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4312 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4313 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4314 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4315 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.pull] HandleMessage -> DEBU 4316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4317 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.246 UTC [gossip.comm] func1 -> DEBU 4318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 4319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.pull] HandleMessage -> DEBU 431a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 431b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.comm] func1 -> DEBU 431c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.pull] HandleMessage -> DEBU 431e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 4320 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151032 " +peer0.org1.example.com | "2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4322 Sign: digest: 9C399936F2F49BE9EE217CAB54B263EC9A942EB44DBB2EC94B19A5389E400421 " +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 4323 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4329 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 432a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 4330 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.284 UTC [gossip.comm] func1 -> DEBU 4331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4332 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4333 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4334 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4335 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4336 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.286 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4338 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4339 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] isSentByMe -> DEBU 433b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [msp] DeserializeIdentity -> DEBU 433e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 433f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4340 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4341 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 4345 0xc00432a3d0 gate 1563590452288537200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4346 0xc00432a3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4347 0xc00432a3d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4348 0xc00432a3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4349 0xc00432a3d0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 434a 0xc00432a3d0 gate 1563590452288537200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 434b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 434e 0xc00432ac10 gate 1563590452289139200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 434f 0xc00432ac10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4350 0xc00432ac10 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4351 0xc00432ac10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4352 0xc00432ac10 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 4353 0xc00432ac10 gate 1563590452289139200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4354 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4355 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4356 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.290 UTC [cauthdsl] func1 -> DEBU 4357 0xc00432b450 gate 1563590452290015700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4358 0xc00432b450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4359 0xc00432b450 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 435a 0xc00432b450 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435b Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| +peer0.org1.example.com | 00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435c Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| +peer0.org1.example.com | 00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| +peer0.org1.example.com | 00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| +peer0.org1.example.com | 00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| +peer0.org1.example.com | 00000040 6c 39 6d f0 af 9f 8c |l9m....|" +peer0.org1.example.com | "2019-07-20 02:40:52.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 435d Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151033 " +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435f Sign: digest: 56A37E8BD80FA015C713558FB7A1BEA1925B1592315D72A856BE5481C7611A3C " +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4360 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4361 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4362 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4363 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:52.295 UTC [cauthdsl] func2 -> DEBU 4364 0xc00432b450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [cauthdsl] func1 -> DEBU 4365 0xc00432b450 gate 1563590452290015700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4368 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4369 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 436a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [msp] DeserializeIdentity -> DEBU 436d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 436f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4370 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4371 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4372 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4373 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4374 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4375 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.303 UTC [policies] Evaluate -> DEBU 4376 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4377 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4378 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4379 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437a Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437b Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.308 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4380 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4381 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4382 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4383 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +peer0.org1.example.com | "2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4384 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" +peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4385 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4386 Verify: sig = 00000000 30 45 02 21 00 ac e9 d3 31 c4 59 f7 8f ee 15 fd |0E.!....1.Y.....| +peer0.org1.example.com | 00000010 b8 35 b1 54 7e ca e3 c1 6f b0 7c f1 ca 95 16 93 |.5.T~...o.|.....| +peer0.org1.example.com | 00000020 0d 42 7c 4b b6 02 20 5a 8c 15 17 d8 aa 34 2b 40 |.B|K.. Z.....4+@| +peer0.org1.example.com | 00000030 bf 17 cc fb 27 00 a9 b8 a7 2c c2 90 68 f0 48 93 |....'....,..h.H.| +peer0.org1.example.com | 00000040 6f fc 6c b0 0f fb 9e |o.l....|" +peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [gossip.discovery] handleAliveMessage -> DEBU 4387 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.310 UTC [gossip.discovery] isSentByMe -> DEBU 4388 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 4389 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 438c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.312 UTC [msp.identity] Verify -> DEBU 438d Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +peer0.org1.example.com | 00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +peer0.org1.example.com | "2019-07-20 02:40:52.313 UTC [msp.identity] Verify -> DEBU 438e Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +peer0.org1.example.com | 00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +peer0.org1.example.com | 00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +peer0.org1.example.com | 00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +peer0.org1.example.com | 00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 438f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.gossip] handleMessage -> DEBU 4390 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 4391 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.320 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4392 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4393 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +peer0.org1.example.com | 00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +peer0.org1.example.com | "2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4394 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +peer0.org1.example.com | 00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +peer0.org1.example.com | 00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +peer0.org1.example.com | 00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +peer0.org1.example.com | 00000040 ca ca 4e 05 58 db b7 |..N.X..|" +peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4395 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] isSentByMe -> DEBU 4396 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4397 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4398 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.340 UTC [gossip.gossip] handleMessage -> DEBU 4399 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.pull] HandleMessage -> DEBU 439a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.pull] SendDigest -> DEBU 439b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 439f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43a0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a1 Verify: digest = 00000000 93 a9 43 89 ee 0d 68 00 49 2b fd 2d 56 38 2f d9 |..C...h.I+.-V8/.| +peer0.org1.example.com | 00000010 60 a6 e5 51 a4 21 d6 e7 3d 91 2b 47 dd 19 5f b9 |`..Q.!..=.+G.._.|" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a2 Verify: sig = 00000000 30 45 02 21 00 d8 78 12 32 3a 72 01 c6 8e c3 5b |0E.!..x.2:r....[| +peer0.org1.example.com | 00000010 49 22 72 f1 b7 94 1f 40 54 b7 4d 71 54 dd eb c3 |I"r....@T.MqT...| +peer0.org1.example.com | 00000020 83 16 b9 03 67 02 20 45 12 b8 8f 7f e7 b1 3b 32 |....g. E......;2| +peer0.org1.example.com | 00000030 d2 3e fd cb 57 4a 00 2d de d8 c1 a0 c0 eb 52 12 |.>..WJ.-......R.| +peer0.org1.example.com | 00000040 c3 b9 f7 69 80 1a c3 |...i...|" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43aa Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ac Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ad Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.350 UTC [msp] DeserializeIdentity -> DEBU 43b5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43b8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43ba Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43be Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43c0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43c1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43c2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c3 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c4 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" +peer0.org1.example.com | "2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:52.366 UTC [msp.identity] Verify -> DEBU 43c6 Verify: sig = 00000000 30 45 02 21 00 fc 90 ff 73 60 f4 91 6a f6 d9 05 |0E.!....s`..j...| +peer0.org1.example.com | 00000010 be ba 76 e7 61 fe 1c 20 09 c2 f2 59 7e 3f 03 fc |..v.a.. ...Y~?..| +peer0.org1.example.com | 00000020 3f 34 b3 11 5c 02 20 70 8d ab 3f a6 3f 02 0f d4 |?4..\. p..?.?...| +peer0.org1.example.com | 00000030 f2 e8 6e 66 09 5b 59 5e 0a d8 84 09 03 5f 30 41 |..nf.[Y^....._0A| +peer0.org1.example.com | 00000040 cd d0 97 4d 87 3e 7b |...M.>{|" +peer0.org1.example.com | "2019-07-20 02:40:52.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 43c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43ca Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 43cd Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.discovery] sendMemResponse -> DEBU 43cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.367 UTC [gossip.comm] Send -> DEBU 43d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.discovery] sendMemResponse -> DEBU 43d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > alive: " +peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.comm] func1 -> DEBU 43d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [msp] DeserializeIdentity -> DEBU 43db Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43de Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e2 0xc0043ca7a0 gate 1563590452532372000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0043ca7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0043ca7a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0043ca7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e6 0xc0043ca7a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e7 0xc0043ca7a0 gate 1563590452532372000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43eb 0xc0043cafe0 gate 1563590452532767400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0043cafe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0043cafe0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ee 0xc0043cafe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ef 0xc0043cafe0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43f0 0xc0043cafe0 gate 1563590452532767400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43f4 0xc0043cb820 gate 1563590452533072400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0043cb820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0043cb820 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0043cb820 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f8 Verify: digest = 00000000 51 64 1f 03 f0 44 db ad 52 2d e9 8b 79 01 5f fe |Qd...D..R-..y._.| +peer0.org1.example.com | 00000010 2e 1a 82 e8 77 5d 22 1d 38 4e 11 32 9b 23 38 50 |....w]".8N.2.#8P|" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f9 Verify: sig = 00000000 30 45 02 21 00 f8 2b 92 2d c8 e1 19 63 85 e4 03 |0E.!..+.-...c...| +peer0.org1.example.com | 00000010 5d c3 86 3d 87 46 73 64 82 8d 98 40 32 96 93 e0 |]..=.Fsd...@2...| +peer0.org1.example.com | 00000020 86 5e 77 4a 3e 02 20 0f ab df 7f 75 cf 31 34 a3 |.^wJ>. ....u.14.| +peer0.org1.example.com | 00000030 7e 0a d3 af d1 87 2e d8 cf cb b4 45 ef 91 da 84 |~..........E....| +peer0.org1.example.com | 00000040 b8 69 c9 aa 31 63 c4 |.i..1c.|" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43fa 0xc0043cb820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43fb 0xc0043cb820 gate 1563590452533072400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4400 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4401 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4402 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4403 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4404 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4405 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4406 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4407 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4408 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4409 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440b Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4410 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4411 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4412 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4413 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4414 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4415 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4416 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4417 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4419 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.541 UTC [gossip.comm] func1 -> DEBU 441a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.comm] func1 -> DEBU 441f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4420 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4421 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4422 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4423 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [msp] DeserializeIdentity -> DEBU 4424 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4425 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4426 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4427 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4429 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 442a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func1 -> DEBU 442b 0xc0043e5df0 gate 1563590452586824100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442c 0xc0043e5df0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442d 0xc0043e5df0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442e 0xc0043e5df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442f 0xc0043e5df0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4430 0xc0043e5df0 gate 1563590452586824100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4431 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4432 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4433 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4434 0xc004400630 gate 1563590452587606200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4435 0xc004400630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4436 0xc004400630 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4437 0xc004400630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4438 0xc004400630 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4439 0xc004400630 gate 1563590452587606200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func1 -> DEBU 443d 0xc004400e70 gate 1563590452588208500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443e 0xc004400e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443f 0xc004400e70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 4440 0xc004400e70 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4441 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| +peer0.org1.example.com | 00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" +peer0.org1.example.com | "2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4442 Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| +peer0.org1.example.com | 00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| +peer0.org1.example.com | 00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| +peer0.org1.example.com | 00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| +peer0.org1.example.com | 00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [cauthdsl] func2 -> DEBU 4443 0xc004400e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [cauthdsl] func1 -> DEBU 4444 0xc004400e70 gate 1563590452588208500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4447 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4448 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4449 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 444f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4450 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [gossip.discovery] sendMemResponse -> DEBU 4451 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:52.591 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4454 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.592 UTC [gossip.comm] Send -> DEBU 4455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU 4456 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4458 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.comm] func1 -> DEBU 4459 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 445a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.pull] HandleMessage -> DEBU 445b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4460 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4461 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.pull] SendDigest -> DEBU 4462 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 4463 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.682 UTC [msp] DeserializeIdentity -> DEBU 4464 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [msp] DeserializeIdentity -> DEBU 4465 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] Send -> DEBU 4466 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4467 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4468 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4469 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 446a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 446b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] func1 -> DEBU 446c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.gossip] handleMessage -> DEBU 446d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 4476 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [gossip.comm] func1 -> DEBU 4477 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4478 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 4479 0xc00442b6a0 gate 1563590452693436200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447a 0xc00442b6a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447b 0xc00442b6a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447c 0xc00442b6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447d 0xc00442b6a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 447e 0xc00442b6a0 gate 1563590452693436200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 447f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [cauthdsl] func1 -> DEBU 4482 0xc00442bee0 gate 1563590452694203000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.694 UTC [cauthdsl] func2 -> DEBU 4483 0xc00442bee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4484 0xc00442bee0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4485 0xc00442bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4486 0xc00442bee0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 4487 0xc00442bee0 gate 1563590452694203000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 448a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 448b 0xc004448720 gate 1563590452696747100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448c 0xc004448720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448d 0xc004448720 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 448e 0xc004448720 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 448f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 4490 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 4491 0xc004448720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [cauthdsl] func1 -> DEBU 4492 0xc004448720 gate 1563590452696747100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.697 UTC [policies] Evaluate -> DEBU 4493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4495 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4497 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4498 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 4499 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 449a Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 449d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.700 UTC [cauthdsl] func1 -> DEBU 44a3 0xc00445cd30 gate 1563590452700818900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a4 0xc00445cd30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a5 0xc00445cd30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a6 0xc00445cd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a7 0xc00445cd30 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.701 UTC [cauthdsl] func1 -> DEBU 44a8 0xc00445cd30 gate 1563590452700818900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func1 -> DEBU 44ac 0xc00445d570 gate 1563590452702591600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ad 0xc00445d570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ae 0xc00445d570 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44af 0xc00445d570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func2 -> DEBU 44b0 0xc00445d570 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b1 0xc00445d570 gate 1563590452702591600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b5 0xc00445ddb0 gate 1563590452703782000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b6 0xc00445ddb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b7 0xc00445ddb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b8 0xc00445ddb0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44b9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44ba Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [cauthdsl] func2 -> DEBU 44bb 0xc00445ddb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [cauthdsl] func1 -> DEBU 44bc 0xc00445ddb0 gate 1563590452703782000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.707 UTC [policies] Evaluate -> DEBU 44c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44cc 0xc0044738c0 gate 1563590452708236700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cd 0xc0044738c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44ce 0xc0044738c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cf 0xc0044738c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0044738c0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44d1 0xc0044738c0 gate 1563590452708236700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44d5 0xc004486100 gate 1563590452709247200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d6 0xc004486100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d7 0xc004486100 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d8 0xc004486100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d9 0xc004486100 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44da 0xc004486100 gate 1563590452709247200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func1 -> DEBU 44de 0xc004486940 gate 1563590452710265500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44df 0xc004486940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e0 0xc004486940 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e1 0xc004486940 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.711 UTC [msp.identity] Verify -> DEBU 44e2 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:52.712 UTC [msp.identity] Verify -> DEBU 44e3 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:52.712 UTC [cauthdsl] func2 -> DEBU 44e4 0xc004486940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [cauthdsl] func1 -> DEBU 44e5 0xc004486940 gate 1563590452710265500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44ea Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44eb Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ec Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ed Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ef Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func1 -> DEBU 44f6 0xc004496f50 gate 1563590452716433600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f7 0xc004496f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f8 0xc004496f50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f9 0xc004496f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 44fa 0xc004496f50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44fb 0xc004496f50 gate 1563590452716433600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44ff 0xc004497790 gate 1563590452717497000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4500 0xc004497790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4501 0xc004497790 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4502 0xc004497790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4503 0xc004497790 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 4504 0xc004497790 gate 1563590452717497000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4505 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func1 -> DEBU 4508 0xc004497fd0 gate 1563590452718293100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 4509 0xc004497fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450a 0xc004497fd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450b 0xc004497fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450c Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450d Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [cauthdsl] func2 -> DEBU 450e 0xc004497fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [cauthdsl] func1 -> DEBU 450f 0xc004497fd0 gate 1563590452718293100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4512 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4514 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4515 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4516 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4517 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4518 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4519 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 451f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4520 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func1 -> DEBU 4522 0xc0044c2820 gate 1563590452722251500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4523 0xc0044c2820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4524 0xc0044c2820 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4525 0xc0044c2820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4526 0xc0044c2820 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 4527 0xc0044c2820 gate 1563590452722251500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4528 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4529 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 452a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 452b 0xc0044c3060 gate 1563590452723773300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 452c 0xc0044c3060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452d 0xc0044c3060 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452e 0xc0044c3060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452f 0xc0044c3060 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [cauthdsl] func1 -> DEBU 4530 0xc0044c3060 gate 1563590452723773300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.724 UTC [policies] Evaluate -> DEBU 4531 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4532 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4533 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func1 -> DEBU 4534 0xc0044c38a0 gate 1563590452725580700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4535 0xc0044c38a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4536 0xc0044c38a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4537 0xc0044c38a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4538 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4539 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [cauthdsl] func2 -> DEBU 453a 0xc0044c38a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [cauthdsl] func1 -> DEBU 453b 0xc0044c38a0 gate 1563590452725580700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.727 UTC [msp] DeserializeIdentity -> DEBU 4540 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [msp] DeserializeIdentity -> DEBU 4541 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4542 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4543 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4544 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4547 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func1 -> DEBU 4548 0xc0044d5070 gate 1563590452729448900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 4549 0xc0044d5070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 454a 0xc0044d5070 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454b 0xc0044d5070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454c 0xc0044d5070 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 454d 0xc0044d5070 gate 1563590452729448900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 4550 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 4551 0xc0044d58b0 gate 1563590452730738200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4552 0xc0044d58b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4553 0xc0044d58b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4554 0xc0044d58b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4555 0xc0044d58b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 4556 0xc0044d58b0 gate 1563590452730738200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4557 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4558 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4559 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 455a 0xc0044ee0f0 gate 1563590452731709400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455b 0xc0044ee0f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455c 0xc0044ee0f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:52.732 UTC [cauthdsl] func2 -> DEBU 455d 0xc0044ee0f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.732 UTC [msp.identity] Verify -> DEBU 455e Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [msp.identity] Verify -> DEBU 455f Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [cauthdsl] func2 -> DEBU 4560 0xc0044ee0f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [cauthdsl] func1 -> DEBU 4561 0xc0044ee0f0 gate 1563590452731709400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4562 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4563 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4564 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4565 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:52.734 UTC [gossip.gossip] handleMessage -> DEBU 4566 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4567 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4568 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.758 UTC [gossip.pull] Hello -> DEBU 4569 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] Send -> DEBU 456c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 456f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.pull] HandleMessage -> DEBU 4570 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 4571 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.843 UTC [gossip.gossip] handleMessage -> DEBU 4572 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.844 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.845 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:52.845 UTC [gossip.gossip] handleMessage -> DEBU 4575 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:52.900 UTC [gossip.gossip] handleMessage -> DEBU 4576 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.pull] HandleMessage -> DEBU 4577 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.pull] SendDigest -> DEBU 4578 Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:52.901 UTC [gossip.gossip] handleMessage -> DEBU 4579 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:53.012 UTC [gossip.comm] func1 -> DEBU 457a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:53.013 UTC [gossip.gossip] handleMessage -> DEBU 457b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.015 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.015 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [gossip.comm] func1 -> DEBU 4580 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [gossip.gossip] handleMessage -> DEBU 4581 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:53.148 UTC [msp] DeserializeIdentity -> DEBU 4582 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.151 UTC [msp] DeserializeIdentity -> DEBU 4583 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.152 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:53.152 UTC [gossip.gossip] handleMessage -> DEBU 4585 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.938 UTC [gossip.comm] func1 -> DEBU 4586 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4587 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4588 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4589 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [msp] DeserializeIdentity -> DEBU 458b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 458c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 458f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4590 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4591 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4592 0xc004507d60 gate 1563590455940519200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4593 0xc004507d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4594 0xc004507d60 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4595 0xc004507d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4596 0xc004507d60 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4597 0xc004507d60 gate 1563590455940519200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4598 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4599 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 459a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 459b 0xc0045225a0 gate 1563590455940934400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459c 0xc0045225a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459d 0xc0045225a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459e 0xc0045225a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459f 0xc0045225a0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a0 0xc0045225a0 gate 1563590455940934400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a4 0xc004522de0 gate 1563590455941246400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a5 0xc004522de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a6 0xc004522de0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45a7 0xc004522de0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a8 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| +peer0.org1.example.com | 00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a9 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| +peer0.org1.example.com | 00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| +peer0.org1.example.com | 00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| +peer0.org1.example.com | 00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| +peer0.org1.example.com | 00000040 94 ae 7c fe f6 e1 |..|...|" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45aa 0xc004522de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [cauthdsl] func1 -> DEBU 45ab 0xc004522de0 gate 1563590455941246400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.discovery] sendMemResponse -> DEBU 45b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] Send -> DEBU 45bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45be Exiting" +peer0.org1.example.com | "2019-07-20 02:40:55.951 UTC [gossip.discovery] sendMemResponse -> DEBU 45bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " +peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.comm] func1 -> DEBU 45c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.gossip] handleMessage -> DEBU 45c1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.956 UTC [gossip.pull] HandleMessage -> DEBU 45c2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [gossip.pull] SendDigest -> DEBU 45c9 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:55.957 UTC [gossip.gossip] handleMessage -> DEBU 45ca Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45cc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.comm] func1 -> DEBU 45d7 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45d8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.pull] HandleMessage -> DEBU 45d9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45da Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.comm] func1 -> DEBU 45db Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.pull] HandleMessage -> DEBU 45dd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45de Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45df Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.pull] HandleMessage -> DEBU 45e0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45e1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e2 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151034 " +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e4 Sign: digest: B72C93CD94D2623F267EB63F6E6CA421F900643012C818FE189705252CFDEF4B " +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e5 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45e8 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45e9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ea Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45eb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ec Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45f0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f2 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f3 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45f6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.comm] func1 -> DEBU 45f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.comm] func1 -> DEBU 45f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fa Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fb Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fd Verify: sig = 00000000 30 44 02 20 5c 6a c8 38 0b 2a 2d ca 3c df 1a 6e |0D. \j.8.*-.<..n| +peer0.org1.example.com | 00000010 b0 94 b2 07 cd 05 94 39 12 2c d3 e9 7d 61 6e 59 |.......9.,..}anY| +peer0.org1.example.com | 00000020 29 d8 a4 18 02 20 21 f4 05 d6 78 ec d3 77 33 89 |).... !...x..w3.| +peer0.org1.example.com | 00000030 2f db cb 10 5c 45 02 7a 54 8b a2 e1 5d 1d 4a 91 |/...\E.zT...].J.| +peer0.org1.example.com | 00000040 83 99 84 4f f2 07 |...O..|" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 45fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] isSentByMe -> DEBU 45ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 4600 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4601 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4602 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4603 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4604 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4605 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 4608 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] isSentByMe -> DEBU 4609 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 460a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 460b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [msp] DeserializeIdentity -> DEBU 460c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 460d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.286 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4611 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4612 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4613 0xc004590b20 gate 1563590456287229700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4614 0xc004590b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4615 0xc004590b20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4616 0xc004590b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4617 0xc004590b20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4618 0xc004590b20 gate 1563590456287229700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4619 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 461c 0xc004591360 gate 1563590456287552100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461d 0xc004591360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461e 0xc004591360 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461f 0xc004591360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4620 0xc004591360 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4621 0xc004591360 gate 1563590456287552100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4625 0xc004591ba0 gate 1563590456287800000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4626 0xc004591ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4627 0xc004591ba0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4628 0xc004591ba0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 4629 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| +peer0.org1.example.com | 00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" +peer0.org1.example.com | "2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 462a Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| +peer0.org1.example.com | 00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| +peer0.org1.example.com | 00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| +peer0.org1.example.com | 00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| +peer0.org1.example.com | 00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [cauthdsl] func2 -> DEBU 462b 0xc004591ba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [cauthdsl] func1 -> DEBU 462c 0xc004591ba0 gate 1563590456287800000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 4630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4631 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4632 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4633 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4634 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4635 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4636 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4637 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4638 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4639 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] handleMessage -> DEBU 463a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 463b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463c Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +peer0.org1.example.com | 00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +peer0.org1.example.com | "2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463d Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +peer0.org1.example.com | 00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +peer0.org1.example.com | 00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +peer0.org1.example.com | 00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +peer0.org1.example.com | 00000040 86 01 4f b2 60 e9 82 |..O.`..|" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463f Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4640 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4641 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +peer0.org1.example.com | 00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4642 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +peer0.org1.example.com | 00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +peer0.org1.example.com | 00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +peer0.org1.example.com | 00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +peer0.org1.example.com | 00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4643 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] isSentByMe -> DEBU 4644 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4645 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4646 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 464e 0xc0045c1640 gate 1563590456289653200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 464f 0xc0045c1640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4650 0xc0045c1640 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4651 0xc0045c1640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4652 0xc0045c1640 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4653 0xc0045c1640 gate 1563590456289653200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4657 0xc0045c1e80 gate 1563590456289889200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4658 0xc0045c1e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4659 0xc0045c1e80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 465a 0xc0045c1e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 465b 0xc0045c1e80 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 465c 0xc0045c1e80 gate 1563590456289889200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4660 0xc0045d46c0 gate 1563590456290124200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4661 0xc0045d46c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4662 0xc0045d46c0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4663 0xc0045d46c0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4664 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| +peer0.org1.example.com | 00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4665 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| +peer0.org1.example.com | 00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| +peer0.org1.example.com | 00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| +peer0.org1.example.com | 00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| +peer0.org1.example.com | 00000040 94 ae 7c fe f6 e1 |..|...|" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4666 0xc0045d46c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4667 0xc0045d46c0 gate 1563590456290124200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466d Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.345 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.345 UTC [gossip.pull] HandleMessage -> DEBU 4670 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.346 UTC [gossip.pull] SendDigest -> DEBU 4671 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:56.346 UTC [gossip.gossip] handleMessage -> DEBU 4672 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4673 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4674 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4675 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4676 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4677 Verify: digest = 00000000 fa ab 73 5c f5 93 a1 b9 90 e2 8f 60 be 96 af ac |..s\.......`....| +peer0.org1.example.com | 00000010 0d 2e 82 19 75 db 5f 9a 3a 3f ba 59 fb 42 f7 78 |....u._.:?.Y.B.x|" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4678 Verify: sig = 00000000 30 45 02 21 00 ff 22 db 53 30 ca 08 2d 4b 6e bc |0E.!..".S0..-Kn.| +peer0.org1.example.com | 00000010 cb e8 e4 ed f2 a2 7e 51 f5 f2 33 63 30 39 09 9b |......~Q..3c09..| +peer0.org1.example.com | 00000020 93 47 20 9f 79 02 20 60 f1 a2 2b f8 d8 d2 5c d7 |.G .y. `..+...\.| +peer0.org1.example.com | 00000030 d5 d5 e1 34 23 fd 9b 89 ea 22 f6 60 17 b7 ce 85 |...4#....".`....| +peer0.org1.example.com | 00000040 78 ba 3e 8b aa b9 d9 |x.>....|" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4679 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 467a Verify: sig = 00000000 30 44 02 20 05 cf 79 80 3d 45 b3 f7 3d 3b 60 b3 |0D. ..y.=E..=;`.| +peer0.org1.example.com | 00000010 72 86 c7 75 d4 53 ad 9f 97 86 aa 64 6e 5e 0e 1c |r..u.S.....dn^..| +peer0.org1.example.com | 00000020 a9 90 49 4d 02 20 22 09 d5 04 3f d4 c0 cb b6 62 |..IM. "...?....b| +peer0.org1.example.com | 00000030 cf f5 e6 ae 38 be b6 98 b7 11 56 d2 42 e8 68 ac |....8.....V.B.h.| +peer0.org1.example.com | 00000040 3a d7 07 37 b7 c6 |:..7..|" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] handleAliveMessage -> DEBU 467b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 4680 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] handleAliveMessage -> DEBU 4681 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4682 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4683 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4684 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4685 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] Send -> DEBU 4686 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4687 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > alive: " +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4688 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4689 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.584 UTC [gossip.comm] func1 -> DEBU 468a Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 468d Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 468e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [msp] DeserializeIdentity -> DEBU 468f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4690 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4691 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4692 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4693 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4694 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4695 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 4696 0xc00460a820 gate 1563590456585620000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4697 0xc00460a820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4698 0xc00460a820 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4699 0xc00460a820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 469a 0xc00460a820 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 469b 0xc00460a820 gate 1563590456585620000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 469f 0xc00460b060 gate 1563590456586257100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a0 0xc00460b060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a1 0xc00460b060 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a2 0xc00460b060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a3 0xc00460b060 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 46a4 0xc00460b060 gate 1563590456586257100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.587 UTC [policies] Evaluate -> DEBU 46a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.587 UTC [cauthdsl] func1 -> DEBU 46a8 0xc00460b8a0 gate 1563590456587959800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46a9 0xc00460b8a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46aa 0xc00460b8a0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46ab 0xc00460b8a0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ac Verify: digest = 00000000 1d ed 21 e4 a5 0c 7e 85 37 55 19 44 7f 43 9b 42 |..!...~.7U.D.C.B| +peer0.org1.example.com | 00000010 a3 96 63 da 16 62 19 0e 1c 46 2f 31 f2 3a 5a 12 |..c..b...F/1.:Z.|" +peer0.org1.example.com | "2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ad Verify: sig = 00000000 30 44 02 20 4d 93 9d d4 48 e7 d0 dc ac 30 00 94 |0D. M...H....0..| +peer0.org1.example.com | 00000010 97 3e ac 27 2a 5e a5 d6 36 4b f1 ef cf 66 ad df |.>.'*^..6K...f..| +peer0.org1.example.com | 00000020 a5 36 c3 47 02 20 76 dd 44 92 0c 6c a8 3b 8a d8 |.6.G. v.D..l.;..| +peer0.org1.example.com | 00000030 83 a0 dd 52 97 2f cd 8b ab 36 c9 1f 2b e8 45 15 |...R./...6..+.E.| +peer0.org1.example.com | 00000040 bd e8 1f 15 3d e7 |....=.|" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [cauthdsl] func2 -> DEBU 46ae 0xc00460b8a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [cauthdsl] func1 -> DEBU 46af 0xc00460b8a0 gate 1563590456587959800 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 46b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b6 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.594 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ba Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46bc Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] Send -> DEBU 46c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46c1 Exiting, replying with alive:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" > alive: " +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.comm] func1 -> DEBU 46c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [gossip.pull] HandleMessage -> DEBU 46c6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46ca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [gossip.pull] SendDigest -> DEBU 46cd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:40:56.599 UTC [gossip.gossip] handleMessage -> DEBU 46ce Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46bb Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] Send -> DEBU 46d1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.685 UTC [gossip.comm] func1 -> DEBU 46d8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [cauthdsl] func1 -> DEBU 46e3 0xc00461bbc0 gate 1563590456686774400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.686 UTC [cauthdsl] func2 -> DEBU 46e4 0xc00461bbc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e5 0xc00461bbc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e6 0xc00461bbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e7 0xc00461bbc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46e8 0xc00461bbc0 gate 1563590456686774400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46ec 0xc00464a400 gate 1563590456687367200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ed 0xc00464a400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ee 0xc00464a400 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ef 0xc00464a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46f0 0xc00464a400 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46f1 0xc00464a400 gate 1563590456687367200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func1 -> DEBU 46f5 0xc00464ac40 gate 1563590456687994900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00464ac40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00464ac40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f8 0xc00464ac40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46f9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46fa Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [cauthdsl] func2 -> DEBU 46fb 0xc00464ac40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [cauthdsl] func1 -> DEBU 46fc 0xc00464ac40 gate 1563590456687994900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.696 UTC [policies] Evaluate -> DEBU 46fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 4700 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4701 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4702 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4703 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4704 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [gossip.comm] func1 -> DEBU 4706 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4709 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 470a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.700 UTC [policies] Evaluate -> DEBU 470b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 470e 0xc004661250 gate 1563590456701197200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 470f 0xc004661250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4710 0xc004661250 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4711 0xc004661250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4712 0xc004661250 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 4713 0xc004661250 gate 1563590456701197200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4714 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4717 0xc004661a90 gate 1563590456702044300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4718 0xc004661a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4719 0xc004661a90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471a 0xc004661a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471b 0xc004661a90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 471c 0xc004661a90 gate 1563590456702044300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4720 0xc0046782d0 gate 1563590456702330000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4721 0xc0046782d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4722 0xc0046782d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4723 0xc0046782d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4724 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4725 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4726 0xc0046782d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4727 0xc0046782d0 gate 1563590456702330000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4728 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4729 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 472e Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 472f Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4730 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4731 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4732 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4733 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4734 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4735 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4736 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4739 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473a 0xc00468cb20 gate 1563590456703708200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473b 0xc00468cb20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473c 0xc00468cb20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473d 0xc00468cb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473e 0xc00468cb20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473f 0xc00468cb20 gate 1563590456703708200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4740 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 4743 0xc00468d360 gate 1563590456703960000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 4744 0xc00468d360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4745 0xc00468d360 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4746 0xc00468d360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4747 0xc00468d360 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4748 0xc00468d360 gate 1563590456703960000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 474c 0xc00468dba0 gate 1563590456704206600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474d 0xc00468dba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474e 0xc00468dba0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474f 0xc00468dba0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4750 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4751 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4752 0xc00468dba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4753 0xc00468dba0 gate 1563590456704206600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4756 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4758 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 475a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4760 0xc0046a1370 gate 1563590456704980700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4761 0xc0046a1370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4762 0xc0046a1370 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4763 0xc0046a1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4764 0xc0046a1370 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4765 0xc0046a1370 gate 1563590456704980700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4766 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4769 0xc0046a1bb0 gate 1563590456705230500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476a 0xc0046a1bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476b 0xc0046a1bb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476c 0xc0046a1bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476d 0xc0046a1bb0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 476e 0xc0046a1bb0 gate 1563590456705230500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 476f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4772 0xc0046ae3f0 gate 1563590456705481100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4773 0xc0046ae3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4774 0xc0046ae3f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4775 0xc0046ae3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4776 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4777 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [cauthdsl] func2 -> DEBU 4778 0xc0046ae3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [cauthdsl] func1 -> DEBU 4779 0xc0046ae3f0 gate 1563590456705481100 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4780 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4781 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4782 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4783 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4784 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4785 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 4789 0xc0046aff00 gate 1563590456710676900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478a 0xc0046aff00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478b 0xc0046aff00 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478c 0xc0046aff00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478d 0xc0046aff00 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 478e 0xc0046aff00 gate 1563590456710676900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 478f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4791 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4792 0xc0046ce740 gate 1563590456711223700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4793 0xc0046ce740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4794 0xc0046ce740 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4795 0xc0046ce740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4796 0xc0046ce740 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4797 0xc0046ce740 gate 1563590456711223700 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4798 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4799 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 479b 0xc0046cef80 gate 1563590456711529900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479c 0xc0046cef80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479d 0xc0046cef80 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479e 0xc0046cef80 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 479f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 47a0 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:40:56.713 UTC [cauthdsl] func2 -> DEBU 47a1 0xc0046cef80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.713 UTC [cauthdsl] func1 -> DEBU 47a2 0xc0046cef80 gate 1563590456711529900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.726 UTC [msp.identity] Verify -> DEBU 47a7 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:40:56.727 UTC [msp.identity] Verify -> DEBU 47a8 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47a9 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47aa Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ab Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ac Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47af Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b3 0xc0046df590 gate 1563590456731249300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b4 0xc0046df590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b5 0xc0046df590 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b6 0xc0046df590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b7 0xc0046df590 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b8 0xc0046df590 gate 1563590456731249300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47bc 0xc0046dfdd0 gate 1563590456731619200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bd 0xc0046dfdd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47be 0xc0046dfdd0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bf 0xc0046dfdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47c0 0xc0046dfdd0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47c1 0xc0046dfdd0 gate 1563590456731619200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47c5 0xc0046f2610 gate 1563590456732071400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c6 0xc0046f2610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c7 0xc0046f2610 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c8 0xc0046f2610 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47cb 0xc0046f2610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47cc 0xc0046f2610 gate 1563590456732071400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.732 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.pull] Hello -> DEBU 47d4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d5 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] Send -> DEBU 47d7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47da Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.pull] HandleMessage -> DEBU 47db GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47dc Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47dd Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47de Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47df Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.904 UTC [gossip.gossip] handleMessage -> DEBU 47e1 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.904 UTC [gossip.pull] HandleMessage -> DEBU 47e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.905 UTC [gossip.pull] SendDigest -> DEBU 47e3 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:40:56.905 UTC [gossip.gossip] handleMessage -> DEBU 47e4 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] IsLeader -> DEBU 47e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp] GetDefaultSigningIdentity -> DEBU 47e7 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510101801 " +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e9 Sign: digest: 06C4339B219403DF3CB6A5301108973FE10B0835912113BBA8296AE34A98D8D2 " +peer0.org1.example.com | "2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47eb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ed Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ee Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] Send -> DEBU 47ef Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.comm] func1 -> DEBU 47f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f6 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [msp] DeserializeIdentity -> DEBU 47f9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4800 0xc00472cd70 gate 1563590456991667300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4801 0xc00472cd70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4802 0xc00472cd70 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4803 0xc00472cd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4804 0xc00472cd70 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4805 0xc00472cd70 gate 1563590456991667300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4806 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4808 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4809 0xc00472d5b0 gate 1563590456991920000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 480a 0xc00472d5b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480b 0xc00472d5b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480c 0xc00472d5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480d 0xc00472d5b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 480e 0xc00472d5b0 gate 1563590456991920000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 480f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4811 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4812 0xc00472ddf0 gate 1563590456992222000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4813 0xc00472ddf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4814 0xc00472ddf0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4815 0xc00472ddf0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 24 c2 3a 95 db af e0 b6 1a 56 e0 d9 cb e0 f4 e9 |$.:......V......| +peer0.org1.example.com | 00000010 d8 5d bc 2a b8 63 83 cd f7 6d 37 bd 16 5a ce e6 |.].*.c...m7..Z..|" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 45 02 21 00 9f 2c 9a 33 cd 0c 2d d4 a0 d5 3f |0E.!..,.3..-...?| +peer0.org1.example.com | 00000010 bd 17 1a e4 90 6c 53 57 eb 17 0f 56 6a 55 09 7d |.....lSW...VjU.}| +peer0.org1.example.com | 00000020 80 a3 61 17 c7 02 20 37 51 77 a5 ff 73 35 7a b2 |..a... 7Qw..s5z.| +peer0.org1.example.com | 00000030 68 c7 98 54 cd d1 2b 90 81 54 fb 85 98 87 a5 f2 |h..T..+..T......| +peer0.org1.example.com | 00000040 cd bb fa 10 81 05 77 |......w|" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4818 0xc00472ddf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4819 0xc00472ddf0 gate 1563590456992222000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 481e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 481f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4820 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4821 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4822 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4823 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 4824 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4825 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.comm] func1 -> DEBU 4826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4827 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4828 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 482f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4833 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4834 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4835 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4836 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4837 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4838 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 4839 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 483a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.comm] func1 -> DEBU 483d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [gossip.gossip] handleMessage -> DEBU 483e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.007 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.008 UTC [gossip.gossip] handleMessage -> DEBU 4842 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [gossip.comm] func1 -> DEBU 4843 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [gossip.gossip] handleMessage -> DEBU 4844 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4846 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.149 UTC [msp] DeserializeIdentity -> DEBU 4847 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.149 UTC [gossip.gossip] handleMessage -> DEBU 4848 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4849 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151035 " +peer0.org1.example.com | "2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484b Sign: digest: 1E2D2864C190B8E158F6625B3CCF586244BD30D9DA5BCDDC88828153AA686637 " +peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 484c Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:40:57.296 UTC [gossip.discovery] periodicalSendAlive -> DEBU 484f Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4850 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4851 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4852 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.298 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4854 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [msp] DeserializeIdentity -> DEBU 4855 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4856 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.340 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.gossip] handleMessage -> DEBU 485e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 485f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4860 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4861 Verify: digest = 00000000 c3 88 5c 67 b0 0f 5e a2 52 b8 70 38 4f b8 a6 3f |..\g..^.R.p8O..?| +peer0.org1.example.com | 00000010 1c f1 17 3b e4 ce 70 11 db 63 69 c2 e6 f3 fd 92 |...;..p..ci.....|" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4862 Verify: sig = 00000000 30 44 02 20 23 3b 13 fe 9d 99 21 bc 0c 23 34 17 |0D. #;....!..#4.| +peer0.org1.example.com | 00000010 28 43 4c ac c7 86 67 da 5d 8d 0e df 86 63 45 39 |(CL...g.]....cE9| +peer0.org1.example.com | 00000020 a2 0c f1 62 02 20 14 37 bb cd c4 a6 e3 db c2 fb |...b. .7........| +peer0.org1.example.com | 00000030 83 74 aa 46 79 ea 11 39 8c 26 f0 ae 92 61 7a 50 |.t.Fy..9.&...azP| +peer0.org1.example.com | 00000040 90 9b 5c 1c e4 cf |..\...|" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4863 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4864 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4865 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4866 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4867 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4869 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486a Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.comm] func1 -> DEBU 4875 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4876 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4877 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4878 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4879 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.comm] func1 -> DEBU 487a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487c Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487e Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.comm] func1 -> DEBU 487f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4880 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4881 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func1 -> DEBU 488b 0xc0047a8300 gate 1563590457531851900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488c 0xc0047a8300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488d 0xc0047a8300 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488e 0xc0047a8300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 488f 0xc0047a8300 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4890 0xc0047a8300 gate 1563590457531851900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4894 0xc0047a8b40 gate 1563590457532213900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4895 0xc0047a8b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4896 0xc0047a8b40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4897 0xc0047a8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4898 0xc0047a8b40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4899 0xc0047a8b40 gate 1563590457532213900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 489d 0xc0047a9380 gate 1563590457532574200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489e 0xc0047a9380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489f 0xc0047a9380 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a0 0xc0047a9380 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a1 Verify: digest = 00000000 89 c9 04 02 9b 9c e1 a8 91 bf b0 ae 1d b1 4c a7 |..............L.| +peer0.org1.example.com | 00000010 b7 fd 2f 57 37 90 00 08 24 ef 7e 37 1d 53 21 e4 |../W7...$.~7.S!.|" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a2 Verify: sig = 00000000 30 45 02 21 00 86 03 13 83 09 3d 22 96 40 5c 07 |0E.!......=".@\.| +peer0.org1.example.com | 00000010 cc fd a6 78 83 0e d3 6e 4f 96 fc cb ae 90 52 9b |...x...nO.....R.| +peer0.org1.example.com | 00000020 09 c5 70 0c 88 02 20 21 f0 da 32 e3 1b 9b e1 ed |..p... !..2.....| +peer0.org1.example.com | 00000030 72 5c 8d 98 c8 4d e5 c3 2b 1f d7 c1 cc 62 e5 7c |r\...M..+....b.|| +peer0.org1.example.com | 00000040 e2 18 3a 40 39 24 2d |..:@9$-|" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a3 0xc0047a9380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 48a4 0xc0047a9380 gate 1563590457532574200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 48a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48aa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ab updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ac Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ad Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ae Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48af Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b0 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.comm] func1 -> DEBU 48b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b3 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b6 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b9 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48ba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48be Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bf Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c7 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.496 UTC [endorser] ProcessProposal -> DEBU 48c8 Entering: request from 172.18.0.9:58510" +peer0.org1.example.com | "2019-07-20 02:40:59.496 UTC [protoutils] ValidateProposalMessage -> DEBU 48c9 ValidateProposalMessage starts for signed proposal 0xc0047f0050" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] validateChannelHeader -> DEBU 48ca validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cb begin" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cd creator is valid" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| +peer0.org1.example.com | 00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| +peer0.org1.example.com | 00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| +peer0.org1.example.com | 00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| +peer0.org1.example.com | 00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| +peer0.org1.example.com | 00000040 29 90 0c e3 52 6f |)...Ro|" +peer0.org1.example.com | "2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48d0 exits successfully" +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d1 validateChaincodeProposalMessage starts for proposal 0xc0033408c0, header 0xc0047f0460" +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d2 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] preProcess -> DEBU 48d3 [][01686455] processing txid: 0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9" +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] SimulateProposal -> DEBU 48d4 [][01686455] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [endorser] callChaincode -> INFO 48d5 [][01686455] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [chaincode] Execute -> DEBU 48d6 Entry" +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [cscc] Invoke -> DEBU 48d7 Invoke function: GetChannels" +peer0.org1.example.com | "2019-07-20 02:40:59.498 UTC [msp.identity] Verify -> DEBU 48d8 Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| +peer0.org1.example.com | 00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" +peer0.org1.example.com | "2019-07-20 02:40:59.499 UTC [msp.identity] Verify -> DEBU 48d9 Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| +peer0.org1.example.com | 00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| +peer0.org1.example.com | 00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| +peer0.org1.example.com | 00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| +peer0.org1.example.com | 00000040 29 90 0c e3 52 6f |)...Ro|" +peer0.org1.example.com | "2019-07-20 02:40:59.499 UTC [chaincode] handleMessage -> DEBU 48da [01686455] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [chaincode] Notify -> DEBU 48db [01686455] notifying Txid:0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9, channelID:" +peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [chaincode] Execute -> DEBU 48dc Exit" +peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [endorser] callChaincode -> INFO 48dd [][01686455] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-07-20 02:40:59.500 UTC [endorser] SimulateProposal -> DEBU 48de [][01686455] Exit" +peer0.org1.example.com | "2019-07-20 02:40:59.501 UTC [endorser] func1 -> DEBU 48df Exit: request from 172.18.0.9:58510" +peer0.org1.example.com | "2019-07-20 02:40:59.501 UTC [comm.grpc.server] 1 -> INFO 48e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58510 grpc.code=OK grpc.call_duration=5.3749ms +peer0.org1.example.com | "2019-07-20 02:40:59.508 UTC [grpc] warningf -> DEBU 48e1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58510: read: connection reset by peer" +peer0.org1.example.com | "2019-07-20 02:40:59.509 UTC [grpc] infof -> DEBU 48e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:40:59.944 UTC [gossip.comm] func1 -> DEBU 48e3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e5 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:40:59.945 UTC [msp] DeserializeIdentity -> DEBU 48e8 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48ea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48eb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [policies] Evaluate -> DEBU 48ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func1 -> DEBU 48ef 0xc00480cab0 gate 1563590459948105600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f0 0xc00480cab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f1 0xc00480cab0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f2 0xc00480cab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f3 0xc00480cab0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [cauthdsl] func1 -> DEBU 48f4 0xc00480cab0 gate 1563590459948105600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [policies] Evaluate -> DEBU 48f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func1 -> DEBU 48f8 0xc00480d2f0 gate 1563590459950225200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48f9 0xc00480d2f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fa 0xc00480d2f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fb 0xc00480d2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [cauthdsl] func2 -> DEBU 48fc 0xc00480d2f0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [cauthdsl] func1 -> DEBU 48fd 0xc00480d2f0 gate 1563590459950225200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 4900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:40:59.952 UTC [cauthdsl] func1 -> DEBU 4901 0xc00480db30 gate 1563590459952843400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:40:59.952 UTC [cauthdsl] func2 -> DEBU 4902 0xc00480db30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4903 0xc00480db30 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4904 0xc00480db30 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:40:59.953 UTC [msp.identity] Verify -> DEBU 4905 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| +peer0.org1.example.com | 00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" +peer0.org1.example.com | "2019-07-20 02:40:59.955 UTC [msp.identity] Verify -> DEBU 4906 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| +peer0.org1.example.com | 00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| +peer0.org1.example.com | 00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| +peer0.org1.example.com | 00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| +peer0.org1.example.com | 00000040 6a 9a bd 38 f0 c1 06 |j..8...|" +peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [cauthdsl] func2 -> DEBU 4907 0xc00480db30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [cauthdsl] func1 -> DEBU 4908 0xc00480db30 gate 1563590459952843400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 4909 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 490a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:40:59.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 490d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.958 UTC [gossip.discovery] learnExistingMembers -> DEBU 490e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:40:59.959 UTC [gossip.comm] func1 -> DEBU 490f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4910 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4912 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4914 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.961 UTC [gossip.pull] HandleMessage -> DEBU 4915 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 4916 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4918 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.961 UTC [msp] DeserializeIdentity -> DEBU 4917 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.964 UTC [gossip.discovery] sendMemResponse -> DEBU 4919 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:40:59.967 UTC [msp] DeserializeIdentity -> DEBU 491a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.discovery] sendMemResponse -> DEBU 491e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020<" signature:"0D\002 #;\023\376\235\231!\274\014#4\027(CL\254\307\206g\332]\215\016\337\206cE9\242\014\361b\002 \0247\273\315\304\246\343\333\302\373\203t\252Fy\352\0219\214&\360\256\222azP\220\233\\\034\344\317" > alive: alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4920 Exiting" +peer0.org1.example.com | "2019-07-20 02:40:59.966 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4922 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4923 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4924 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4925 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:40:59.981 UTC [gossip.pull] SendDigest -> DEBU 4926 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:40:59.982 UTC [gossip.gossip] handleMessage -> DEBU 4927 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.245 UTC [gossip.pull] Hello -> DEBU 4928 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 4929 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4932 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4933 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.comm] func1 -> DEBU 4934 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.pull] HandleMessage -> DEBU 4936 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4937 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 4938 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.pull] HandleMessage -> DEBU 4939 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 493a Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.259 UTC [gossip.comm] func1 -> DEBU 493b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.262 UTC [gossip.gossip] handleMessage -> DEBU 493c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.263 UTC [gossip.pull] HandleMessage -> DEBU 493d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.263 UTC [gossip.gossip] handleMessage -> DEBU 493e Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 493f Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4940 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151036 " +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4941 Sign: digest: C2615889418FFCA163D06A93ADDC2E02FFD4AC5E6620C5DE7FC1307F4AC429DB " +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 4942 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4943 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4944 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4945 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4946 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4947 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4948 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4949 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494b Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494d Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494f Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.comm] func1 -> DEBU 4950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4951 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4952 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4954 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4955 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4956 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4957 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] isSentByMe -> DEBU 4958 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.comm] func1 -> DEBU 495b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 495f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4960 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4961 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" +peer0.org1.example.com | "2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 4962 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4963 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] isSentByMe -> DEBU 4964 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4965 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4966 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [msp] DeserializeIdentity -> DEBU 4967 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4969 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 496e 0xc004879410 gate 1563590460294665100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 496f 0xc004879410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4970 0xc004879410 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4971 0xc004879410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4972 0xc004879410 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4973 0xc004879410 gate 1563590460294665100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4974 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4975 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4976 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4977 0xc004879c50 gate 1563590460294955900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4978 0xc004879c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4979 0xc004879c50 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497a 0xc004879c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497b 0xc004879c50 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 497c 0xc004879c50 gate 1563590460294955900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4980 0xc004890490 gate 1563590460295191000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4981 0xc004890490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4982 0xc004890490 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4983 0xc004890490 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4984 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| +peer0.org1.example.com | 00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4985 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| +peer0.org1.example.com | 00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| +peer0.org1.example.com | 00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| +peer0.org1.example.com | 00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| +peer0.org1.example.com | 00000040 6a 9a bd 38 f0 c1 06 |j..8...|" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4986 0xc004890490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4987 0xc004890490 gate 1563590460295191000 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4988 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4989 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498d Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498e Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4990 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4991 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +peer0.org1.example.com | 00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +peer0.org1.example.com | "2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4992 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +peer0.org1.example.com | 00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +peer0.org1.example.com | 00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +peer0.org1.example.com | 00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +peer0.org1.example.com | 00000040 b0 e0 30 43 5c f1 |..0C\.|" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4993 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4994 Verify: sig = 00000000 30 45 02 21 00 96 b2 43 41 a9 5b 49 00 12 c7 01 |0E.!...CA.[I....| +peer0.org1.example.com | 00000010 b1 b7 69 8f b6 4f de 87 6c 57 3f 98 4e 50 c9 96 |..i..O..lW?.NP..| +peer0.org1.example.com | 00000020 eb 26 5a db a8 02 20 2b 85 b1 b6 cc de 66 6b 9f |.&Z... +.....fk.| +peer0.org1.example.com | 00000030 6e 8b 01 5a 5d 0e aa 9c 3b e4 40 5f 72 d9 5c c6 |n..Z]...;.@_r.\.| +peer0.org1.example.com | 00000040 29 e1 37 c9 f7 62 16 |).7..b.|" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4995 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] isSentByMe -> DEBU 4996 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4997 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4998 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.296 UTC [gossip.gossip] handleMessage -> DEBU 4999 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.339 UTC [gossip.gossip] handleMessage -> DEBU 499a Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.339 UTC [gossip.pull] HandleMessage -> DEBU 499b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.340 UTC [gossip.pull] SendDigest -> DEBU 499c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:41:00.340 UTC [gossip.gossip] handleMessage -> DEBU 499d Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499e Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499f Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a0 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.367 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.367 UTC [msp.identity] Verify -> DEBU 49a2 Verify: digest = 00000000 49 51 52 bd 11 4a b8 a3 53 97 cd 73 97 50 47 c7 |IQR..J..S..s.PG.| +peer0.org1.example.com | 00000010 f7 19 ff 3e 5b 7b 6b b2 51 fb 37 eb 30 f0 1e 28 |...>[{k.Q.7.0..(|" +peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a3 Verify: sig = 00000000 30 44 02 20 73 e9 4b 88 b7 1d 12 fa 3f c9 c6 07 |0D. s.K.....?...| +peer0.org1.example.com | 00000010 77 4f 29 fc 49 b3 4d 94 aa c1 fe 5a 7f e4 9b c9 |wO).I.M....Z....| +peer0.org1.example.com | 00000020 e7 5a 6f 77 02 20 02 9d c8 ed 33 b4 b0 96 38 17 |.Zow. ....3...8.| +peer0.org1.example.com | 00000030 c8 44 99 10 24 6b b7 b4 19 af f3 64 79 0a 93 b6 |.D..$k.....dy...| +peer0.org1.example.com | 00000040 3d cd a7 65 1a 5b |=..e.[|" +peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a5 Verify: sig = 00000000 30 44 02 20 76 c6 50 b4 a8 c9 a5 a4 5b 7b a9 51 |0D. v.P.....[{.Q| +peer0.org1.example.com | 00000010 94 dc 4e 9c 23 55 71 69 22 82 7f cf 78 9a 1b 78 |..N.#Uqi"...x..x| +peer0.org1.example.com | 00000020 68 ed 47 62 02 20 50 c6 26 68 cd d4 03 08 49 58 |h.Gb. P.&h....IX| +peer0.org1.example.com | 00000030 f2 d2 42 4f 35 7b 20 5a c9 11 20 5b 1c da bb ab |..BO5{ Z.. [....| +peer0.org1.example.com | 00000040 bc 02 fc 5a 8f 1c |...Z..|" +peer0.org1.example.com | "2019-07-20 02:41:00.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49ab Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ac Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ad Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49af Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49b0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.comm] Send -> DEBU 49b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.discovery] sendMemResponse -> DEBU 49b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +peer0.org1.example.com | "2019-07-20 02:41:00.372 UTC [gossip.comm] sendToEndpoint -> DEBU 49b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.373 UTC [gossip.comm] sendToEndpoint -> DEBU 49b4 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [endorser] ProcessProposal -> DEBU 49b5 Entering: request from 172.18.0.9:58518" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] ValidateProposalMessage -> DEBU 49b6 ValidateProposalMessage starts for signed proposal 0xc00489c6e0" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] validateChannelHeader -> DEBU 49b7 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b8 begin" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49ba creator is valid" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bb Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| +peer0.org1.example.com | 00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" +peer0.org1.example.com | "2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bc Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| +peer0.org1.example.com | 00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| +peer0.org1.example.com | 00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| +peer0.org1.example.com | 00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| +peer0.org1.example.com | 00000040 04 80 97 3f 92 44 a1 |...?.D.|" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] checkSignatureFromCreator -> DEBU 49bd exits successfully" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49be validateChaincodeProposalMessage starts for proposal 0xc003acee70, header 0xc00489caf0" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49bf validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] preProcess -> DEBU 49c0 [][889970b1] processing txid: 889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] SimulateProposal -> DEBU 49c1 [][889970b1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [endorser] callChaincode -> INFO 49c2 [][889970b1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [chaincode] Execute -> DEBU 49c3 Entry" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [qscc] Invoke -> DEBU 49c4 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c5 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c6 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [msp] DeserializeIdentity -> DEBU 49ca Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [msp.identity] newIdentity -> DEBU 49cb Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [cauthdsl] func1 -> DEBU 49cc 0xc0048f4830 gate 1563590460455929300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.455 UTC [cauthdsl] func2 -> DEBU 49cd 0xc0048f4830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49ce 0xc0048f4830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49cf 0xc0048f4830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d0 0xc0048f4830 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d1 0xc0048f4830 gate 1563590460455929300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d5 0xc0048f59b0 gate 1563590460456331400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d6 0xc0048f59b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d7 0xc0048f59b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 49d8 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] Validate -> DEBU 49d9 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-07-20 02:41:00.456 UTC [msp] getCertificationChain -> DEBU 49da MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [cauthdsl] func2 -> DEBU 49db 0xc0048f59b0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dc Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| +peer0.org1.example.com | 00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" +peer0.org1.example.com | "2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dd Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| +peer0.org1.example.com | 00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| +peer0.org1.example.com | 00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| +peer0.org1.example.com | 00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| +peer0.org1.example.com | 00000040 04 80 97 3f 92 44 a1 |...?.D.|" +peer0.org1.example.com | "2019-07-20 02:41:00.459 UTC [cauthdsl] func2 -> DEBU 49de 0xc0048f59b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.459 UTC [cauthdsl] func1 -> DEBU 49df 0xc0048f59b0 gate 1563590460456331400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.460 UTC [policies] Evaluate -> DEBU 49e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] handleMessage -> DEBU 49e4 [889970b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] Notify -> DEBU 49e5 [889970b1] notifying Txid:889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7, channelID:" +peer0.org1.example.com | "2019-07-20 02:41:00.461 UTC [chaincode] Execute -> DEBU 49e6 Exit" +peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] callChaincode -> INFO 49e7 [][889970b1] Exit chaincode: name:"qscc" (7ms)" +peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] SimulateProposal -> DEBU 49e8 [][889970b1] Exit" +peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [endorser] func1 -> DEBU 49e9 Exit: request from 172.18.0.9:58518" +peer0.org1.example.com | "2019-07-20 02:41:00.462 UTC [comm.grpc.server] 1 -> INFO 49ea unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58518 grpc.code=OK grpc.call_duration=8.4046ms +peer0.org1.example.com | "2019-07-20 02:41:00.466 UTC [grpc] infof -> DEBU 49eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.comm] func1 -> DEBU 49ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ee Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ef Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:00.590 UTC [msp] DeserializeIdentity -> DEBU 49f1 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.600 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.602 UTC [policies] Evaluate -> DEBU 49f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.601 UTC [gossip.comm] func1 -> DEBU 49f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.602 UTC [gossip.gossip] handleMessage -> DEBU 49f9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.603 UTC [gossip.pull] HandleMessage -> DEBU 49fa GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.603 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.605 UTC [msp] DeserializeIdentity -> DEBU 49fc Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.612 UTC [msp] DeserializeIdentity -> DEBU 49fd Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.579 UTC [msp] DeserializeIdentity -> DEBU 49fe Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 49ff Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.581 UTC [gossip.pull] SendDigest -> DEBU 4a01 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-07-20 02:41:00.581 UTC [gossip.gossip] handleMessage -> DEBU 4a02 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.582 UTC [cauthdsl] func1 -> DEBU 4a03 0xc0048e5110 gate 1563590460582117800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.582 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0048e5110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0048e5110 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0048e5110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [cauthdsl] func2 -> DEBU 4a07 0xc0048e5110 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [cauthdsl] func1 -> DEBU 4a08 0xc0048e5110 gate 1563590460582117800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a09 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.586 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc0048e5950 gate 1563590460585973400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.586 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0048e5950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0048e5950 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc0048e5950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [cauthdsl] func2 -> DEBU 4a10 0xc0048e5950 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [cauthdsl] func1 -> DEBU 4a11 0xc0048e5950 gate 1563590460585973400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func1 -> DEBU 4a15 0xc00493c190 gate 1563590460589535900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a16 0xc00493c190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a17 0xc00493c190 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a18 0xc00493c190 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.590 UTC [msp.identity] Verify -> DEBU 4a19 Verify: digest = 00000000 1d c4 48 eb 09 63 c9 43 1e 9c 1f 98 2a 93 3c 43 |..H..c.C....*. DEBU 4a1a Verify: sig = 00000000 30 44 02 20 6b ea f9 b0 bf 96 e2 a2 ef b3 af aa |0D. k...........| +peer0.org1.example.com | 00000010 cc 76 8c a9 97 a4 50 c7 b8 ea 41 9c 8a 4f b9 76 |.v....P...A..O.v| +peer0.org1.example.com | 00000020 a4 2f dd 96 02 20 1d aa 85 90 7f 83 96 e4 68 d9 |./... ........h.| +peer0.org1.example.com | 00000030 f7 20 c0 66 07 0f b2 7e 51 5f 88 b8 87 e4 29 17 |. .f...~Q_....).| +peer0.org1.example.com | 00000040 d9 96 73 42 71 fb |..sBq.|" +peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [cauthdsl] func2 -> DEBU 4a1b 0xc00493c190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [cauthdsl] func1 -> DEBU 4a1c 0xc00493c190 gate 1563590460589535900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a1f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:00.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a27 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a28 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.596 UTC [gossip.discovery] sendMemResponse -> DEBU 4a29 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +peer0.org1.example.com | "2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.discovery] sendMemResponse -> DEBU 4a2e Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a31 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a32 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.648 UTC [gossip.comm] Send -> DEBU 4a33 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a35 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a37 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.650 UTC [gossip.comm] sendToEndpoint -> DEBU 4a39 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [gossip.comm] func1 -> DEBU 4a3a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [gossip.gossip] handleMessage -> DEBU 4a3b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.652 UTC [msp] DeserializeIdentity -> DEBU 4a3e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.653 UTC [gossip.comm] func1 -> DEBU 4a3f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a42 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a46 0xc004962cc0 gate 1563590460660063900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a47 0xc004962cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a48 0xc004962cc0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a49 0xc004962cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc004962cc0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a4b 0xc004962cc0 gate 1563590460660063900 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.662 UTC [cauthdsl] func1 -> DEBU 4a4f 0xc004963500 gate 1563590460662627300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.662 UTC [cauthdsl] func2 -> DEBU 4a50 0xc004963500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a51 0xc004963500 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a52 0xc004963500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a53 0xc004963500 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a54 0xc004963500 gate 1563590460662627300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a58 0xc004963d40 gate 1563590460663562700 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a59 0xc004963d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.664 UTC [cauthdsl] func2 -> DEBU 4a5a 0xc004963d40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.665 UTC [cauthdsl] func2 -> DEBU 4a5b 0xc004963d40 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.666 UTC [msp.identity] Verify -> DEBU 4a5c Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:41:00.667 UTC [msp.identity] Verify -> DEBU 4a5d Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [cauthdsl] func2 -> DEBU 4a5e 0xc004963d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [cauthdsl] func1 -> DEBU 4a5f 0xc004963d40 gate 1563590460663562700 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.668 UTC [policies] Evaluate -> DEBU 4a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a62 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.670 UTC [policies] Evaluate -> DEBU 4a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.678 UTC [msp.identity] Verify -> DEBU 4a64 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:41:00.679 UTC [msp.identity] Verify -> DEBU 4a65 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a66 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a67 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:41:00.692 UTC [msp] DeserializeIdentity -> DEBU 4a68 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [msp] DeserializeIdentity -> DEBU 4a69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func1 -> DEBU 4a70 0xc00498a350 gate 1563590460695543200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a71 0xc00498a350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a72 0xc00498a350 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a73 0xc00498a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a74 0xc00498a350 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [cauthdsl] func1 -> DEBU 4a75 0xc00498a350 gate 1563590460695543200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.696 UTC [policies] Evaluate -> DEBU 4a76 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [cauthdsl] func1 -> DEBU 4a79 0xc00498ab90 gate 1563590460697495500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.697 UTC [cauthdsl] func2 -> DEBU 4a7a 0xc00498ab90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7b 0xc00498ab90 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7c 0xc00498ab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7d 0xc00498ab90 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc00498ab90 gate 1563590460697495500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a7f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func1 -> DEBU 4a82 0xc00498b3d0 gate 1563590460699017400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a83 0xc00498b3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a84 0xc00498b3d0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a85 0xc00498b3d0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a86 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a87 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:41:00.702 UTC [cauthdsl] func2 -> DEBU 4a88 0xc00498b3d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [cauthdsl] func1 -> DEBU 4a89 0xc00498b3d0 gate 1563590460699017400 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.704 UTC [policies] Evaluate -> DEBU 4a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.704 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [gossip.gossip] handleMessage -> DEBU 4a8f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a92 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a93 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a94 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a95 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a97 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a98 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.712 UTC [policies] Evaluate -> DEBU 4a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func1 -> DEBU 4a9c 0xc004999c20 gate 1563590460713243100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9d 0xc004999c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc004999c20 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc004999c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc004999c20 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa1 0xc004999c20 gate 1563590460713243100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa5 0xc0049b8460 gate 1563590460714843000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc0049b8460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc0049b8460 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0049b8460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0049b8460 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [cauthdsl] func1 -> DEBU 4aaa 0xc0049b8460 gate 1563590460714843000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.721 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0049b8ca0 gate 1563590460720093200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.721 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc0049b8ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.722 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc0049b8ca0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab1 0xc0049b8ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab3 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab4 0xc0049b8ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.723 UTC [cauthdsl] func1 -> DEBU 4ab5 0xc0049b8ca0 gate 1563590460720093200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4aba Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4abb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4abc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4abf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func1 -> DEBU 4ac2 0xc0049ce470 gate 1563590460725231100 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac3 0xc0049ce470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac4 0xc0049ce470 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac5 0xc0049ce470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac6 0xc0049ce470 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc0049ce470 gate 1563590460725231100 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4aca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.727 UTC [msp] DeserializeIdentity -> DEBU 4acb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.727 UTC [cauthdsl] func1 -> DEBU 4acc 0xc0049cecb0 gate 1563590460727922600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acd 0xc0049cecb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ace 0xc0049cecb0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acf 0xc0049cecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [gossip.pull] Hello -> DEBU 4ad1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc0049cecb0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad3 0xc0049cecb0 gate 1563590460727922600 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad8 0xc0049cf4f0 gate 1563590460728919200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad9 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ada 0xc0049cf4f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4adb 0xc0049cf4f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] Send -> DEBU 4adc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4add 0xc0049cf4f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4ade Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4adf Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc0049cf4f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [cauthdsl] func1 -> DEBU 4ae3 0xc0049cf4f0 gate 1563590460728919200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.729 UTC [policies] Evaluate -> DEBU 4ae4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae8 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aea Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aeb Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aec Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4aed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.733 UTC [policies] Evaluate -> DEBU 4af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func1 -> DEBU 4af3 0xc0049e5000 gate 1563590460734350400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af4 0xc0049e5000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af5 0xc0049e5000 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af6 0xc0049e5000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af7 0xc0049e5000 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4af8 0xc0049e5000 gate 1563590460734350400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4afc 0xc0049e5840 gate 1563590460735722000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.735 UTC [cauthdsl] func2 -> DEBU 4afd 0xc0049e5840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4afe 0xc0049e5840 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4aff 0xc0049e5840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4b00 0xc0049e5840 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b01 0xc0049e5840 gate 1563590460735722000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b05 0xc0049fc080 gate 1563590460736931300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.738 UTC [cauthdsl] func2 -> DEBU 4b06 0xc0049fc080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.739 UTC [cauthdsl] func2 -> DEBU 4b07 0xc0049fc080 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b08 0xc0049fc080 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b09 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +peer0.org1.example.com | 00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b0a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +peer0.org1.example.com | 00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +peer0.org1.example.com | 00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +peer0.org1.example.com | 00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +peer0.org1.example.com | 00000040 8e 09 3a 87 1b a2 bc |..:....|" +peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b0b 0xc0049fc080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.740 UTC [cauthdsl] func1 -> DEBU 4b0c 0xc0049fc080 gate 1563590460736931300 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b11 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +peer0.org1.example.com | 00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b12 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +peer0.org1.example.com | 00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +peer0.org1.example.com | 00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +peer0.org1.example.com | 00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +peer0.org1.example.com | 00000040 04 ec df 98 3f 3b |....?;|" +peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b13 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +peer0.org1.example.com | 00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +peer0.org1.example.com | "2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b14 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +peer0.org1.example.com | 00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +peer0.org1.example.com | 00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +peer0.org1.example.com | 00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +peer0.org1.example.com | 00000040 c7 35 cf f0 e4 88 ab |.5.....|" +peer0.org1.example.com | "2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b15 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b16 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b18 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b19 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b1d 0xc004a1c690 gate 1563590460751179500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc004a1c690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc004a1c690 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b20 0xc004a1c690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b21 0xc004a1c690 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b22 0xc004a1c690 gate 1563590460751179500 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b23 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func1 -> DEBU 4b26 0xc004a1ced0 gate 1563590460752470400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b27 0xc004a1ced0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b28 0xc004a1ced0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b29 0xc004a1ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b2a 0xc004a1ced0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2b 0xc004a1ced0 gate 1563590460752470400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2f 0xc004a1d710 gate 1563590460753743500 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b30 0xc004a1d710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b31 0xc004a1d710 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [cauthdsl] func2 -> DEBU 4b32 0xc004a1d710 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b33 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +peer0.org1.example.com | 00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +peer0.org1.example.com | "2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b34 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +peer0.org1.example.com | 00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +peer0.org1.example.com | 00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +peer0.org1.example.com | 00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +peer0.org1.example.com | 00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [cauthdsl] func2 -> DEBU 4b35 0xc004a1d710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [cauthdsl] func1 -> DEBU 4b36 0xc004a1d710 gate 1563590460753743500 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:00.756 UTC [policies] Evaluate -> DEBU 4b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b39 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [policies] Evaluate -> DEBU 4b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3b Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3c Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.758 UTC [gossip.pull] HandleMessage -> DEBU 4b3d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.759 UTC [gossip.gossip] handleMessage -> DEBU 4b3e Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.808 UTC [gossip.gossip] handleMessage -> DEBU 4b3f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b40 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b41 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.811 UTC [gossip.gossip] handleMessage -> DEBU 4b42 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b43 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.pull] HandleMessage -> DEBU 4b44 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.pull] SendDigest -> DEBU 4b45 Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:00.973 UTC [gossip.comm] func1 -> DEBU 4b47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.973 UTC [gossip.gossip] handleMessage -> DEBU 4b48 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:00.974 UTC [gossip.gossip] handleMessage -> DEBU 4b4c Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.112 UTC [gossip.comm] func1 -> DEBU 4b4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.112 UTC [gossip.gossip] handleMessage -> DEBU 4b4e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b4f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b50 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b51 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.114 UTC [gossip.gossip] handleMessage -> DEBU 4b52 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.947 UTC [gossip.election] waitForInterrupt -> DEBU 4b53 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.947 UTC [gossip.election] IsLeader -> DEBU 4b54 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp] GetDefaultSigningIdentity -> DEBU 4b55 Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp.identity] Sign -> DEBU 4b56 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510111801 " +peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [msp.identity] Sign -> DEBU 4b57 Sign: digest: 13139BFAED5AC952836D29D7CC8CC4AA9958FE999331428538CC62CE0C87A090 " +peer0.org1.example.com | "2019-07-20 02:41:01.948 UTC [gossip.election] waitForInterrupt -> DEBU 4b58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-07-20 02:41:01.951 UTC [msp] DeserializeIdentity -> DEBU 4b59 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.951 UTC [msp] DeserializeIdentity -> DEBU 4b5a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] Send -> DEBU 4b5d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [msp] DeserializeIdentity -> DEBU 4b5f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4b60 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.953 UTC [gossip.comm] sendToEndpoint -> DEBU 4b61 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.comm] func1 -> DEBU 4b62 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.gossip] handleMessage -> DEBU 4b63 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.gossip] handleMessage -> DEBU 4b64 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b65 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [msp] DeserializeIdentity -> DEBU 4b67 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b69 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b6a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [policies] Evaluate -> DEBU 4b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:01.966 UTC [policies] Evaluate -> DEBU 4b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b6e 0xc004a5aa40 gate 1563590461967060000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b6f 0xc004a5aa40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b70 0xc004a5aa40 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b71 0xc004a5aa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b72 0xc004a5aa40 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b73 0xc004a5aa40 gate 1563590461967060000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b74 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b77 0xc004a5b280 gate 1563590461967417400 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b78 0xc004a5b280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b79 0xc004a5b280 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b7a 0xc004a5b280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b7b 0xc004a5b280 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b7c 0xc004a5b280 gate 1563590461967417400 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [policies] Evaluate -> DEBU 4b7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func1 -> DEBU 4b80 0xc004a5bac0 gate 1563590461967798200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b81 0xc004a5bac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b82 0xc004a5bac0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [cauthdsl] func2 -> DEBU 4b83 0xc004a5bac0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:01.967 UTC [msp.identity] Verify -> DEBU 4b84 Verify: digest = 00000000 7d cd e8 10 75 21 af 62 12 96 ee b8 bd 0b 1c 98 |}...u!.b........| +peer0.org1.example.com | 00000010 89 e9 15 06 85 d5 e9 70 fe 57 42 32 69 e5 6f 48 |.......p.WB2i.oH|" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [msp.identity] Verify -> DEBU 4b85 Verify: sig = 00000000 30 44 02 20 1d c5 e4 10 6e 8e 15 9b ca 58 ed ed |0D. ....n....X..| +peer0.org1.example.com | 00000010 14 ed 31 01 52 73 ce 8f 1f a7 e4 83 3b 51 79 6a |..1.Rs......;Qyj| +peer0.org1.example.com | 00000020 fa db 77 24 02 20 1f 05 f6 f3 97 95 17 74 f0 5e |..w$. .......t.^| +peer0.org1.example.com | 00000030 d3 16 83 d3 d4 9e a2 4a 80 c3 44 f8 e7 fc 77 8b |.......J..D...w.| +peer0.org1.example.com | 00000040 d5 d5 da 3c 9d a9 |...<..|" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [cauthdsl] func2 -> DEBU 4b86 0xc004a5bac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [cauthdsl] func1 -> DEBU 4b87 0xc004a5bac0 gate 1563590461967798200 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [policies] Evaluate -> DEBU 4b8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8e updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b8f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b91 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b92 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b93 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b94 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b95 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.973 UTC [msp] DeserializeIdentity -> DEBU 4b96 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.974 UTC [msp] DeserializeIdentity -> DEBU 4b97 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.974 UTC [msp] DeserializeIdentity -> DEBU 4b98 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.975 UTC [msp] DeserializeIdentity -> DEBU 4b99 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.975 UTC [msp] DeserializeIdentity -> DEBU 4b9a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] Send -> DEBU 4b9b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [msp] DeserializeIdentity -> DEBU 4b9c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] Send -> DEBU 4b9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4b9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4b9f Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4ba0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] sendToEndpoint -> DEBU 4ba1 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.comm] func1 -> DEBU 4ba2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.gossip] handleMessage -> DEBU 4ba3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.gossip] handleMessage -> DEBU 4ba4 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba6 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.977 UTC [gossip.gossip] handleMessage -> DEBU 4ba7 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.gossip] handleMessage -> DEBU 4ba8 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:01.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4baa Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bab Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bac Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151037 " +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bad Sign: digest: 0CA3223A6554DB9F9F39A1E084AB63DBD42A47B643416597373505100274FC57 " +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bae Obtaining default signing identity" +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4baf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [msp.identity] Sign -> DEBU 4bb0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-07-20 02:41:02.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4bb1 Sleeping 5s" +peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [msp] DeserializeIdentity -> DEBU 4bb4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.266 UTC [gossip.comm] Send -> DEBU 4bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [msp] DeserializeIdentity -> DEBU 4bb6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] Send -> DEBU 4bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] Send -> DEBU 4bb8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbb Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbc Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.267 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbe Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.303 UTC [gossip.gossip] handleMessage -> DEBU 4bbf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.gossip] handleMessage -> DEBU 4bc0 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bc2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [msp.identity] Verify -> DEBU 4bc3 Verify: digest = 00000000 29 ca 0f 62 65 b8 90 f1 50 0b 98 0c e1 07 61 cc |)..be...P.....a.| +peer0.org1.example.com | 00000010 c5 03 53 50 64 c6 5f b1 c9 02 7a 3d bd 61 39 2b |..SPd._...z=.a9+|" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [msp.identity] Verify -> DEBU 4bc4 Verify: sig = 00000000 30 45 02 21 00 bf a2 64 47 1f b4 28 53 71 eb 43 |0E.!...dG..(Sq.C| +peer0.org1.example.com | 00000010 5f 29 a3 a8 86 18 f4 37 c2 ea ad e1 a2 89 96 6a |_).....7.......j| +peer0.org1.example.com | 00000020 6e 94 60 73 ef 02 20 4f 5a 9b 19 94 1a 1e bb 93 |n.`s.. OZ.......| +peer0.org1.example.com | 00000030 96 b6 64 53 0b c2 ad 6e 6e a9 17 86 6e 1f d5 2d |..dS...nn...n..-| +peer0.org1.example.com | 00000040 cc f0 e3 fa 69 2f 26 |....i/&|" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bc5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bca Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bcb Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bcc Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.comm] func1 -> DEBU 4bcd Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.gossip] handleMessage -> DEBU 4bce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.gossip] handleMessage -> DEBU 4bcf Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd1 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd2 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd3 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [msp] DeserializeIdentity -> DEBU 4bd4 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.309 UTC [gossip.comm] Send -> DEBU 4bd5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [msp] DeserializeIdentity -> DEBU 4bd6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] Send -> DEBU 4bd7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bd8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bd9 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bda Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.310 UTC [gossip.comm] sendToEndpoint -> DEBU 4bdb Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.comm] func1 -> DEBU 4bdc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.gossip] handleMessage -> DEBU 4bdd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.gossip] handleMessage -> DEBU 4bde Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.317 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bdf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.318 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4be0 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.comm] func1 -> DEBU 4be1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] handleMessage -> DEBU 4be2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] handleMessage -> DEBU 4be3 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4be4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4be5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [msp] DeserializeIdentity -> DEBU 4be6 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4be7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4be8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4be9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4beb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bed 0xc004ad0270 gate 1563590462503622200 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bee 0xc004ad0270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bef 0xc004ad0270 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bf0 0xc004ad0270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func2 -> DEBU 4bf1 0xc004ad0270 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bf2 0xc004ad0270 gate 1563590462503622200 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [policies] Evaluate -> DEBU 4bf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:02.503 UTC [cauthdsl] func1 -> DEBU 4bf6 0xc004ad0ab0 gate 1563590462503967000 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf7 0xc004ad0ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf8 0xc004ad0ab0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bf9 0xc004ad0ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4bfa 0xc004ad0ab0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4bfb 0xc004ad0ab0 gate 1563590462503967000 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4bfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4bff 0xc004ad12f0 gate 1563590462504431900 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c00 0xc004ad12f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c01 0xc004ad12f0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c02 0xc004ad12f0 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [msp.identity] Verify -> DEBU 4c03 Verify: digest = 00000000 d0 02 84 cb 74 8a 21 d9 19 7f 8e a6 1c e1 4a 45 |....t.!.......JE| +peer0.org1.example.com | 00000010 96 b9 11 bd e5 ab d1 28 2a 71 6d b1 a3 70 da 2e |.......(*qm..p..|" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [msp.identity] Verify -> DEBU 4c04 Verify: sig = 00000000 30 44 02 20 1f dd b9 08 93 16 72 6b 83 bf ec 03 |0D. ......rk....| +peer0.org1.example.com | 00000010 35 78 ec ae 15 da 14 aa 23 fe 94 01 62 67 8e 6a |5x......#...bg.j| +peer0.org1.example.com | 00000020 af 0a e6 99 02 20 11 6d 10 0c 30 3f 2f 72 44 97 |..... .m..0?/rD.| +peer0.org1.example.com | 00000030 ea 26 af 35 ce e3 d7 64 93 e2 e7 a6 81 7d 83 4d |.&.5...d.....}.M| +peer0.org1.example.com | 00000040 bf 21 00 f4 cb b4 |.!....|" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func2 -> DEBU 4c05 0xc004ad12f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [cauthdsl] func1 -> DEBU 4c06 0xc004ad12f0 gate 1563590462504431900 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4c07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.504 UTC [policies] Evaluate -> DEBU 4c08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [gossip.comm] func1 -> DEBU 4c09 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [gossip.gossip] handleMessage -> DEBU 4c0a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [policies] Evaluate -> DEBU 4c0b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.507 UTC [policies] Evaluate -> DEBU 4c0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c0e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c0f updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c10 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c11 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c12 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c13 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c14 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c15 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c16 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.508 UTC [gossip.gossip] handleMessage -> DEBU 4c17 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.517 UTC [gossip.gossip] handleMessage -> DEBU 4c18 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.gossip] handleMessage -> DEBU 4c19 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c1a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c1b Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.518 UTC [msp] DeserializeIdentity -> DEBU 4c1c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c1f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c20 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c21 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c22 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] Send -> DEBU 4c23 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [msp] DeserializeIdentity -> DEBU 4c24 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] Send -> DEBU 4c25 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c28 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:02.519 UTC [gossip.comm] sendToEndpoint -> DEBU 4c29 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.comm] func1 -> DEBU 4c2a Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] handleMessage -> DEBU 4c2b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] handleMessage -> DEBU 4c2c Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c2d Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c2e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [msp] DeserializeIdentity -> DEBU 4c2f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c31 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c32 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [policies] Evaluate -> DEBU 4c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:03.908 UTC [cauthdsl] func1 -> DEBU 4c36 0xc004b087b0 gate 1563590463908931800 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c37 0xc004b087b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c38 0xc004b087b0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c39 0xc004b087b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c3a 0xc004b087b0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c3b 0xc004b087b0 gate 1563590463908931800 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c3f 0xc004b08ff0 gate 1563590463909418300 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c40 0xc004b08ff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c41 0xc004b08ff0 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c42 0xc004b08ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c43 0xc004b08ff0 principal evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c44 0xc004b08ff0 gate 1563590463909418300 evaluation fails" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [policies] Evaluate -> DEBU 4c47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func1 -> DEBU 4c48 0xc004b09830 gate 1563590463909744600 evaluation starts" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c49 0xc004b09830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c4a 0xc004b09830 processing identity 0 with bytes of 114b950" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [cauthdsl] func2 -> DEBU 4c4b 0xc004b09830 principal matched by identity 0" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [msp.identity] Verify -> DEBU 4c4c Verify: digest = 00000000 e0 13 25 18 e6 02 68 31 8a 7e 00 4a 75 45 d6 94 |..%...h1.~.JuE..| +peer0.org1.example.com | 00000010 cb 59 4c 08 23 6c 5d 8d 66 d6 2f 4d 09 7d 10 65 |.YL.#l].f./M.}.e|" +peer0.org1.example.com | "2019-07-20 02:41:03.909 UTC [msp.identity] Verify -> DEBU 4c4d Verify: sig = 00000000 30 45 02 21 00 ae b0 03 72 0b f1 8c c8 4f 9e 10 |0E.!....r....O..| +peer0.org1.example.com | 00000010 87 49 65 69 4a d3 aa 29 8c 58 d0 b4 13 64 d3 24 |.IeiJ..).X...d.$| +peer0.org1.example.com | 00000020 f4 be e1 b0 f5 02 20 27 af f8 de 00 01 92 61 21 |...... '......a!| +peer0.org1.example.com | 00000030 9b 35 de ff ef c2 4f ae c1 df b0 2c 75 91 4a 2d |.5....O....,u.J-| +peer0.org1.example.com | 00000040 95 4b 16 6c 7b a0 b0 |.K.l{..|" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [cauthdsl] func2 -> DEBU 4c4e 0xc004b09830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [cauthdsl] func1 -> DEBU 4c4f 0xc004b09830 gate 1563590463909744600 evaluation succeeds" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c52 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [policies] Evaluate -> DEBU 4c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c56 updating membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c57 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c59 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c5a Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c5b Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [gossip.discovery] sendMemResponse -> DEBU 4c5c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [msp] DeserializeIdentity -> DEBU 4c5d Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.910 UTC [msp] DeserializeIdentity -> DEBU 4c5e Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [msp] DeserializeIdentity -> DEBU 4c5f Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] Send -> DEBU 4c60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.discovery] sendMemResponse -> DEBU 4c61 Exiting, replying with alive:" signature:"0E\002!\000\256\260\003r\013\361\214\310O\236\020\207IeiJ\323\252)\214X\320\264\023d\323$\364\276\341\260\365\002 '\257\370\336\000\001\222a!\2335\336\377\357\302O\256\301\337\260,u\221J-\225K\026l{\240\260" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020>" signature:"0E\002!\000\277\242dG\037\264(Sq\353C_)\243\250\206\030\3647\302\352\255\341\242\211\226jn\224`s\357\002 OZ\233\031\224\032\036\273\223\226\266dS\013\302\255nn\251\027\206n\037\325-\314\360\343\372i/&" > alive: alive: " +peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] sendToEndpoint -> DEBU 4c62 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.911 UTC [gossip.comm] sendToEndpoint -> DEBU 4c63 Exiting" +peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.comm] func1 -> DEBU 4c64 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.gossip] handleMessage -> DEBU 4c65 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [gossip.pull] HandleMessage -> DEBU 4c66 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [msp] DeserializeIdentity -> DEBU 4c67 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.922 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c69 Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6a Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6b Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [msp] DeserializeIdentity -> DEBU 4c6c Obtaining identity" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [gossip.pull] SendDigest -> DEBU 4c6d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-07-20 02:41:03.923 UTC [gossip.gossip] handleMessage -> DEBU 4c6e Exiting" diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log new file mode 100644 index 00000000..e8599350 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_orderer.log @@ -0,0 +1,9753 @@ +2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for fileledger +2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-07-20 02:39:29.377 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for ramledger +2019-07-20 02:39:29.377 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 1000 +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for ramledger.HistorySize setting to int 1000 +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[interface{}]interface{} value for kafka +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for kafka.Topic +2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 3 +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-07-20 02:39:29.378 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for kafka.Verbose setting to bool false +2019-07-20 02:39:29.378 UTC [viperutil] getKeysRecursively -> DEBU 00f Found map[string]interface{} value for kafka.TLS +2019-07-20 02:39:29.379 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.398 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for kafka.TLS.Certificate setting to +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for kafka.TLS.RootCAs setting to +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for kafka.TLS.ClientAuthRequired setting to +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for kafka.TLS.ClientRootCAs setting to +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for kafka.TLS.Enabled setting to bool false +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for kafka.TLS.PrivateKey setting to +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01c Found map[string]interface{} value for kafka.SASLPlain +2019-07-20 02:39:29.399 UTC [viperutil] unmarshalJSON -> DEBU 01d Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.399 UTC [viperutil] getKeysRecursively -> DEBU 01e Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 01f Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 020 Found real value for kafka.SASLPlain.User setting to +2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for kafka.SASLPlain.Password setting to +2019-07-20 02:39:29.400 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.400 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for kafka.Version setting to +2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[string]interface{} value for kafka.Retry +2019-07-20 02:39:29.401 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-07-20 02:39:29.401 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-07-20 02:39:29.404 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for kafka.Retry.LongInterval setting to string 5m +2019-07-20 02:39:29.405 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for kafka.Retry.LongTotal setting to string 12h +2019-07-20 02:39:29.405 UTC [viperutil] getKeysRecursively -> DEBU 02c Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-07-20 02:39:29.406 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.406 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for kafka.Retry.Metadata +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: 3 +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 038 Found map[string]interface{} value for kafka.Retry.Producer +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: 3 +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-07-20 02:39:29.407 UTC [viperutil] getKeysRecursively -> DEBU 03d Found map[string]interface{} value for kafka.Retry.Consumer +2019-07-20 02:39:29.407 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 042 Found map[interface{}]interface{} value for debug +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for debug.BroadcastTraceDir setting to +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for debug.DeliverTraceDir setting to +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[interface{}]interface{} value for operations +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04a Found map[string]interface{} value for operations.TLS +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.408 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-07-20 02:39:29.408 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value is not a string: [] +2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-07-20 02:39:29.409 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.409 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for operations.TLS.Enabled setting to bool false +2019-07-20 02:39:29.412 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for operations.TLS.Certificate setting to +2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for operations.TLS.PrivateKey setting to +2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for operations.TLS.RootCAs setting to +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 057 Found map[interface{}]interface{} value for metrics +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 058 Found map[string]interface{} value for metrics.Statsd +2019-07-20 02:39:29.413 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-07-20 02:39:29.413 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-07-20 02:39:29.415 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-07-20 02:39:29.416 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.416 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for metrics.Statsd.Prefix setting to +2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for metrics.Statsd.Network setting to string udp +2019-07-20 02:39:29.417 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for metrics.Provider setting to string prometheus +2019-07-20 02:39:29.417 UTC [viperutil] getKeysRecursively -> DEBU 063 Found map[interface{}]interface{} value for consensus +2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 068 Found map[interface{}]interface{} value for general +2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 069 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06a Found real value for general.ConnectionTimeout setting to +2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.418 UTC [viperutil] getKeysRecursively -> DEBU 06c Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-07-20 02:39:29.418 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.LocalMSPID setting to string OrdererMSP +2019-07-20 02:39:29.419 UTC [viperutil] getKeysRecursively -> DEBU 06f Found map[string]interface{} value for general.Authentication +2019-07-20 02:39:29.419 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-07-20 02:39:29.420 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-07-20 02:39:29.420 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-07-20 02:39:29.433 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for general.LedgerType setting to string file +2019-07-20 02:39:29.434 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.ListenPort setting to string 7050 +2019-07-20 02:39:29.435 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-07-20 02:39:29.435 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.GenesisMethod setting to string file +2019-07-20 02:39:29.436 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.444 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for general.SystemChannel setting to +2019-07-20 02:39:29.447 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[string]interface{} value for general.Keepalive +2019-07-20 02:39:29.448 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.448 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-07-20 02:39:29.449 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-07-20 02:39:29.449 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-07-20 02:39:29.450 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-07-20 02:39:29.457 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for general.TLS +2019-07-20 02:39:29.458 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.459 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-07-20 02:39:29.460 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.461 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-07-20 02:39:29.461 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.462 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for general.TLS.ClientRootCAs setting to +2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-07-20 02:39:29.463 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for general.TLS.Enabled setting to string true +2019-07-20 02:39:29.463 UTC [viperutil] unmarshalJSON -> DEBU 08e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 08f Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-07-20 02:39:29.464 UTC [viperutil] unmarshalJSON -> DEBU 090 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.464 UTC [viperutil] getKeysRecursively -> DEBU 091 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 092 Found map[string]interface{} value for general.BCCSP +2019-07-20 02:39:29.465 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for general.BCCSP.SW +2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-07-20 02:39:29.466 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value is not a string: 256 +2019-07-20 02:39:29.466 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for general.BCCSP.SW.Security setting to int 256 +2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-07-20 02:39:29.467 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-07-20 02:39:29.467 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for general.BCCSP.Default setting to string SW +2019-07-20 02:39:29.468 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for general.Cluster +2019-07-20 02:39:29.470 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.471 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for general.Cluster.ListenPort setting to +2019-07-20 02:39:29.472 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.472 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-07-20 02:39:29.473 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.474 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for general.Cluster.DialTimeout setting to +2019-07-20 02:39:29.474 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.475 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for general.Cluster.ReplicationRetryTimeout setting to +2019-07-20 02:39:29.476 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.476 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for general.Cluster.ListenAddress setting to +2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.477 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-07-20 02:39:29.477 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.478 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for general.Cluster.ReplicationBufferSize setting to +2019-07-20 02:39:29.479 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.480 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for general.Cluster.ReplicationPullTimeout setting to +2019-07-20 02:39:29.480 UTC [viperutil] unmarshalJSON -> DEBU 0ae Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.482 UTC [viperutil] getKeysRecursively -> DEBU 0af Found real value for general.Cluster.ServerPrivateKey setting to +2019-07-20 02:39:29.482 UTC [viperutil] unmarshalJSON -> DEBU 0b0 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.483 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found real value for general.Cluster.ReplicationMaxRetries setting to +2019-07-20 02:39:29.483 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.485 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2019-07-20 02:39:29.485 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.486 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for general.Cluster.ServerCertificate setting to +2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: 10 +2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for general.Cluster.SendBufferSize setting to int 10 +2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-07-20 02:39:29.488 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-07-20 02:39:29.488 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: +2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for general.Cluster.RPCTimeout setting to +2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0be Found map[string]interface{} value for general.Profile +2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0bf Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c0 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c1 Unmarshal JSON: value is not a string: false +2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found real value for general.Profile.Enabled setting to bool false +2019-07-20 02:39:29.489 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-07-20 02:39:29.489 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-07-20 02:39:29.489 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c5 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2019-07-20 02:39:29.489 UTC [localconfig] completeInitialization -> INFO 0c6 Kafka.Version unset, setting to 0.10.2.0 +"2019-07-20 02:39:29.495 UTC [bccsp_sw] openKeyStore -> DEBU 0c7 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-07-20 02:39:29.496 UTC [bccsp] initBCCSP -> DEBU 0c8 Initialize BCCSP [SW]" +"2019-07-20 02:39:29.496 UTC [msp] getPemMaterialFromDir -> DEBU 0c9 Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-07-20 02:39:29.504 UTC [msp] getPemMaterialFromDir -> DEBU 0ca Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-07-20 02:39:29.508 UTC [msp] getPemMaterialFromDir -> DEBU 0cb Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-07-20 02:39:29.514 UTC [msp] getPemMaterialFromDir -> DEBU 0cc Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-07-20 02:39:29.519 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-07-20 02:39:29.544 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-07-20 02:39:29.565 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-07-20 02:39:29.567 UTC [msp] getMspConfig -> DEBU 0d0 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-07-20 02:39:29.567 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-07-20 02:39:29.578 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-07-20 02:39:29.587 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-07-20 02:39:29.589 UTC [msp] getMspConfig -> DEBU 0d4 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-07-20 02:39:29.589 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-07-20 02:39:29.590 UTC [msp] getMspConfig -> DEBU 0d6 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-07-20 02:39:29.592 UTC [msp] getMspConfig -> DEBU 0d7 MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-07-20 02:39:29.592 UTC [msp] newBccspMsp -> DEBU 0d8 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.592 UTC [msp] New -> DEBU 0d9 Creating Cache-MSP instance" +"2019-07-20 02:39:29.592 UTC [msp] loadLocaMSP -> DEBU 0da Created new local MSP" +"2019-07-20 02:39:29.592 UTC [msp] Setup -> DEBU 0db Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.592 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.611 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.624 UTC [bccsp_sw] loadPrivateKey -> DEBU 0df Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +"2019-07-20 02:39:29.630 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.631 UTC [msp] setupSigningIdentity -> DEBU 0e1 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-07-20 02:39:29.632 UTC [msp] Validate -> DEBU 0e2 MSP OrdererMSP validating identity" +"2019-07-20 02:39:29.633 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e3 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-07-20 02:39:29.645 UTC [common.channelconfig] NewStandardValues -> DEBU 0e4 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:29.645 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e5 Processing field: HashingAlgorithm" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e6 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e7 Processing field: OrdererAddresses" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e8 Processing field: Consortium" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: Capabilities" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0ea Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: ConsensusType" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: BatchSize" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: BatchTimeout" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ee Processing field: KafkaBrokers" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ChannelRestrictions" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: Capabilities" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: Endpoints" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: MSP" +"2019-07-20 02:39:29.646 UTC [common.channelconfig] validateMSP -> DEBU 0f5 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:29.647 UTC [msp] newBccspMsp -> DEBU 0f6 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.647 UTC [msp] New -> DEBU 0f7 Creating Cache-MSP instance" +"2019-07-20 02:39:29.647 UTC [msp] Setup -> DEBU 0f8 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.647 UTC [msp.identity] newIdentity -> DEBU 0fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.647 UTC [msp] Validate -> DEBU 0fb MSP OrdererMSP validating identity" +"2019-07-20 02:39:29.647 UTC [common.channelconfig] NewStandardValues -> DEBU 0fc Initializing protos for *channelconfig.ConsortiumProtos" +"2019-07-20 02:39:29.647 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: ChannelCreationPolicy" +"2019-07-20 02:39:29.648 UTC [common.channelconfig] NewStandardValues -> DEBU 0fe Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.648 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ff Processing field: MSP" +"2019-07-20 02:39:29.648 UTC [common.channelconfig] validateMSP -> DEBU 100 Setting up MSP for org Org1MSP" +"2019-07-20 02:39:29.648 UTC [msp] newBccspMsp -> DEBU 101 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.648 UTC [msp] New -> DEBU 102 Creating Cache-MSP instance" +"2019-07-20 02:39:29.648 UTC [msp] Setup -> DEBU 103 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 104 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.648 UTC [msp.identity] newIdentity -> DEBU 105 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.649 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 106 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:29.649 UTC [msp] Validate -> DEBU 107 MSP Org1MSP validating identity" +"2019-07-20 02:39:29.649 UTC [msp] getCertificationChain -> DEBU 108 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.655 UTC [msp] hasOURole -> DEBU 109 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:29.655 UTC [msp] getCertificationChain -> DEBU 10a MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.655 UTC [common.channelconfig] NewStandardValues -> DEBU 10b Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.655 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: MSP" +"2019-07-20 02:39:29.655 UTC [common.channelconfig] validateMSP -> DEBU 10d Setting up MSP for org Org2MSP" +"2019-07-20 02:39:29.655 UTC [msp] newBccspMsp -> DEBU 10e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.655 UTC [msp] New -> DEBU 10f Creating Cache-MSP instance" +"2019-07-20 02:39:29.655 UTC [msp] Setup -> DEBU 110 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:29.655 UTC [msp.identity] newIdentity -> DEBU 111 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.656 UTC [msp.identity] newIdentity -> DEBU 112 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.656 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 113 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:29.656 UTC [msp] Validate -> DEBU 114 MSP Org2MSP validating identity" +"2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 115 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.656 UTC [msp] hasOURole -> DEBU 116 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:29.656 UTC [msp] getCertificationChain -> DEBU 117 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 118 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:29.656 UTC [msp] Setup -> DEBU 119 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.656 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Admins for Channel/Consortiums" +"2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12a Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Readers for Channel" +"2019-07-20 02:39:29.657 UTC [policies] GetPolicy -> DEBU 12c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Writers for Channel" +"2019-07-20 02:39:29.657 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Admins for Channel" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Group] /Channel" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-07-20 02:39:29.657 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:29.658 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:29.658 UTC [orderer.common.server] createLedgerFactory -> DEBU 156 Ledger dir: /var/hyperledger/production/orderer" +"2019-07-20 02:39:29.658 UTC [kvledger.util] CreateDirIfMissing -> DEBU 157 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 158 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-07-20 02:39:29.658 UTC [kvledger.util] logDirStatus -> DEBU 159 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-07-20 02:39:29.705 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15a Bootstrapping because no existing channels" +"2019-07-20 02:39:29.705 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15b Selected bootstrap block, because system channel last config block is nil" +"2019-07-20 02:39:29.706 UTC [common.channelconfig] NewStandardValues -> DEBU 15c Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: HashingAlgorithm" +"2019-07-20 02:39:29.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: OrdererAddresses" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Consortium" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: Capabilities" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 162 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: ConsensusType" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: BatchSize" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: BatchTimeout" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: KafkaBrokers" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: ChannelRestrictions" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Capabilities" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 169 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a Processing field: Endpoints" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] NewStandardValues -> DEBU 16b Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16c Processing field: MSP" +"2019-07-20 02:39:29.707 UTC [common.channelconfig] validateMSP -> DEBU 16d Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:29.707 UTC [msp] newBccspMsp -> DEBU 16e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.707 UTC [msp] New -> DEBU 16f Creating Cache-MSP instance" +"2019-07-20 02:39:29.707 UTC [msp] Setup -> DEBU 170 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:29.707 UTC [msp.identity] newIdentity -> DEBU 171 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.708 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.708 UTC [msp] Validate -> DEBU 173 MSP OrdererMSP validating identity" +"2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ChannelCreationPolicy" +"2019-07-20 02:39:29.711 UTC [common.channelconfig] NewStandardValues -> DEBU 176 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.711 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: MSP" +"2019-07-20 02:39:29.711 UTC [common.channelconfig] validateMSP -> DEBU 178 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:29.712 UTC [msp] newBccspMsp -> DEBU 179 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.712 UTC [msp] New -> DEBU 17a Creating Cache-MSP instance" +"2019-07-20 02:39:29.712 UTC [msp] Setup -> DEBU 17b Setting up MSP instance Org2MSP" +"2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.714 UTC [msp.identity] newIdentity -> DEBU 17d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.715 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:29.715 UTC [msp] Validate -> DEBU 17f MSP Org2MSP validating identity" +"2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 180 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.715 UTC [msp] hasOURole -> DEBU 181 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:29.715 UTC [msp] getCertificationChain -> DEBU 182 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.716 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.716 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" +"2019-07-20 02:39:29.716 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org Org1MSP" +"2019-07-20 02:39:29.718 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.718 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" +"2019-07-20 02:39:29.718 UTC [msp] Setup -> DEBU 188 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:29.718 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.722 UTC [msp.identity] newIdentity -> DEBU 18a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.740 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18b Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:29.740 UTC [msp] Validate -> DEBU 18c MSP Org1MSP validating identity" +"2019-07-20 02:39:29.740 UTC [msp] getCertificationChain -> DEBU 18d MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.743 UTC [msp] hasOURole -> DEBU 18e MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:29.744 UTC [msp] getCertificationChain -> DEBU 18f MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 190 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:29.744 UTC [msp] Setup -> DEBU 191 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19c Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 19f Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a1 Proposed new policy Admins for Channel/Consortiums" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a2 Proposed new policy Admins for Channel" +"2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a3 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a4 Proposed new policy Readers for Channel" +"2019-07-20 02:39:29.745 UTC [policies] GetPolicy -> DEBU 1a5 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-07-20 02:39:29.745 UTC [policies] NewManagerImpl -> DEBU 1a6 Proposed new policy Writers for Channel" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:29.745 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Group] /Channel/Consortiums" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1c9 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1ca Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cb Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cc Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:29.746 UTC [common.configtx] addToMap -> DEBU 1cd Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:29.813 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ce Booted with a genesis block, replication isn't an option" +"2019-07-20 02:39:29.841 UTC [orderer.common.server] initializeServerConfig -> INFO 1cf Starting orderer with TLS enabled" +"2019-07-20 02:39:29.844 UTC [orderer.common.server] configureClusterListener -> INFO 1d0 Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-07-20 02:39:29.858 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d1 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-07-20 02:39:29.858 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d2 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-07-20 02:39:29.858 UTC [kvledger.util] logDirStatus -> DEBU 1d3 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-07-20 02:39:29.859 UTC [kvledger.util] logDirStatus -> DEBU 1d4 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] newBlockfileMgr -> INFO 1d5 Getting block information from block storage" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d6 Retrieving checkpoint info from block files" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d7 retrieveLastFileSuffix()" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1d8 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1d9 Last file number found = -1" +"2019-07-20 02:39:29.859 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1da No block file found" +"2019-07-20 02:39:29.860 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1db Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0000cd5a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-07-20 02:39:29.862 UTC [fsblkstorage] newBlockIndex -> DEBU 1dc newBlockIndex() - indexItems:[[BlockNum]]" +"2019-07-20 02:39:29.865 UTC [fsblkstorage] indexBlock -> DEBU 1dd Indexing block [blockNum=0, blockHash=[]byte{0x83, 0x7c, 0xec, 0x8, 0xfb, 0x64, 0x69, 0x1e, 0xeb, 0x40, 0x71, 0x16, 0x20, 0xff, 0x7, 0xb7, 0x21, 0x5a, 0x7c, 0x93, 0xa4, 0x25, 0x8e, 0x29, 0x3a, 0x1a, 0x0, 0x5e, 0x0, 0xd6, 0xad, 0x25} txOffsets= +txId=a6faba22e613adaa8102d6c27d264383fd6380b45cd1860c8c876737af1bf39c locPointer=offset=39, bytesLength=18375 +]" +"2019-07-20 02:39:29.867 UTC [fsblkstorage] updateCheckpoint -> DEBU 1de Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18419], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-07-20 02:39:29.870 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:29.873 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: HashingAlgorithm" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: OrdererAddresses" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: Consortium" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: ConsensusType" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e7 Processing field: BatchSize" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: BatchTimeout" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e9 Processing field: KafkaBrokers" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: ChannelRestrictions" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1eb Processing field: Capabilities" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: Endpoints" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: MSP" +"2019-07-20 02:39:29.874 UTC [common.channelconfig] validateMSP -> DEBU 1f0 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:29.874 UTC [msp] newBccspMsp -> DEBU 1f1 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.874 UTC [msp] New -> DEBU 1f2 Creating Cache-MSP instance" +"2019-07-20 02:39:29.874 UTC [msp] Setup -> DEBU 1f3 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.875 UTC [msp.identity] newIdentity -> DEBU 1f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.875 UTC [msp] Validate -> DEBU 1f6 MSP OrdererMSP validating identity" +"2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f7 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f8 Processing field: ChannelCreationPolicy" +"2019-07-20 02:39:29.875 UTC [common.channelconfig] NewStandardValues -> DEBU 1f9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.875 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1fa Processing field: MSP" +"2019-07-20 02:39:29.875 UTC [common.channelconfig] validateMSP -> DEBU 1fb Setting up MSP for org Org1MSP" +"2019-07-20 02:39:29.875 UTC [msp] newBccspMsp -> DEBU 1fc Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.875 UTC [msp] New -> DEBU 1fd Creating Cache-MSP instance" +"2019-07-20 02:39:29.875 UTC [msp] Setup -> DEBU 1fe Setting up MSP instance Org1MSP" +"2019-07-20 02:39:29.877 UTC [msp.identity] newIdentity -> DEBU 1ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.881 UTC [msp.identity] newIdentity -> DEBU 200 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 201 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:29.882 UTC [msp] Validate -> DEBU 202 MSP Org1MSP validating identity" +"2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 203 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.883 UTC [msp] hasOURole -> DEBU 204 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:29.883 UTC [msp] getCertificationChain -> DEBU 205 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.885 UTC [common.channelconfig] NewStandardValues -> DEBU 206 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.885 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: MSP" +"2019-07-20 02:39:29.885 UTC [common.channelconfig] validateMSP -> DEBU 208 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:29.885 UTC [msp] newBccspMsp -> DEBU 209 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.885 UTC [msp] New -> DEBU 20a Creating Cache-MSP instance" +"2019-07-20 02:39:29.885 UTC [msp] Setup -> DEBU 20b Setting up MSP instance Org2MSP" +"2019-07-20 02:39:29.885 UTC [msp.identity] newIdentity -> DEBU 20c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.886 UTC [msp.identity] newIdentity -> DEBU 20d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.886 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:29.886 UTC [msp] Validate -> DEBU 20f MSP Org2MSP validating identity" +"2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 210 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.887 UTC [msp] hasOURole -> DEBU 211 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:29.887 UTC [msp] getCertificationChain -> DEBU 212 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 213 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:29.888 UTC [msp] Setup -> DEBU 214 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 215 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 216 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 217 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 218 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 219 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21a Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21b Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 21f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 220 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 221 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.888 UTC [policies] NewManagerImpl -> DEBU 222 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 223 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 224 Proposed new policy Admins for Channel/Consortiums" +"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 225 Proposed new policy Admins for Channel" +"2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 226 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 227 Proposed new policy Readers for Channel" +"2019-07-20 02:39:29.889 UTC [policies] GetPolicy -> DEBU 228 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-07-20 02:39:29.889 UTC [policies] NewManagerImpl -> DEBU 229 Proposed new policy Writers for Channel" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Group] /Channel" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:29.889 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 234 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 235 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 236 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 237 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 238 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 239 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23a Adding to config map: [Group] /Channel/Consortiums" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 23f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 240 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 241 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 242 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 243 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 244 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 245 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 246 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:29.890 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:29.898 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 251 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 252 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 253 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 254 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 255 blockbytes [18416] read from file [0]" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] Next -> DEBU 256 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] newBlockfileStream -> DEBU 257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:29.899 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 258 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 259 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:29.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 25a blockbytes [18416] read from file [0]" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 25b Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: HashingAlgorithm" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: OrdererAddresses" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25f Processing field: Consortium" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: Capabilities" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 261 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 262 Processing field: ConsensusType" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 263 Processing field: BatchSize" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 264 Processing field: BatchTimeout" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 265 Processing field: KafkaBrokers" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: ChannelRestrictions" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 267 Processing field: Capabilities" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 268 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 269 Processing field: Endpoints" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] NewStandardValues -> DEBU 26a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26b Processing field: MSP" +"2019-07-20 02:39:29.900 UTC [common.channelconfig] validateMSP -> DEBU 26c Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:29.900 UTC [msp] newBccspMsp -> DEBU 26d Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.901 UTC [msp] New -> DEBU 26e Creating Cache-MSP instance" +"2019-07-20 02:39:29.901 UTC [msp] Setup -> DEBU 26f Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 270 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.913 UTC [msp.identity] newIdentity -> DEBU 271 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.914 UTC [msp] Validate -> DEBU 272 MSP OrdererMSP validating identity" +"2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ChannelCreationPolicy" +"2019-07-20 02:39:29.914 UTC [common.channelconfig] NewStandardValues -> DEBU 275 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.914 UTC [common.channelconfig] initializeProtosStruct -> DEBU 276 Processing field: MSP" +"2019-07-20 02:39:29.914 UTC [common.channelconfig] validateMSP -> DEBU 277 Setting up MSP for org Org1MSP" +"2019-07-20 02:39:29.914 UTC [msp] newBccspMsp -> DEBU 278 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.914 UTC [msp] New -> DEBU 279 Creating Cache-MSP instance" +"2019-07-20 02:39:29.914 UTC [msp] Setup -> DEBU 27a Setting up MSP instance Org1MSP" +"2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.915 UTC [msp.identity] newIdentity -> DEBU 27c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.915 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 27d Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:29.915 UTC [msp] Validate -> DEBU 27e MSP Org1MSP validating identity" +"2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 27f MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.916 UTC [msp] hasOURole -> DEBU 280 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:29.916 UTC [msp] getCertificationChain -> DEBU 281 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:29.916 UTC [common.channelconfig] NewStandardValues -> DEBU 282 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:29.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 283 Processing field: MSP" +"2019-07-20 02:39:29.916 UTC [common.channelconfig] validateMSP -> DEBU 284 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:29.916 UTC [msp] newBccspMsp -> DEBU 285 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:29.916 UTC [msp] New -> DEBU 286 Creating Cache-MSP instance" +"2019-07-20 02:39:29.916 UTC [msp] Setup -> DEBU 287 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 288 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.916 UTC [msp.identity] newIdentity -> DEBU 289 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:29.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 28a Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:29.920 UTC [msp] Validate -> DEBU 28b MSP Org2MSP validating identity" +"2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28c MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.920 UTC [msp] hasOURole -> DEBU 28d MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:29.920 UTC [msp] getCertificationChain -> DEBU 28e MSP Org2MSP getting certification chain" +"2019-07-20 02:39:29.920 UTC [msp] Setup -> DEBU 28f Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:29.921 UTC [msp] Setup -> DEBU 290 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 291 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 292 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 293 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 294 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 295 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 296 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 297 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 298 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 299 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.921 UTC [policies] NewManagerImpl -> DEBU 29e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 29f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a0 Proposed new policy Admins for Channel/Consortiums" +"2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a1 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a2 Proposed new policy Writers for Channel" +"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a3 Proposed new policy Admins for Channel" +"2019-07-20 02:39:29.922 UTC [policies] GetPolicy -> DEBU 2a4 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-07-20 02:39:29.922 UTC [policies] NewManagerImpl -> DEBU 2a5 Proposed new policy Readers for Channel" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:29.922 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b6 Adding to config map: [Group] /Channel/Consortiums" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b7 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b8 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2b9 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2ba Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bb Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2bd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-07-20 02:39:29.923 UTC [common.configtx] addToMap -> DEBU 2be Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2bf Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:29.924 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2cd As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:29.924 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ce As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:29.924 UTC [policies] Manager -> DEBU 2cf Manager Channel looking up path [Application]" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d0 Manager Channel has managers Orderer" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d1 Manager Channel has managers Consortiums" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d2 Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d3 Manager Channel has managers Orderer" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d4 Manager Channel has managers Consortiums" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d5 Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:29.925 UTC [policies] Manager -> DEBU 2d6 Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d7 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d8 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2d9 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:29.925 UTC [common.channelconfig] LogSanityChecks -> DEBU 2da As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2db Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:29.925 UTC [common.capabilities] Supported -> DEBU 2dc Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:29.925 UTC [orderer.common.server] func1 -> DEBU 2dd Executing callback to update root CAs" +"2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2de updating root CAs for channel [testchainid]" +"2019-07-20 02:39:29.926 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2df adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e0 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:29.927 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2e1 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:29.928 UTC [fsblkstorage] Next -> DEBU 2e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:29.930 UTC [fsblkstorage] newBlockfileStream -> DEBU 2e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e4 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:29.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2e6 blockbytes [18416] read from file [0]" +"2019-07-20 02:39:29.930 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2e7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-07-20 02:39:29.930 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2e8 EvictionSuspicion not set, defaulting to 10m0s" +"2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2e9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-07-20 02:39:29.931 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ea No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-07-20 02:39:29.939 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2eb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ec Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2ed Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2ee Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ef newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f0 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f1 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f2 blockbytes [18416] read from file [0]" +"2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2f3 [channel: testchainid] Done creating channel support resources" +"2019-07-20 02:39:29.940 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2f4 Creating system channel msg processor for channel testchainid" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] Next -> DEBU 2f5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] newBlockfileStream -> DEBU 2f6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f7 Remaining bytes=[18419], Going to peek [8] bytes" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f8 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:29.940 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2f9 blockbytes [18416] read from file [0]" +"2019-07-20 02:39:29.940 UTC [orderer.commmon.multichannel] Initialize -> INFO 2fa Starting system channel 'testchainid' with genesis block hash 837cec08fb64691eeb40711620ff07b7215a7c93a4258e293a1a005e00d6ad25 and orderer type etcdraft" +"2019-07-20 02:39:29.940 UTC [orderer.consensus.etcdraft] Start -> INFO 2fb Starting Raft node" channel=testchainid node=1 +"2019-07-20 02:39:29.940 UTC [orderer.common.cluster] Configure -> INFO 2fc Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +]" +"2019-07-20 02:39:29.941 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-07-20 02:39:29.943 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2fe Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-07-20 02:39:29.944 UTC [orderer.common.cluster] func1 -> DEBU 2ff Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + for channel testchainid" +"2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 300 parsed scheme: """ +"2019-07-20 02:39:29.944 UTC [grpc] DialContext -> DEBU 301 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:29.945 UTC [grpc] watcher -> DEBU 302 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-07-20 02:39:29.945 UTC [grpc] switchBalancer -> DEBU 303 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:29.945 UTC [grpc] HandleSubConnStateChange -> DEBU 304 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, CONNECTING" +"2019-07-20 02:39:29.945 UTC [orderer.common.cluster] updateStubInMapping -> INFO 305 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-07-20 02:39:29.952 UTC [orderer.common.cluster] updateStubInMapping -> INFO 306 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-07-20 02:39:29.952 UTC [orderer.common.cluster] func1 -> DEBU 307 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- + for channel testchainid" +"2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 308 parsed scheme: """ +"2019-07-20 02:39:29.955 UTC [grpc] DialContext -> DEBU 309 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30a 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 30b 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-07-20 02:39:29.955 UTC [orderer.common.cluster] Configure -> INFO 30c Exiting" +"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> DEBU 30d Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] start -> INFO 30e Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 30f 1 became follower at term 0" channel=testchainid node=1 +"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] newRaft -> INFO 310 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-07-20 02:39:29.955 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 311 1 became follower at term 1" channel=testchainid node=1 +"2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 312 Starting orderer: + Version: 1.4.2 + Commit SHA: development build + Go version: go1.12.7 + OS/Arch: linux/amd64" +"2019-07-20 02:39:29.962 UTC [orderer.common.server] Start -> INFO 313 Beginning to serve requests" +"2019-07-20 02:39:29.970 UTC [grpc] watcher -> DEBU 314 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-07-20 02:39:29.971 UTC [grpc] switchBalancer -> DEBU 315 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:29.971 UTC [grpc] HandleSubConnStateChange -> DEBU 316 pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, CONNECTING" +"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 317 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 318 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-07-20 02:39:29.978 UTC [orderer.consensus.etcdraft] apply -> INFO 319 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-07-20 02:39:30.015 UTC [grpc] HandleSubConnStateChange -> DEBU 31a pickfirstBalancer: HandleSubConnStateChange: 0xc00029c220, READY" +"2019-07-20 02:39:30.040 UTC [grpc] HandleSubConnStateChange -> DEBU 31b pickfirstBalancer: HandleSubConnStateChange: 0xc00029c240, READY" +"2019-07-20 02:39:31.007 UTC [orderer.common.cluster] Step -> DEBU 31c Connection from orderer2.example.com(172.18.0.4:54782)" +"2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] Step -> INFO 31e 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2019-07-20 02:39:31.008 UTC [orderer.common.cluster] NewStream -> DEBU 31f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-07-20 02:39:31.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 89µs" +"2019-07-20 02:39:31.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +"2019-07-20 02:39:31.010 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 323 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 324 1 became follower at term 2" channel=testchainid node=1 +"2019-07-20 02:39:31.010 UTC [orderer.consensus.etcdraft] Step -> INFO 325 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-07-20 02:39:31.011 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2019-07-20 02:39:31.012 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.8µs " +"2019-07-20 02:39:31.014 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 36" +"2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] run -> INFO 329 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-07-20 02:39:31.014 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32a Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +"2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 32c Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:31.015 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32e Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-07-20 02:39:31.015 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.1µs " +"2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] handleMessage -> DEBU 330 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:31.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 331 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-07-20 02:39:31.510 UTC [orderer.common.cluster.step] sendMessage -> DEBU 332 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +"2019-07-20 02:39:32.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 333 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:32.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 334 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" +"2019-07-20 02:39:32.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 335 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.4µs " +"2019-07-20 02:39:32.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 336 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:32.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 337 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-07-20 02:39:32.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 338 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +"2019-07-20 02:39:33.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 339 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:33.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33a Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +"2019-07-20 02:39:33.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +"2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:33.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +"2019-07-20 02:39:33.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.9µs " +"2019-07-20 02:39:34.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:34.010 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 340 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2019-07-20 02:39:34.011 UTC [orderer.common.cluster.step] sendMessage -> DEBU 341 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +"2019-07-20 02:39:34.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU 342 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:34.508 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 343 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-07-20 02:39:34.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 298.7µs " +"2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 345 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:35.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 346 Sending msg of 28 bytes to 3 on channel testchainid took 80.2µs" +"2019-07-20 02:39:35.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 347 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +"2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 348 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:35.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 349 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-07-20 02:39:35.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.1µs " +"2019-07-20 02:39:36.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:36.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34c Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-07-20 02:39:36.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +"2019-07-20 02:39:36.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:36.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34f Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-07-20 02:39:36.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 350 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.1µs " +"2019-07-20 02:39:37.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU 351 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:37.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 352 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2019-07-20 02:39:37.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU 353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.5µs " +"2019-07-20 02:39:37.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 354 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:37.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 355 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2019-07-20 02:39:37.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 356 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.8µs " +"2019-07-20 02:39:38.007 UTC [orderer.common.cluster.step] handleMessage -> DEBU 357 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:38.008 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 358 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-07-20 02:39:38.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 359 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.1µs " +"2019-07-20 02:39:38.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:38.509 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2019-07-20 02:39:38.509 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.3µs " +"2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:39.009 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 35e Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +"2019-07-20 02:39:39.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU 35f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2019-07-20 02:39:39.044 UTC [orderer.common.server] Deliver -> DEBU 360 Starting new Deliver handler" +"2019-07-20 02:39:39.044 UTC [common.deliver] Handle -> DEBU 361 Starting new deliver loop for 172.18.0.9:39028" +"2019-07-20 02:39:39.045 UTC [common.deliver] Handle -> DEBU 362 Attempting to read seek info message from 172.18.0.9:39028" +"2019-07-20 02:39:39.074 UTC [orderer.common.server] Broadcast -> DEBU 363 Starting new Broadcast handler" +"2019-07-20 02:39:39.074 UTC [orderer.common.broadcast] Handle -> DEBU 364 Starting new broadcast loop for 172.18.0.9:39030" +"2019-07-20 02:39:39.076 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 365 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39030" +"2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 366 Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-07-20 02:39:39.077 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 367 Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 368 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 369 Processing field: HashingAlgorithm" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36a Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36b Processing field: OrdererAddresses" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36c Processing field: Consortium" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36d Processing field: Capabilities" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] NewStandardValues -> DEBU 36e Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: ConsensusType" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 370 Processing field: BatchSize" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: BatchTimeout" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 372 Processing field: KafkaBrokers" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: ChannelRestrictions" +"2019-07-20 02:39:39.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 374 Processing field: Capabilities" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 375 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 376 Processing field: Endpoints" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 377 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 378 Processing field: MSP" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] validateMSP -> DEBU 379 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:39.078 UTC [msp] newBccspMsp -> DEBU 37a Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.078 UTC [msp] New -> DEBU 37b Creating Cache-MSP instance" +"2019-07-20 02:39:39.078 UTC [msp] Setup -> DEBU 37c Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.078 UTC [msp.identity] newIdentity -> DEBU 37e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.078 UTC [msp] Validate -> DEBU 37f MSP OrdererMSP validating identity" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:39.078 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: ACLs" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 382 Processing field: Capabilities" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 383 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 384 Processing field: AnchorPeers" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] NewStandardValues -> DEBU 385 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] initializeProtosStruct -> DEBU 386 Processing field: MSP" +"2019-07-20 02:39:39.079 UTC [common.channelconfig] Validate -> DEBU 387 Anchor peers for org Org1MSP are " +"2019-07-20 02:39:39.079 UTC [common.channelconfig] validateMSP -> DEBU 388 Setting up MSP for org Org1MSP" +"2019-07-20 02:39:39.079 UTC [msp] newBccspMsp -> DEBU 389 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.079 UTC [msp] New -> DEBU 38a Creating Cache-MSP instance" +"2019-07-20 02:39:39.079 UTC [msp] Setup -> DEBU 38b Setting up MSP instance Org1MSP" +"2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.080 UTC [msp.identity] newIdentity -> DEBU 38d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.080 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:39.081 UTC [msp] Validate -> DEBU 38f MSP Org1MSP validating identity" +"2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 390 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.081 UTC [msp] hasOURole -> DEBU 391 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:39.081 UTC [msp] getCertificationChain -> DEBU 392 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 393 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 394 Processing field: AnchorPeers" +"2019-07-20 02:39:39.081 UTC [common.channelconfig] NewStandardValues -> DEBU 395 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.081 UTC [common.channelconfig] initializeProtosStruct -> DEBU 396 Processing field: MSP" +"2019-07-20 02:39:39.081 UTC [common.channelconfig] Validate -> DEBU 397 Anchor peers for org Org2MSP are " +"2019-07-20 02:39:39.081 UTC [common.channelconfig] validateMSP -> DEBU 398 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:39.081 UTC [msp] newBccspMsp -> DEBU 399 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.081 UTC [msp] New -> DEBU 39a Creating Cache-MSP instance" +"2019-07-20 02:39:39.081 UTC [msp] Setup -> DEBU 39b Setting up MSP instance Org2MSP" +"2019-07-20 02:39:39.081 UTC [msp.identity] newIdentity -> DEBU 39c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.082 UTC [msp.identity] newIdentity -> DEBU 39d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.082 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 39e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:39.082 UTC [msp] Validate -> DEBU 39f MSP Org2MSP validating identity" +"2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a0 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.082 UTC [msp] hasOURole -> DEBU 3a1 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:39.082 UTC [msp] getCertificationChain -> DEBU 3a2 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a3 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:39.082 UTC [msp] Setup -> DEBU 3a4 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:39.082 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a8 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3a9 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3aa Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ab Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ac Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ad Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3ae Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3af Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b0 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b1 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b2 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.083 UTC [policies] NewManagerImpl -> DEBU 3b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b4 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b5 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b6 Proposed new policy Admins for Channel" +"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3b8 Proposed new policy Readers for Channel" +"2019-07-20 02:39:39.084 UTC [policies] GetPolicy -> DEBU 3b9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-07-20 02:39:39.084 UTC [policies] NewManagerImpl -> DEBU 3ba Proposed new policy Writers for Channel" +"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.084 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:39.085 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:39.086 UTC [common.configtx] addToMap -> DEBU 3df Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e0 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e1 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e2 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e5 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.087 UTC [common.configtx] addToMap -> DEBU 3e6 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e7 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3e9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ea Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3eb Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ec Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ed Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ee Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.088 UTC [common.configtx] addToMap -> DEBU 3ef Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.089 UTC [common.configtx] addToMap -> DEBU 3f1 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f2 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f3 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f4 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f5 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.089 UTC [common.configtx] verifyDeltaSet -> DEBU 3f6 Processing change to key: [Group] /Channel/Application" +"2019-07-20 02:39:39.089 UTC [common.configtx] policyForItem -> DEBU 3f7 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-07-20 02:39:39.089 UTC [policies] Manager -> DEBU 3f8 Manager Channel looking up path []" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3f9 Manager Channel has managers Orderer" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fa Manager Channel has managers Application" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fb Manager Channel looking up path [Application]" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fc Manager Channel has managers Orderer" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fd Manager Channel has managers Application" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3fe Manager Channel/Application looking up path []" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 3ff Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:39.090 UTC [policies] Manager -> DEBU 400 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 401 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 402 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:39.090 UTC [policies] Evaluate -> DEBU 403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:39:39.090 UTC [msp] DeserializeIdentity -> DEBU 404 Obtaining identity" +"2019-07-20 02:39:39.091 UTC [msp.identity] newIdentity -> DEBU 405 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 406 0xc000951ac0 gate 1563590379091253900 evaluation starts" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 407 0xc000951ac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 408 0xc000951ac0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:39.091 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 409 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40a 0xc000951ac0 principal matched by identity 0" +"2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40b Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| +00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" +"2019-07-20 02:39:39.091 UTC [msp.identity] Verify -> DEBU 40c Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| +00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | +00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| +00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| +00000040 b6 52 e0 6c 82 94 |.R.l..|" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func2 -> DEBU 40d 0xc000951ac0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:39.091 UTC [cauthdsl] func1 -> DEBU 40e 0xc000951ac0 gate 1563590379091253900 evaluation succeeds" +"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 40f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 411 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.091 UTC [policies] Evaluate -> DEBU 412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 413 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 414 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.092 UTC [common.configtx] verifyDeltaSet -> DEBU 415 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 41f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 420 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 421 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 422 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 423 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 424 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 425 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.092 UTC [common.configtx] recurseConfigMap -> DEBU 426 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 427 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 428 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 429 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [common.configtx] recurseConfigMap -> DEBU 42c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42d Obtaining default signing identity" +"2019-07-20 02:39:39.093 UTC [msp] GetDefaultSigningIdentity -> DEBU 42e Obtaining default signing identity" +"2019-07-20 02:39:39.093 UTC [msp.identity] Sign -> DEBU 42f Sign: plaintext: 0AD2060A1B08011A0608EBFDC9E90522...4B363125DCAEEC32A278E2CF9DDD8C54 " +"2019-07-20 02:39:39.094 UTC [msp.identity] Sign -> DEBU 430 Sign: digest: 45DB8F0181D8A44B3CF876A75B80ACD077EDCCFB3B1C9D17C0902192520E8F2D " +"2019-07-20 02:39:39.094 UTC [msp] GetDefaultSigningIdentity -> DEBU 431 Obtaining default signing identity" +"2019-07-20 02:39:39.095 UTC [msp] GetDefaultSigningIdentity -> DEBU 432 Obtaining default signing identity" +"2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 433 Sign: plaintext: 0ACE060A1708041A0608EBFDC9E90522...2E42A0C1B566423262986FCA1D7C7999 " +"2019-07-20 02:39:39.095 UTC [msp.identity] Sign -> DEBU 434 Sign: digest: 78B703761D325EE5D5CB13182625C158F15FA370E1078A12E65F558F0ACFA74A " +"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 435 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 436 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 437 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 438 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:39.096 UTC [policies] Evaluate -> DEBU 439 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:39.096 UTC [msp] DeserializeIdentity -> DEBU 43a Obtaining identity" +"2019-07-20 02:39:39.096 UTC [msp.identity] newIdentity -> DEBU 43b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.097 UTC [cauthdsl] func1 -> DEBU 43c 0xc000a9b050 gate 1563590379097124100 evaluation starts" +"2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43d 0xc000a9b050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:39.097 UTC [cauthdsl] func2 -> DEBU 43e 0xc000a9b050 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:39.097 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 43f Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:39:39.097 UTC [msp] Validate -> DEBU 440 MSP OrdererMSP validating identity" +"2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 441 0xc000a9b050 principal matched by identity 0" +"2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 442 Verify: digest = 00000000 78 b7 03 76 1d 32 5e e5 d5 cb 13 18 26 25 c1 58 |x..v.2^.....&%.X| +00000010 f1 5f a3 70 e1 07 8a 12 e6 5f 55 8f 0a cf a7 4a |._.p....._U....J|" +"2019-07-20 02:39:39.098 UTC [msp.identity] Verify -> DEBU 443 Verify: sig = 00000000 30 45 02 21 00 a0 d9 0a de d9 d8 ac 1e 74 55 78 |0E.!.........tUx| +00000010 57 2d 4b 72 58 67 8a 2b 9a ba 7a 41 10 2d 03 61 |W-KrXg.+..zA.-.a| +00000020 bd 19 e8 88 13 02 20 16 bc 09 48 78 d8 29 d9 f6 |...... ...Hx.)..| +00000030 3a 13 e0 de 8d ca b4 f5 88 1e c0 1b cc 4e 2d 95 |:............N-.| +00000040 c1 de 25 91 b2 1f b3 |..%....|" +"2019-07-20 02:39:39.098 UTC [cauthdsl] func2 -> DEBU 444 0xc000a9b050 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:39.098 UTC [cauthdsl] func1 -> DEBU 445 0xc000a9b050 gate 1563590379097124100 evaluation succeeds" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 448 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44a Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:39:39.098 UTC [policies] Evaluate -> DEBU 44b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 44c Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44d Processing field: HashingAlgorithm" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: OrdererAddresses" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 450 Processing field: Consortium" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: Capabilities" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: ConsensusType" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 454 Processing field: BatchSize" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 455 Processing field: BatchTimeout" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 456 Processing field: KafkaBrokers" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 457 Processing field: ChannelRestrictions" +"2019-07-20 02:39:39.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 458 Processing field: Capabilities" +"2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 459 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45a Processing field: Endpoints" +"2019-07-20 02:39:39.100 UTC [common.channelconfig] NewStandardValues -> DEBU 45b Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 45c Processing field: MSP" +"2019-07-20 02:39:39.100 UTC [common.channelconfig] validateMSP -> DEBU 45d Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:39.100 UTC [msp] newBccspMsp -> DEBU 45e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.100 UTC [msp] New -> DEBU 45f Creating Cache-MSP instance" +"2019-07-20 02:39:39.100 UTC [msp] Setup -> DEBU 460 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:39.101 UTC [msp.identity] newIdentity -> DEBU 461 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.102 UTC [msp.identity] newIdentity -> DEBU 462 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.103 UTC [msp] Validate -> DEBU 463 MSP OrdererMSP validating identity" +"2019-07-20 02:39:39.106 UTC [common.channelconfig] NewStandardValues -> DEBU 464 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: ACLs" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Capabilities" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 467 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 468 Processing field: AnchorPeers" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] NewStandardValues -> DEBU 469 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: MSP" +"2019-07-20 02:39:39.107 UTC [common.channelconfig] Validate -> DEBU 46b Anchor peers for org Org1MSP are " +"2019-07-20 02:39:39.107 UTC [common.channelconfig] validateMSP -> DEBU 46c Setting up MSP for org Org1MSP" +"2019-07-20 02:39:39.107 UTC [msp] newBccspMsp -> DEBU 46d Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.107 UTC [msp] New -> DEBU 46e Creating Cache-MSP instance" +"2019-07-20 02:39:39.107 UTC [msp] Setup -> DEBU 46f Setting up MSP instance Org1MSP" +"2019-07-20 02:39:39.107 UTC [msp.identity] newIdentity -> DEBU 470 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.108 UTC [msp.identity] newIdentity -> DEBU 471 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.108 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 472 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:39.108 UTC [msp] Validate -> DEBU 473 MSP Org1MSP validating identity" +"2019-07-20 02:39:39.108 UTC [msp] getCertificationChain -> DEBU 474 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.108 UTC [msp] hasOURole -> DEBU 475 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:39.109 UTC [msp] getCertificationChain -> DEBU 476 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 477 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 478 Processing field: AnchorPeers" +"2019-07-20 02:39:39.109 UTC [common.channelconfig] NewStandardValues -> DEBU 479 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47a Processing field: MSP" +"2019-07-20 02:39:39.109 UTC [common.channelconfig] Validate -> DEBU 47b Anchor peers for org Org2MSP are " +"2019-07-20 02:39:39.109 UTC [common.channelconfig] validateMSP -> DEBU 47c Setting up MSP for org Org2MSP" +"2019-07-20 02:39:39.109 UTC [msp] newBccspMsp -> DEBU 47d Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.109 UTC [msp] New -> DEBU 47e Creating Cache-MSP instance" +"2019-07-20 02:39:39.109 UTC [msp] Setup -> DEBU 47f Setting up MSP instance Org2MSP" +"2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 480 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.109 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.110 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 482 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:39.110 UTC [msp] Validate -> DEBU 483 MSP Org2MSP validating identity" +"2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 484 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.110 UTC [msp] hasOURole -> DEBU 485 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:39.110 UTC [msp] getCertificationChain -> DEBU 486 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 487 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:39.110 UTC [msp] Setup -> DEBU 488 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 489 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.110 UTC [policies] NewManagerImpl -> DEBU 48c Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48d Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48e Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 48f Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 490 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 491 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 492 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 493 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 494 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 495 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 499 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Readers for Channel" +"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49b Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Writers for Channel" +"2019-07-20 02:39:39.111 UTC [policies] GetPolicy -> DEBU 49d Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-07-20 02:39:39.111 UTC [policies] NewManagerImpl -> DEBU 49e Proposed new policy Admins for Channel" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:39.111 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:39.112 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.113 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.114 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d6 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d7 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.114 UTC [common.configtx] verifyDeltaSet -> DEBU 4d8 Processing change to key: [Group] /Channel/Application" +"2019-07-20 02:39:39.114 UTC [common.configtx] policyForItem -> DEBU 4d9 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4da Manager Channel looking up path []" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4db Manager Channel has managers Orderer" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dc Manager Channel has managers Application" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4dd Manager Channel looking up path [Application]" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4df Manager Channel has managers Application" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application looking up path []" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:39.114 UTC [policies] Manager -> DEBU 4e2 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:39.114 UTC [policies] Evaluate -> DEBU 4e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:39:39.114 UTC [msp] DeserializeIdentity -> DEBU 4e6 Obtaining identity" +"2019-07-20 02:39:39.114 UTC [msp.identity] newIdentity -> DEBU 4e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.114 UTC [cauthdsl] func1 -> DEBU 4e8 0xc000bb8980 gate 1563590379114969000 evaluation starts" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4e9 0xc000bb8980 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ea 0xc000bb8980 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4eb 0xc000bb8980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4ec 0xc000bb8980 principal evaluation fails" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4ed 0xc000bb8980 gate 1563590379114969000 evaluation fails" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ee Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f1 0xc000bb9b00 gate 1563590379115234200 evaluation starts" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f2 0xc000bb9b00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f3 0xc000bb9b00 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:39.115 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f4 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f5 0xc000bb9b00 principal matched by identity 0" +"2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f6 Verify: digest = 00000000 6f 70 eb 41 19 f6 82 19 30 b7 c5 f4 f6 5f 2f 51 |op.A....0...._/Q| +00000010 73 b7 46 41 df 6f 6f 5e eb 3f dd 53 b6 12 6b b8 |s.FA.oo^.?.S..k.|" +"2019-07-20 02:39:39.115 UTC [msp.identity] Verify -> DEBU 4f7 Verify: sig = 00000000 30 44 02 20 2f cc 30 9a 07 4c 89 25 66 17 0c a1 |0D. /.0..L.%f...| +00000010 54 af b6 5e 0d 5b d1 81 28 f0 94 1f f3 89 5e 20 |T..^.[..(.....^ | +00000020 03 a3 9f 04 02 20 41 e1 b4 72 42 f3 b8 46 df 81 |..... A..rB..F..| +00000030 1b ef 12 2c f8 be 1f 8b b6 a7 18 1d 99 92 da d2 |...,............| +00000040 b6 52 e0 6c 82 94 |.R.l..|" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func2 -> DEBU 4f8 0xc000bb9b00 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:39.115 UTC [cauthdsl] func1 -> DEBU 4f9 0xc000bb9b00 gate 1563590379115234200 evaluation succeeds" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fa Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fc Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.115 UTC [policies] Evaluate -> DEBU 4fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4fe Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 4ff Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 500 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 501 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.115 UTC [common.configtx] verifyDeltaSet -> DEBU 502 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.115 UTC [common.configtx] recurseConfigMap -> DEBU 503 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 504 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 505 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 506 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 507 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 508 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 509 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.116 UTC [common.configtx] recurseConfigMap -> DEBU 50d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 50f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 510 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 511 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 512 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 513 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 514 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 515 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 516 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 517 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 518 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.configtx] recurseConfigMap -> DEBU 519 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 51a Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51b Processing field: HashingAlgorithm" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51c Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51d Processing field: OrdererAddresses" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51e Processing field: Consortium" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 51f Processing field: Capabilities" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] NewStandardValues -> DEBU 520 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 521 Processing field: ConsensusType" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 522 Processing field: BatchSize" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 523 Processing field: BatchTimeout" +"2019-07-20 02:39:39.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 524 Processing field: KafkaBrokers" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 525 Processing field: ChannelRestrictions" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: Capabilities" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: Endpoints" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] NewStandardValues -> DEBU 529 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 52a Processing field: MSP" +"2019-07-20 02:39:39.118 UTC [common.channelconfig] validateMSP -> DEBU 52b Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:39.118 UTC [msp] newBccspMsp -> DEBU 52c Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.118 UTC [msp] New -> DEBU 52d Creating Cache-MSP instance" +"2019-07-20 02:39:39.118 UTC [msp] Setup -> DEBU 52e Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.118 UTC [msp.identity] newIdentity -> DEBU 530 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.119 UTC [msp] Validate -> DEBU 531 MSP OrdererMSP validating identity" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 532 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 533 Processing field: ACLs" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 534 Processing field: Capabilities" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 535 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 536 Processing field: AnchorPeers" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] NewStandardValues -> DEBU 537 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 538 Processing field: MSP" +"2019-07-20 02:39:39.119 UTC [common.channelconfig] Validate -> DEBU 539 Anchor peers for org Org2MSP are " +"2019-07-20 02:39:39.119 UTC [common.channelconfig] validateMSP -> DEBU 53a Setting up MSP for org Org2MSP" +"2019-07-20 02:39:39.119 UTC [msp] newBccspMsp -> DEBU 53b Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.119 UTC [msp] New -> DEBU 53c Creating Cache-MSP instance" +"2019-07-20 02:39:39.119 UTC [msp] Setup -> DEBU 53d Setting up MSP instance Org2MSP" +"2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.120 UTC [msp.identity] newIdentity -> DEBU 53f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.120 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 540 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:39.120 UTC [msp] Validate -> DEBU 541 MSP Org2MSP validating identity" +"2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 542 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.120 UTC [msp] hasOURole -> DEBU 543 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:39.120 UTC [msp] getCertificationChain -> DEBU 544 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 545 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 546 Processing field: AnchorPeers" +"2019-07-20 02:39:39.121 UTC [common.channelconfig] NewStandardValues -> DEBU 547 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.121 UTC [common.channelconfig] initializeProtosStruct -> DEBU 548 Processing field: MSP" +"2019-07-20 02:39:39.121 UTC [common.channelconfig] Validate -> DEBU 549 Anchor peers for org Org1MSP are " +"2019-07-20 02:39:39.121 UTC [common.channelconfig] validateMSP -> DEBU 54a Setting up MSP for org Org1MSP" +"2019-07-20 02:39:39.121 UTC [msp] newBccspMsp -> DEBU 54b Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.121 UTC [msp] New -> DEBU 54c Creating Cache-MSP instance" +"2019-07-20 02:39:39.121 UTC [msp] Setup -> DEBU 54d Setting up MSP instance Org1MSP" +"2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.121 UTC [msp.identity] newIdentity -> DEBU 54f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.122 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 550 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:39.122 UTC [msp] Validate -> DEBU 551 MSP Org1MSP validating identity" +"2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 552 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.122 UTC [msp] hasOURole -> DEBU 553 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:39.122 UTC [msp] getCertificationChain -> DEBU 554 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 555 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:39.122 UTC [msp] Setup -> DEBU 556 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 557 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 558 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 559 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55a Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55b Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:39.122 UTC [policies] NewManagerImpl -> DEBU 55c Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55d Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55e Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 55f Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 560 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 561 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 562 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 563 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 564 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 565 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 566 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 567 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 568 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 569 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56a Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56b Proposed new policy Admins for Channel" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56c Proposed new policy Readers for Channel" +"2019-07-20 02:39:39.123 UTC [policies] NewManagerImpl -> DEBU 56d Proposed new policy Writers for Channel" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:39.123 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57e Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 57f Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 580 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.124 UTC [common.configtx] addToMap -> DEBU 582 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 583 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 584 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 585 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 586 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 589 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58a Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 58f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 590 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 591 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 592 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 593 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 594 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 595 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 596 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 597 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 598 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:39.125 UTC [common.configtx] addToMap -> DEBU 599 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59a Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:39.125 UTC [common.capabilities] Supported -> DEBU 59b Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:39.126 UTC [orderer.common.cluster] NewStream -> DEBU 59c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-07-20 02:39:39.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 59d Send of SubmitRequest for channel testchainid with payload of size 24752 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +"2019-07-20 02:39:39.128 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 59e Sending msg of 24752 bytes to 3 on channel testchainid took 439.3µs" +"2019-07-20 02:39:39.128 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 59f [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39030" +"2019-07-20 02:39:39.132 UTC [common.deliver] deliverBlocks -> DEBU 5a0 Rejecting deliver for 172.18.0.9:39028 because channel businesschannel not found" +"2019-07-20 02:39:39.132 UTC [orderer.common.broadcast] Handle -> DEBU 5a1 Received EOF from 172.18.0.9:39030, hangup" +"2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a2 Closing Deliver stream" +"2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39028 grpc.code=OK grpc.call_duration=87.743ms +"2019-07-20 02:39:39.132 UTC [orderer.common.server] func1 -> DEBU 5a4 Closing Broadcast stream" +"2019-07-20 02:39:39.132 UTC [comm.grpc.server] 1 -> INFO 5a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39030 grpc.code=OK grpc.call_duration=58.5325ms +"2019-07-20 02:39:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 24963" +"2019-07-20 02:39:39.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5a7 Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2019-07-20 02:39:39.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +"2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5a9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5aa Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-07-20 02:39:39.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5ab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " +"2019-07-20 02:39:39.142 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ac Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5ad Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ae Processing field: HashingAlgorithm" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5af Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b0 Processing field: OrdererAddresses" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b1 Processing field: Consortium" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b2 Processing field: Capabilities" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] NewStandardValues -> DEBU 5b3 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b4 Processing field: ACLs" +"2019-07-20 02:39:39.142 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b5 Processing field: Capabilities" +"2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b7 Processing field: AnchorPeers" +"2019-07-20 02:39:39.143 UTC [common.channelconfig] NewStandardValues -> DEBU 5b8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.143 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5b9 Processing field: MSP" +"2019-07-20 02:39:39.143 UTC [common.channelconfig] Validate -> DEBU 5ba Anchor peers for org Org1MSP are " +"2019-07-20 02:39:39.143 UTC [common.channelconfig] validateMSP -> DEBU 5bb Setting up MSP for org Org1MSP" +"2019-07-20 02:39:39.143 UTC [msp] newBccspMsp -> DEBU 5bc Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.143 UTC [msp] New -> DEBU 5bd Creating Cache-MSP instance" +"2019-07-20 02:39:39.143 UTC [msp] Setup -> DEBU 5be Setting up MSP instance Org1MSP" +"2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.143 UTC [msp.identity] newIdentity -> DEBU 5c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.143 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5c1 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:39.143 UTC [msp] Validate -> DEBU 5c2 MSP Org1MSP validating identity" +"2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c3 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.144 UTC [msp] hasOURole -> DEBU 5c4 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:39.144 UTC [msp] getCertificationChain -> DEBU 5c5 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c7 Processing field: AnchorPeers" +"2019-07-20 02:39:39.144 UTC [common.channelconfig] NewStandardValues -> DEBU 5c8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.144 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c9 Processing field: MSP" +"2019-07-20 02:39:39.144 UTC [common.channelconfig] Validate -> DEBU 5ca Anchor peers for org Org2MSP are " +"2019-07-20 02:39:39.144 UTC [common.channelconfig] validateMSP -> DEBU 5cb Setting up MSP for org Org2MSP" +"2019-07-20 02:39:39.144 UTC [msp] newBccspMsp -> DEBU 5cc Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.144 UTC [msp] New -> DEBU 5cd Creating Cache-MSP instance" +"2019-07-20 02:39:39.144 UTC [msp] Setup -> DEBU 5ce Setting up MSP instance Org2MSP" +"2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.144 UTC [msp.identity] newIdentity -> DEBU 5d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.145 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5d1 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:39.145 UTC [msp] Validate -> DEBU 5d2 MSP Org2MSP validating identity" +"2019-07-20 02:39:39.145 UTC [msp] getCertificationChain -> DEBU 5d3 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.145 UTC [msp] hasOURole -> DEBU 5d4 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:39.146 UTC [msp] getCertificationChain -> DEBU 5d5 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:39.146 UTC [common.channelconfig] NewStandardValues -> DEBU 5d6 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d7 Processing field: ConsensusType" +"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d8 Processing field: BatchSize" +"2019-07-20 02:39:39.146 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5d9 Processing field: BatchTimeout" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: KafkaBrokers" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: ChannelRestrictions" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: Capabilities" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5dd Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Endpoints" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: MSP" +"2019-07-20 02:39:39.151 UTC [common.channelconfig] validateMSP -> DEBU 5e1 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:39.151 UTC [msp] newBccspMsp -> DEBU 5e2 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:39.151 UTC [msp] New -> DEBU 5e3 Creating Cache-MSP instance" +"2019-07-20 02:39:39.151 UTC [msp] Setup -> DEBU 5e4 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.151 UTC [msp.identity] newIdentity -> DEBU 5e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:39.152 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" +"2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e8 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:39.152 UTC [msp] Setup -> DEBU 5e9 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ea Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5eb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ec Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ed Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ee Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:39.152 UTC [policies] NewManagerImpl -> DEBU 5ef Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f0 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f1 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f3 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f5 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f6 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f7 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f8 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5f9 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fa Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fb Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fc Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fd Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5fe Proposed new policy Readers for Channel" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 5ff Proposed new policy Writers for Channel" +"2019-07-20 02:39:39.153 UTC [policies] NewManagerImpl -> DEBU 600 Proposed new policy Admins for Channel" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:39.158 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 610 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 611 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 612 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 613 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 614 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 615 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 616 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 617 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 618 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 619 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 61f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 620 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 621 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:39.163 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:39.164 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62d As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 62e As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 62f Manager Channel looking up path [Application]" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 630 Manager Channel has managers Orderer" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 631 Manager Channel has managers Application" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 632 Manager Channel/Application looking up path []" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 633 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 634 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 635 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 636 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 637 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 638 Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 639 Manager Channel has managers Orderer" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63a Manager Channel has managers Application" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63b Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:39.164 UTC [policies] Manager -> DEBU 63c Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:39.164 UTC [common.channelconfig] LogSanityChecks -> DEBU 63d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63e As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 63f As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:39.165 UTC [common.channelconfig] LogSanityChecks -> DEBU 640 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:39.165 UTC [common.capabilities] Supported -> DEBU 641 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:39.174 UTC [common.capabilities] Supported -> DEBU 642 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:39.174 UTC [fsblkstorage] newBlockfileMgr -> DEBU 643 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-07-20 02:39:39.174 UTC [kvledger.util] CreateDirIfMissing -> DEBU 644 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-07-20 02:39:39.174 UTC [kvledger.util] logDirStatus -> DEBU 645 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-07-20 02:39:39.175 UTC [kvledger.util] logDirStatus -> DEBU 646 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-07-20 02:39:39.175 UTC [fsblkstorage] newBlockfileMgr -> INFO 647 Getting block information from block storage" +"2019-07-20 02:39:39.175 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 648 Retrieving checkpoint info from block files" +"2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 649 retrieveLastFileSuffix()" +"2019-07-20 02:39:39.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 64a retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64b Last file number found = -1" +"2019-07-20 02:39:39.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 64c No block file found" +"2019-07-20 02:39:39.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 64d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0002be900)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-07-20 02:39:39.180 UTC [fsblkstorage] newBlockIndex -> DEBU 64e newBlockIndex() - indexItems:[[BlockNum]]" +"2019-07-20 02:39:39.180 UTC [orderer.common.server] func1 -> DEBU 64f Executing callback to update root CAs" +"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 650 updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 651 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 652 adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:39.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 653 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:39.211 UTC [fsblkstorage] indexBlock -> DEBU 654 Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= +txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +]" +"2019-07-20 02:39:39.228 UTC [fsblkstorage] updateCheckpoint -> DEBU 655 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23947], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-07-20 02:39:39.229 UTC [fsblkstorage] Next -> DEBU 656 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:39.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 657 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:39.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 658 Remaining bytes=[23947], Going to peek [8] bytes" +"2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 659 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:39.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 65a blockbytes [23944] read from file [0]" +"2019-07-20 02:39:39.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 65b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-07-20 02:39:39.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 65c EvictionSuspicion not set, defaulting to 10m0s" +"2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 65d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-07-20 02:39:39.234 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 65e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-07-20 02:39:39.247 UTC [orderer.common.server] Deliver -> DEBU 65f Starting new Deliver handler" +"2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 660 Starting new deliver loop for 172.18.0.9:39032" +"2019-07-20 02:39:39.247 UTC [common.deliver] Handle -> DEBU 661 Attempting to read seek info message from 172.18.0.9:39032" +"2019-07-20 02:39:39.248 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 662 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 663 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-07-20 02:39:39.253 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 664 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-07-20 02:39:39.253 UTC [fsblkstorage] Next -> DEBU 665 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:39.253 UTC [fsblkstorage] newBlockfileStream -> DEBU 666 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 667 Remaining bytes=[23947], Going to peek [8] bytes" +"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 668 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:39.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 669 blockbytes [23944] read from file [0]" +"2019-07-20 02:39:39.253 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 66a [channel: businesschannel] Done creating channel support resources" +"2019-07-20 02:39:39.254 UTC [orderer.commmon.multichannel] newChain -> INFO 66b Created and starting new chain businesschannel" +"2019-07-20 02:39:39.254 UTC [orderer.consensus.etcdraft] Start -> INFO 66c Starting Raft node" channel=businesschannel node=1 +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] Configure -> INFO 66d Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +]" +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 66f Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] func1 -> DEBU 670 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 671 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-07-20 02:39:39.255 UTC [orderer.common.cluster] updateStubInMapping -> INFO 672 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] func1 -> DEBU 673 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 674 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 675 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-07-20 02:39:39.256 UTC [orderer.common.cluster] Configure -> INFO 676 Exiting" +"2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> DEBU 677 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-07-20 02:39:39.256 UTC [orderer.consensus.etcdraft] start -> INFO 678 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 679 1 became follower at term 0" channel=businesschannel node=1 +"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] newRaft -> INFO 67a newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-07-20 02:39:39.257 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 67b 1 became follower at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:39.258 UTC [orderer.consensus.etcdraft] run -> INFO 67c This node is picked to start campaign" channel=businesschannel node=1 +"2019-07-20 02:39:39.259 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 67d [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-07-20 02:39:39.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 67e Obtaining default signing identity" +"2019-07-20 02:39:39.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 67f Obtaining default signing identity" +"2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 680 Sign: plaintext: 0A00120B0A090A03010203100418050A...077E55C999B3556466F594DE3B047CB5 " +"2019-07-20 02:39:39.261 UTC [msp.identity] Sign -> DEBU 681 Sign: digest: AEA4BEA9C2F4D3EC03C57972E641FFA37F4FFC7DA1BDC0A89540566538A541D6 " +"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 682 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 683 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-07-20 02:39:39.263 UTC [orderer.consensus.etcdraft] apply -> INFO 684 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-07-20 02:39:39.265 UTC [fsblkstorage] indexBlock -> DEBU 685 Indexing block [blockNum=1, blockHash=[]byte{0xf, 0x5c, 0xba, 0x1d, 0x96, 0x7b, 0x97, 0x7d, 0x56, 0xde, 0x67, 0xed, 0x27, 0xfc, 0x3b, 0x1d, 0xb7, 0xa5, 0x53, 0x81, 0xfd, 0xea, 0xcb, 0x6e, 0x75, 0x92, 0x64, 0x72, 0x6a, 0xb2, 0x7b, 0xc6} txOffsets= +txId=2f78a887aca86ed201b3eecf6235b46f50837a1005a59ced8b90e723e89181de locPointer=offset=71, bytesLength=24832 +]" +"2019-07-20 02:39:39.267 UTC [fsblkstorage] updateCheckpoint -> DEBU 686 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44254], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-07-20 02:39:39.267 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 687 [channel: testchainid] Wrote block [1]" +"2019-07-20 02:39:39.454 UTC [common.deliver] deliverBlocks -> WARN 688 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39032 because of consenter error" +"2019-07-20 02:39:39.455 UTC [orderer.common.server] func1 -> DEBU 689 Closing Deliver stream" +"2019-07-20 02:39:39.455 UTC [comm.grpc.server] 1 -> INFO 68a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39032 grpc.code=OK grpc.call_duration=208.0585ms +"2019-07-20 02:39:39.470 UTC [orderer.common.server] Deliver -> DEBU 68b Starting new Deliver handler" +"2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68c Starting new deliver loop for 172.18.0.9:39034" +"2019-07-20 02:39:39.471 UTC [common.deliver] Handle -> DEBU 68d Attempting to read seek info message from 172.18.0.9:39034" +"2019-07-20 02:39:39.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 68e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:39.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68f Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-07-20 02:39:39.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 690 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.6µs " +"2019-07-20 02:39:39.673 UTC [common.deliver] deliverBlocks -> WARN 691 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39034 because of consenter error" +"2019-07-20 02:39:39.673 UTC [orderer.common.server] func1 -> DEBU 692 Closing Deliver stream" +"2019-07-20 02:39:39.673 UTC [comm.grpc.server] 1 -> INFO 693 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39034 grpc.code=OK grpc.call_duration=203.0503ms +"2019-07-20 02:39:39.698 UTC [orderer.common.server] Deliver -> DEBU 694 Starting new Deliver handler" +"2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 695 Starting new deliver loop for 172.18.0.9:39036" +"2019-07-20 02:39:39.699 UTC [common.deliver] Handle -> DEBU 696 Attempting to read seek info message from 172.18.0.9:39036" +"2019-07-20 02:39:39.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU 697 No inactive chains to try to replicate" +"2019-07-20 02:39:39.903 UTC [common.deliver] deliverBlocks -> WARN 698 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39036 because of consenter error" +"2019-07-20 02:39:39.904 UTC [orderer.common.server] func1 -> DEBU 699 Closing Deliver stream" +"2019-07-20 02:39:39.904 UTC [comm.grpc.server] 1 -> INFO 69a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39036 grpc.code=OK grpc.call_duration=206.494ms +"2019-07-20 02:39:39.921 UTC [orderer.common.server] Deliver -> DEBU 69b Starting new Deliver handler" +"2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69c Starting new deliver loop for 172.18.0.9:39038" +"2019-07-20 02:39:39.922 UTC [common.deliver] Handle -> DEBU 69d Attempting to read seek info message from 172.18.0.9:39038" +"2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 69e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:40.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69f Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +"2019-07-20 02:39:40.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +"2019-07-20 02:39:40.123 UTC [common.deliver] deliverBlocks -> WARN 6a1 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39038 because of consenter error" +"2019-07-20 02:39:40.124 UTC [orderer.common.server] func1 -> DEBU 6a2 Closing Deliver stream" +"2019-07-20 02:39:40.124 UTC [comm.grpc.server] 1 -> INFO 6a3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39038 grpc.code=OK grpc.call_duration=202.4616ms +"2019-07-20 02:39:40.149 UTC [orderer.common.server] Deliver -> DEBU 6a4 Starting new Deliver handler" +"2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a5 Starting new deliver loop for 172.18.0.9:39040" +"2019-07-20 02:39:40.149 UTC [common.deliver] Handle -> DEBU 6a6 Attempting to read seek info message from 172.18.0.9:39040" +"2019-07-20 02:39:40.259 UTC [orderer.consensus.etcdraft] Step -> INFO 6a7 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6a8 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.260 UTC [orderer.consensus.etcdraft] poll -> INFO 6a9 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6aa 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.261 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ab 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.262 UTC [orderer.common.cluster] NewStream -> DEBU 6ac Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-07-20 02:39:40.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 2 on channel businesschannel took 798.9µs" +"2019-07-20 02:39:40.263 UTC [orderer.common.cluster] NewStream -> DEBU 6ae Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-07-20 02:39:40.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel businesschannel took 422.9µs" +"2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.5µs " +"2019-07-20 02:39:40.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.8µs " +"2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b2 Connection from orderer1.example.com(172.18.0.3:47792)" +"2019-07-20 02:39:40.270 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.269 UTC [orderer.common.cluster] Step -> DEBU 6b3 Connection from orderer2.example.com(172.18.0.4:54782)" +"2019-07-20 02:39:40.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.270 UTC [orderer.consensus.etcdraft] poll -> INFO 6b6 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.271 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6b7 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6b8 1 became candidate at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] poll -> INFO 6b9 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ba 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.272 UTC [orderer.consensus.etcdraft] campaign -> INFO 6bb 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.275 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-07-20 02:39:40.276 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6be Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" +"2019-07-20 02:39:40.276 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " +"2019-07-20 02:39:40.278 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " +"2019-07-20 02:39:40.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] poll -> INFO 6c1 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6c2 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6c3 1 became leader at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.283 UTC [orderer.consensus.etcdraft] run -> INFO 6c4 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-07-20 02:39:40.284 UTC [orderer.consensus.etcdraft] run -> INFO 6c5 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c6 Sending msg of 36 bytes to 2 on channel businesschannel took 18.1µs" +"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 36 bytes to 3 on channel businesschannel took 9.6µs" +"2019-07-20 02:39:40.287 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 129.7µs " +"2019-07-20 02:39:40.288 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6cc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.285 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c8 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 77.1µs " +"2019-07-20 02:39:40.285 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6c9 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6cd There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-07-20 02:39:40.284 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.291 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-07-20 02:39:40.291 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " +"2019-07-20 02:39:40.292 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6d1 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-07-20 02:39:40.295 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.303 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2019-07-20 02:39:40.303 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " +"2019-07-20 02:39:40.304 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:39:40.352 UTC [policies] Evaluate -> DEBU 6d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:40.353 UTC [policies] Evaluate -> DEBU 6da == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:39:40.354 UTC [msp] DeserializeIdentity -> DEBU 6db Obtaining identity" +"2019-07-20 02:39:40.354 UTC [msp.identity] newIdentity -> DEBU 6dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.354 UTC [cauthdsl] func1 -> DEBU 6dd 0xc000b19be0 gate 1563590380354833100 evaluation starts" +"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6de 0xc000b19be0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6df 0xc000b19be0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e0 0xc000b19be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-07-20 02:39:40.355 UTC [cauthdsl] func2 -> DEBU 6e1 0xc000b19be0 principal evaluation fails" +"2019-07-20 02:39:40.355 UTC [cauthdsl] func1 -> DEBU 6e2 0xc000b19be0 gate 1563590380354833100 evaluation fails" +"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e3 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:40.356 UTC [policies] func1 -> DEBU 6e5 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e6 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:39:40.356 UTC [policies] Evaluate -> DEBU 6e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:40.357 UTC [policies] Evaluate -> DEBU 6ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:40.357 UTC [cauthdsl] func1 -> DEBU 6eb 0xc000b3d210 gate 1563590380357524400 evaluation starts" +"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ec 0xc000b3d210 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ed 0xc000b3d210 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:40.357 UTC [cauthdsl] func2 -> DEBU 6ee 0xc000b3d210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:40.358 UTC [cauthdsl] func2 -> DEBU 6ef 0xc000b3d210 principal evaluation fails" +"2019-07-20 02:39:40.358 UTC [cauthdsl] func1 -> DEBU 6f0 0xc000b3d210 gate 1563590380357524400 evaluation fails" +"2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:40.358 UTC [policies] Evaluate -> DEBU 6f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:40.359 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:40.359 UTC [cauthdsl] func1 -> DEBU 6f4 0xc000b3da70 gate 1563590380359582400 evaluation starts" +"2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f5 0xc000b3da70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:40.359 UTC [cauthdsl] func2 -> DEBU 6f6 0xc000b3da70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:40.359 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6f7 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:40.360 UTC [msp] Validate -> DEBU 6f8 MSP Org1MSP validating identity" +"2019-07-20 02:39:40.360 UTC [msp] getCertificationChain -> DEBU 6f9 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:40.360 UTC [cauthdsl] func2 -> DEBU 6fa 0xc000b3da70 principal matched by identity 0" +"2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fb Verify: digest = 00000000 09 2c 72 fc ea 8e d5 fa 55 c5 cb c8 76 a3 20 ed |.,r.....U...v. .| +00000010 d8 f5 8f 8b c9 a0 b2 66 d3 5a d0 00 9a 3b 5b c3 |.......f.Z...;[.|" +"2019-07-20 02:39:40.360 UTC [msp.identity] Verify -> DEBU 6fc Verify: sig = 00000000 30 44 02 21 00 fe 75 e0 47 08 50 1a 90 6c 0e 42 |0D.!..u.G.P..l.B| +00000010 dd d4 06 4f f2 2b 0c 8f 75 9f d2 8b 5d 3d 20 f2 |...O.+..u...]= .| +00000020 66 7b 07 72 98 02 1f 75 ed 66 f7 b4 5b 99 b6 17 |f{.r...u.f..[...| +00000030 5e fb 78 3d 43 aa 35 b8 31 c3 0c e8 17 00 2f f2 |^.x=C.5.1...../.| +00000040 eb fe 9f bc 6b fc |....k.|" +"2019-07-20 02:39:40.361 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000b3da70 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:40.361 UTC [cauthdsl] func1 -> DEBU 6fe 0xc000b3da70 gate 1563590380359582400 evaluation succeeds" +"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 6ff Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:40.361 UTC [policies] Evaluate -> DEBU 701 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 702 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 703 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:39:40.362 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:39:40.362 UTC [common.deliver] deliverBlocks -> DEBU 705 [channel: businesschannel] Received seekInfo (0xc0008d08c0) start: > stop: > from 172.18.0.9:39040" +"2019-07-20 02:39:40.362 UTC [fsblkstorage] Next -> DEBU 706 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-07-20 02:39:40.362 UTC [fsblkstorage] newBlockfileStream -> DEBU 707 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 708 Remaining bytes=[23947], Going to peek [8] bytes" +"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 709 Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:39:40.363 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 70a blockbytes [23944] read from file [0]" +"2019-07-20 02:39:40.363 UTC [common.deliver] deliverBlocks -> DEBU 70b [channel: businesschannel] Delivering block for (0xc0008d08c0) for 172.18.0.9:39040" +"2019-07-20 02:39:40.364 UTC [common.deliver] deliverBlocks -> DEBU 70c [channel: businesschannel] Done delivering to 172.18.0.9:39040 for (0xc0008d08c0)" +"2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70d Waiting for new SeekInfo from 172.18.0.9:39040" +"2019-07-20 02:39:40.364 UTC [common.deliver] Handle -> DEBU 70e Attempting to read seek info message from 172.18.0.9:39040" +"2019-07-20 02:39:40.368 UTC [grpc] infof -> DEBU 70f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.368 UTC [grpc] warningf -> DEBU 710 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39040: read: connection reset by peer" +"2019-07-20 02:39:40.369 UTC [common.deliver] Handle -> WARN 711 Error reading from 172.18.0.9:39040: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:40.369 UTC [orderer.common.server] func1 -> DEBU 712 Closing Deliver stream" +"2019-07-20 02:39:40.370 UTC [comm.grpc.server] 1 -> INFO 713 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39040 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=221.1565ms +"2019-07-20 02:39:40.371 UTC [grpc] infof -> DEBU 714 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 715 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 716 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.372 UTC [grpc] infof -> DEBU 717 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 718 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.373 UTC [grpc] infof -> DEBU 719 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:40.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-07-20 02:39:40.504 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +"2019-07-20 02:39:40.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-07-20 02:39:40.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " +"2019-07-20 02:39:40.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62µs " +"2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:40.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:41.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:41.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-07-20 02:39:41.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 726 Sending msg of 28 bytes to 2 on channel businesschannel took 54.9µs" +"2019-07-20 02:39:41.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 727 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +"2019-07-20 02:39:41.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 728 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278µs " +"2019-07-20 02:39:41.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 729 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.3µs " +"2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:41.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:41.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:41.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72d Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +"2019-07-20 02:39:41.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU 72e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.3µs " +"2019-07-20 02:39:41.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-07-20 02:39:41.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 730 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-07-20 02:39:41.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 731 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.7µs " +"2019-07-20 02:39:41.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 732 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 728µs " +"2019-07-20 02:39:41.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 733 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 734 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:42.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 736 Sending msg of 28 bytes to 3 on channel testchainid took 39.2µs" +"2019-07-20 02:39:42.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 737 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.6µs " +"2019-07-20 02:39:42.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2019-07-20 02:39:42.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 739 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 588.6µs " +"2019-07-20 02:39:42.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.5µs " +"2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:42.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:42.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:42.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73f Sending msg of 28 bytes to 3 on channel testchainid took 471.2µs" +"2019-07-20 02:39:42.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU 740 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " +"2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-07-20 02:39:42.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 742 Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-07-20 02:39:42.758 UTC [orderer.common.cluster.step] sendMessage -> DEBU 743 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.6µs " +"2019-07-20 02:39:42.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU 744 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " +"2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:42.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU 746 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:43.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2019-07-20 02:39:43.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU 749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +"2019-07-20 02:39:43.134 UTC [orderer.common.server] Deliver -> DEBU 74a Starting new Deliver handler" +"2019-07-20 02:39:43.134 UTC [common.deliver] Handle -> DEBU 74b Starting new deliver loop for 172.18.0.9:39066" +"2019-07-20 02:39:43.135 UTC [common.deliver] Handle -> DEBU 74c Attempting to read seek info message from 172.18.0.9:39066" +"2019-07-20 02:39:43.157 UTC [orderer.common.server] Broadcast -> DEBU 74d Starting new Broadcast handler" +"2019-07-20 02:39:43.157 UTC [orderer.common.broadcast] Handle -> DEBU 74e Starting new broadcast loop for 172.18.0.9:39068" +"2019-07-20 02:39:43.158 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 74f [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39068" +"2019-07-20 02:39:43.158 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 750 Processing config update message for channel businesschannel" +"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 751 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 752 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:43.158 UTC [policies] Evaluate -> DEBU 753 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 754 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:43.159 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:43.159 UTC [cauthdsl] func1 -> DEBU 756 0xc0001a8150 gate 1563590383159486800 evaluation starts" +"2019-07-20 02:39:43.159 UTC [cauthdsl] func2 -> DEBU 757 0xc0001a8150 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 758 0xc0001a8150 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 759 0xc0001a8150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-07-20 02:39:43.160 UTC [cauthdsl] func2 -> DEBU 75a 0xc0001a8150 principal evaluation fails" +"2019-07-20 02:39:43.161 UTC [cauthdsl] func1 -> DEBU 75b 0xc0001a8150 gate 1563590383159486800 evaluation fails" +"2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75c Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.162 UTC [policies] Evaluate -> DEBU 75d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.162 UTC [policies] func1 -> DEBU 75e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 75f Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 760 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:39:43.163 UTC [policies] Evaluate -> DEBU 761 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 762 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:43.164 UTC [policies] Evaluate -> DEBU 763 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:39:43.164 UTC [cauthdsl] func1 -> DEBU 764 0xc0001a8f50 gate 1563590383164442500 evaluation starts" +"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 765 0xc0001a8f50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 766 0xc0001a8f50 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 767 0xc0001a8f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:43.165 UTC [cauthdsl] func2 -> DEBU 768 0xc0001a8f50 principal evaluation fails" +"2019-07-20 02:39:43.165 UTC [cauthdsl] func1 -> DEBU 769 0xc0001a8f50 gate 1563590383164442500 evaluation fails" +"2019-07-20 02:39:43.165 UTC [policies] Evaluate -> DEBU 76a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:43.166 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:39:43.166 UTC [cauthdsl] func1 -> DEBU 76d 0xc0001a9b50 gate 1563590383166471700 evaluation starts" +"2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76e 0xc0001a9b50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.166 UTC [cauthdsl] func2 -> DEBU 76f 0xc0001a9b50 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.167 UTC [cauthdsl] func2 -> DEBU 770 0xc0001a9b50 principal matched by identity 0" +"2019-07-20 02:39:43.167 UTC [msp.identity] Verify -> DEBU 771 Verify: digest = 00000000 f1 1b b5 a4 11 0d ee 67 25 3d 7c 6e 69 a9 1b 10 |.......g%=|ni...| +00000010 c8 ab 62 3e 3c 3f 38 1c 1b 90 39 69 1e 40 58 73 |..b> DEBU 772 Verify: sig = 00000000 30 45 02 21 00 a5 b2 eb 66 85 66 e3 74 0f c5 bc |0E.!....f.f.t...| +00000010 6e 5d 06 96 f7 40 aa 52 1f 88 be 6b 38 37 91 26 |n]...@.R...k87.&| +00000020 b1 4e 79 81 c1 02 20 21 ce 28 3d c0 b1 e8 7b 02 |.Ny... !.(=...{.| +00000030 3e 75 4f 40 57 45 97 3a f8 7f b4 17 5c 22 85 f4 |>uO@WE.:....\"..| +00000040 ea d1 33 a7 e2 d5 e5 |..3....|" +"2019-07-20 02:39:43.168 UTC [cauthdsl] func2 -> DEBU 773 0xc0001a9b50 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:43.168 UTC [cauthdsl] func1 -> DEBU 774 0xc0001a9b50 gate 1563590383166471700 evaluation succeeds" +"2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 775 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.168 UTC [policies] Evaluate -> DEBU 776 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 777 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 778 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 779 Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:39:43.169 UTC [policies] Evaluate -> DEBU 77a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:39:43.169 UTC [common.configtx] addToMap -> DEBU 77b Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.170 UTC [common.configtx] addToMap -> DEBU 77c Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77d Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 77f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 780 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 781 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.171 UTC [common.configtx] addToMap -> DEBU 782 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 783 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 784 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 785 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 786 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.172 UTC [common.configtx] addToMap -> DEBU 787 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 788 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 789 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.173 UTC [common.configtx] addToMap -> DEBU 78b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.173 UTC [common.configtx] verifyDeltaSet -> DEBU 78c Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.173 UTC [common.configtx] policyForItem -> DEBU 78d Getting policy for item Org1MSP with mod_policy Admins" +"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78e Manager Channel looking up path [Application]" +"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 78f Manager Channel has managers Orderer" +"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 790 Manager Channel has managers Application" +"2019-07-20 02:39:43.173 UTC [policies] Manager -> DEBU 791 Manager Channel/Application looking up path []" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 792 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 793 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 794 Manager Channel/Application looking up path [Org1MSP]" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 795 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 796 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.174 UTC [policies] Manager -> DEBU 797 Manager Channel/Application/Org1MSP looking up path []" +"2019-07-20 02:39:43.174 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:39:43.174 UTC [cauthdsl] func1 -> DEBU 799 0xc000321400 gate 1563590383174605800 evaluation starts" +"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79a 0xc000321400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79b 0xc000321400 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 79c Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:43.174 UTC [cauthdsl] func2 -> DEBU 79d 0xc000321400 principal matched by identity 0" +"2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79e Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +"2019-07-20 02:39:43.175 UTC [msp.identity] Verify -> DEBU 79f Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +"2019-07-20 02:39:43.175 UTC [cauthdsl] func2 -> DEBU 7a0 0xc000321400 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:43.175 UTC [cauthdsl] func1 -> DEBU 7a1 0xc000321400 gate 1563590383174605800 evaluation succeeds" +"2019-07-20 02:39:43.175 UTC [policies] Evaluate -> DEBU 7a2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.176 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.176 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.176 UTC [common.configtx] recurseConfigMap -> DEBU 7a6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7a9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7aa Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ab Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ac Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ad Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.177 UTC [common.configtx] recurseConfigMap -> DEBU 7ae Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7af Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b0 Setting policy for key Readers to " +"2019-07-20 02:39:43.178 UTC [common.configtx] recurseConfigMap -> DEBU 7b1 Setting policy for key Writers to " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b2 Setting policy for key Admins to " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b3 Setting policy for key Endorsement to " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.180 UTC [common.configtx] recurseConfigMap -> DEBU 7b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7ba Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.181 UTC [common.configtx] recurseConfigMap -> DEBU 7bb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7bc Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bd Processing field: HashingAlgorithm" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7be Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7bf Processing field: OrdererAddresses" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c0 Processing field: Consortium" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c1 Processing field: Capabilities" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c2 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c3 Processing field: ACLs" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c4 Processing field: Capabilities" +"2019-07-20 02:39:43.181 UTC [common.channelconfig] NewStandardValues -> DEBU 7c5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c6 Processing field: AnchorPeers" +"2019-07-20 02:39:43.182 UTC [common.channelconfig] NewStandardValues -> DEBU 7c7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7c8 Processing field: MSP" +"2019-07-20 02:39:43.182 UTC [common.channelconfig] Validate -> DEBU 7c9 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:43.182 UTC [common.channelconfig] validateMSP -> DEBU 7ca Setting up MSP for org Org1MSP" +"2019-07-20 02:39:43.182 UTC [msp] newBccspMsp -> DEBU 7cb Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.182 UTC [msp] New -> DEBU 7cc Creating Cache-MSP instance" +"2019-07-20 02:39:43.182 UTC [msp] Setup -> DEBU 7cd Setting up MSP instance Org1MSP" +"2019-07-20 02:39:43.183 UTC [msp.identity] newIdentity -> DEBU 7ce Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.184 UTC [msp.identity] newIdentity -> DEBU 7cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.185 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7d0 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:43.185 UTC [msp] Validate -> DEBU 7d1 MSP Org1MSP validating identity" +"2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d2 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.185 UTC [msp] hasOURole -> DEBU 7d3 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:43.185 UTC [msp] getCertificationChain -> DEBU 7d4 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d6 Processing field: AnchorPeers" +"2019-07-20 02:39:43.185 UTC [common.channelconfig] NewStandardValues -> DEBU 7d7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.185 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d8 Processing field: MSP" +"2019-07-20 02:39:43.186 UTC [common.channelconfig] Validate -> DEBU 7d9 Anchor peers for org Org2MSP are " +"2019-07-20 02:39:43.186 UTC [common.channelconfig] validateMSP -> DEBU 7da Setting up MSP for org Org2MSP" +"2019-07-20 02:39:43.186 UTC [msp] newBccspMsp -> DEBU 7db Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.186 UTC [msp] New -> DEBU 7dc Creating Cache-MSP instance" +"2019-07-20 02:39:43.186 UTC [msp] Setup -> DEBU 7dd Setting up MSP instance Org2MSP" +"2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7de Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.186 UTC [msp.identity] newIdentity -> DEBU 7df Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.187 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7e0 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:43.187 UTC [msp] Validate -> DEBU 7e1 MSP Org2MSP validating identity" +"2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e2 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.187 UTC [msp] hasOURole -> DEBU 7e3 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:43.187 UTC [msp] getCertificationChain -> DEBU 7e4 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.187 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:43.187 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: ConsensusType" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e7 Processing field: BatchSize" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: BatchTimeout" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e9 Processing field: KafkaBrokers" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ea Processing field: ChannelRestrictions" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7eb Processing field: Capabilities" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ec Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ed Processing field: Endpoints" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: MSP" +"2019-07-20 02:39:43.188 UTC [common.channelconfig] validateMSP -> DEBU 7f0 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:43.188 UTC [msp] newBccspMsp -> DEBU 7f1 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.188 UTC [msp] New -> DEBU 7f2 Creating Cache-MSP instance" +"2019-07-20 02:39:43.188 UTC [msp] Setup -> DEBU 7f3 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.189 UTC [msp.identity] newIdentity -> DEBU 7f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.189 UTC [msp] Validate -> DEBU 7f6 MSP OrdererMSP validating identity" +"2019-07-20 02:39:43.189 UTC [msp] Setup -> DEBU 7f7 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:43.190 UTC [msp] Setup -> DEBU 7f8 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7f9 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fa Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fb Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fc Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fd Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7fe Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.190 UTC [policies] NewManagerImpl -> DEBU 7ff Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 800 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 801 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 802 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 803 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 804 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 805 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 806 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.191 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:43.192 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy Writers for Channel" +"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel" +"2019-07-20 02:39:43.193 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Readers for Channel" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 811 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 812 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 813 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 814 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 815 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 816 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 817 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.193 UTC [common.configtx] addToMap -> DEBU 818 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:43.194 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:43.195 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:43.196 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:43.197 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:43.197 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 83f Manager Channel looking up path [Application]" +"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 840 Manager Channel has managers Application" +"2019-07-20 02:39:43.197 UTC [policies] Manager -> DEBU 841 Manager Channel has managers Orderer" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 842 Manager Channel/Application looking up path []" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 843 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 844 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 845 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 846 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 847 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 848 Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 849 Manager Channel has managers Application" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84a Manager Channel has managers Orderer" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84b Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:43.198 UTC [policies] Manager -> DEBU 84c Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:43.198 UTC [common.channelconfig] LogSanityChecks -> DEBU 84d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84e As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 84f As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:43.199 UTC [common.channelconfig] LogSanityChecks -> DEBU 850 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 851 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:43.199 UTC [common.capabilities] Supported -> DEBU 852 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 853 Obtaining default signing identity" +"2019-07-20 02:39:43.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 854 Obtaining default signing identity" +"2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 855 Sign: plaintext: 0AD2060A1B08011A0608EFFDC9E90522...3AF87FB4175C2285F4EAD133A7E2D5E5 " +"2019-07-20 02:39:43.199 UTC [msp.identity] Sign -> DEBU 856 Sign: digest: 2535EC334577C737BEBB3855C9646EDF0B2D1FD1FCFCDD1E862154A654C9A8DA " +"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 857 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 858 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 859 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:43.200 UTC [policies] Evaluate -> DEBU 85b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:43.200 UTC [msp] DeserializeIdentity -> DEBU 85c Obtaining identity" +"2019-07-20 02:39:43.201 UTC [msp.identity] newIdentity -> DEBU 85d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.201 UTC [cauthdsl] func1 -> DEBU 85e 0xc000c5d020 gate 1563590383201372400 evaluation starts" +"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 85f 0xc000c5d020 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 860 0xc000c5d020 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.201 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 861 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:39:43.201 UTC [msp] Validate -> DEBU 862 MSP OrdererMSP validating identity" +"2019-07-20 02:39:43.201 UTC [cauthdsl] func2 -> DEBU 863 0xc000c5d020 principal matched by identity 0" +"2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 864 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| +00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" +"2019-07-20 02:39:43.202 UTC [msp.identity] Verify -> DEBU 865 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| +00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| +00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| +00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| +00000040 dd aa 68 72 78 34 |..hrx4|" +"2019-07-20 02:39:43.202 UTC [cauthdsl] func2 -> DEBU 866 0xc000c5d020 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:43.202 UTC [cauthdsl] func1 -> DEBU 867 0xc000c5d020 gate 1563590383201372400 evaluation succeeds" +"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 868 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 869 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.202 UTC [policies] Evaluate -> DEBU 86a Signature set satisfies policy /Channel/Orderer/Writers" +"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86c Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:39:43.203 UTC [policies] Evaluate -> DEBU 86d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:39:43.203 UTC [orderer.common.msgprocessor] Apply -> DEBU 86e Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-07-20 02:39:43.203 UTC [common.channelconfig] NewStandardValues -> DEBU 86f Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 870 Processing field: HashingAlgorithm" +"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 871 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 872 Processing field: OrdererAddresses" +"2019-07-20 02:39:43.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 873 Processing field: Consortium" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 874 Processing field: Capabilities" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 875 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 876 Processing field: ACLs" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 877 Processing field: Capabilities" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 878 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 879 Processing field: AnchorPeers" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] NewStandardValues -> DEBU 87a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87b Processing field: MSP" +"2019-07-20 02:39:43.204 UTC [common.channelconfig] Validate -> DEBU 87c Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:43.204 UTC [common.channelconfig] validateMSP -> DEBU 87d Setting up MSP for org Org1MSP" +"2019-07-20 02:39:43.204 UTC [msp] newBccspMsp -> DEBU 87e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.204 UTC [msp] New -> DEBU 87f Creating Cache-MSP instance" +"2019-07-20 02:39:43.205 UTC [msp] Setup -> DEBU 880 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 881 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.205 UTC [msp.identity] newIdentity -> DEBU 882 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.205 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 883 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:43.206 UTC [msp] Validate -> DEBU 884 MSP Org1MSP validating identity" +"2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 885 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.206 UTC [msp] hasOURole -> DEBU 886 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:43.206 UTC [msp] getCertificationChain -> DEBU 887 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 888 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.206 UTC [common.channelconfig] initializeProtosStruct -> DEBU 889 Processing field: AnchorPeers" +"2019-07-20 02:39:43.206 UTC [common.channelconfig] NewStandardValues -> DEBU 88a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.207 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88b Processing field: MSP" +"2019-07-20 02:39:43.207 UTC [common.channelconfig] Validate -> DEBU 88c Anchor peers for org Org2MSP are " +"2019-07-20 02:39:43.207 UTC [common.channelconfig] validateMSP -> DEBU 88d Setting up MSP for org Org2MSP" +"2019-07-20 02:39:43.207 UTC [msp] newBccspMsp -> DEBU 88e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.207 UTC [msp] New -> DEBU 88f Creating Cache-MSP instance" +"2019-07-20 02:39:43.207 UTC [msp] Setup -> DEBU 890 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 891 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.207 UTC [msp.identity] newIdentity -> DEBU 892 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.208 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 893 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:43.208 UTC [msp] Validate -> DEBU 894 MSP Org2MSP validating identity" +"2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 895 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.208 UTC [msp] hasOURole -> DEBU 896 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:43.208 UTC [msp] getCertificationChain -> DEBU 897 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.208 UTC [common.channelconfig] NewStandardValues -> DEBU 898 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 899 Processing field: ConsensusType" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89a Processing field: BatchSize" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89b Processing field: BatchTimeout" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: KafkaBrokers" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: ChannelRestrictions" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: Capabilities" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 89f Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: Endpoints" +"2019-07-20 02:39:43.209 UTC [common.channelconfig] NewStandardValues -> DEBU 8a1 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.210 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: MSP" +"2019-07-20 02:39:43.210 UTC [common.channelconfig] validateMSP -> DEBU 8a3 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:43.210 UTC [msp] newBccspMsp -> DEBU 8a4 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.210 UTC [msp] New -> DEBU 8a5 Creating Cache-MSP instance" +"2019-07-20 02:39:43.210 UTC [msp] Setup -> DEBU 8a6 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:43.210 UTC [msp.identity] newIdentity -> DEBU 8a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.211 UTC [msp.identity] newIdentity -> DEBU 8a8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.211 UTC [msp] Validate -> DEBU 8a9 MSP OrdererMSP validating identity" +"2019-07-20 02:39:43.213 UTC [msp] Setup -> DEBU 8aa Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:43.214 UTC [msp] Setup -> DEBU 8ab MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ac Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.214 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:43.215 UTC [policies] NewManagerImpl -> DEBU 8be Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c0 Proposed new policy Writers for Channel" +"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Admins for Channel" +"2019-07-20 02:39:43.216 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Readers for Channel" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c3 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c4 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.217 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:43.218 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:43.219 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:43.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f0 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39068" +"2019-07-20 02:39:43.220 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:39:43.225 UTC [common.deliver] Handle -> WARN 8f2 Error reading from 172.18.0.9:39066: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:43.226 UTC [orderer.common.server] func1 -> DEBU 8f3 Closing Deliver stream" +"2019-07-20 02:39:43.226 UTC [comm.grpc.server] 1 -> INFO 8f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.6637ms +"2019-07-20 02:39:43.227 UTC [orderer.common.broadcast] Handle -> WARN 8f5 Error reading from 172.18.0.9:39068: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:43.227 UTC [orderer.common.server] func1 -> DEBU 8f6 Closing Broadcast stream" +"2019-07-20 02:39:43.227 UTC [comm.grpc.server] 1 -> INFO 8f7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=70.1227ms +"2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:43.227 UTC [grpc] infof -> DEBU 8f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:43.228 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8fa Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-07-20 02:39:43.229 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8fb Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:39:43.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer1.example.com(orderer1.example.com:7050) took 95.1µs " +"2019-07-20 02:39:43.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fd Sending msg of 22816 bytes to 2 on channel businesschannel took 139.7µs" +"2019-07-20 02:39:43.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fe Sending msg of 22816 bytes to 3 on channel businesschannel took 96.2µs" +"2019-07-20 02:39:43.236 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ff Send of ConsensusRequest for channel businesschannel with payload of size 22816 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +"2019-07-20 02:39:43.238 UTC [orderer.common.cluster.step] handleMessage -> DEBU 900 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 902 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 904 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +"2019-07-20 02:39:43.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU 905 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " +"2019-07-20 02:39:43.240 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 903 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.240 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.241 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 917 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.241 UTC [common.configtx] verifyDeltaSet -> DEBU 918 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.241 UTC [common.configtx] policyForItem -> DEBU 919 Getting policy for item Org1MSP with mod_policy Admins" +"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91a Manager Channel looking up path [Application]" +"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91b Manager Channel has managers Orderer" +"2019-07-20 02:39:43.241 UTC [policies] Manager -> DEBU 91c Manager Channel has managers Application" +"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91d Manager Channel/Application looking up path []" +"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91e Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 91f Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 920 Manager Channel/Application looking up path [Org1MSP]" +"2019-07-20 02:39:43.242 UTC [policies] Manager -> DEBU 921 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 922 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.243 UTC [policies] Manager -> DEBU 923 Manager Channel/Application/Org1MSP looking up path []" +"2019-07-20 02:39:43.243 UTC [policies] Evaluate -> DEBU 924 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:39:43.243 UTC [cauthdsl] func1 -> DEBU 925 0xc000cda8c0 gate 1563590383243353300 evaluation starts" +"2019-07-20 02:39:43.244 UTC [cauthdsl] func2 -> DEBU 926 0xc000cda8c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 927 0xc000cda8c0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:43.245 UTC [cauthdsl] func2 -> DEBU 928 0xc000cda8c0 principal matched by identity 0" +"2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 929 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +"2019-07-20 02:39:43.247 UTC [msp.identity] Verify -> DEBU 92a Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +"2019-07-20 02:39:43.248 UTC [cauthdsl] func2 -> DEBU 92b 0xc000cda8c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:43.248 UTC [cauthdsl] func1 -> DEBU 92c 0xc000cda8c0 gate 1563590383243353300 evaluation succeeds" +"2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.248 UTC [policies] Evaluate -> DEBU 92e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.249 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 932 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.4526ms " +"2019-07-20 02:39:43.250 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 935 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.251 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to " +"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Writers to " +"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key Admins to " +"2019-07-20 02:39:43.253 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to " +"2019-07-20 02:39:43.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 901 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 939 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-07-20 02:39:43.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.7µs " +"2019-07-20 02:39:43.266 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 93c Sending msg of 28 bytes to 3 on channel businesschannel took 51.9µs" +"2019-07-20 02:39:43.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 93d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +"2019-07-20 02:39:43.268 UTC [common.configtx] recurseConfigMap -> DEBU 93e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 93f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 940 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.270 UTC [common.configtx] recurseConfigMap -> DEBU 941 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 942 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 943 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 944 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.271 UTC [common.configtx] recurseConfigMap -> DEBU 945 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 946 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 947 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 948 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 949 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.272 UTC [common.configtx] recurseConfigMap -> DEBU 94a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.273 UTC [common.configtx] recurseConfigMap -> DEBU 94b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:43.273 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: HashingAlgorithm" +"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94f Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:43.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.274 UTC [common.channelconfig] initializeProtosStruct -> DEBU 950 Processing field: OrdererAddresses" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 951 Processing field: Consortium" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 952 Processing field: Capabilities" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] NewStandardValues -> DEBU 953 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 954 Processing field: ConsensusType" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 955 Processing field: BatchSize" +"2019-07-20 02:39:43.275 UTC [common.channelconfig] initializeProtosStruct -> DEBU 956 Processing field: BatchTimeout" +"2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 957 Processing field: KafkaBrokers" +"2019-07-20 02:39:43.276 UTC [common.channelconfig] initializeProtosStruct -> DEBU 958 Processing field: ChannelRestrictions" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 959 Processing field: Capabilities" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95a Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95b Processing field: Endpoints" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] NewStandardValues -> DEBU 95c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95d Processing field: MSP" +"2019-07-20 02:39:43.277 UTC [common.channelconfig] validateMSP -> DEBU 95e Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:43.277 UTC [msp] newBccspMsp -> DEBU 95f Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.278 UTC [msp] New -> DEBU 961 Creating Cache-MSP instance" +"2019-07-20 02:39:43.279 UTC [msp] Setup -> DEBU 962 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:43.280 UTC [msp.identity] newIdentity -> DEBU 963 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.281 UTC [msp.identity] newIdentity -> DEBU 964 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.281 UTC [orderer.common.cluster.step] handleMessage -> DEBU 965 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.281 UTC [msp] Validate -> DEBU 966 MSP OrdererMSP validating identity" +"2019-07-20 02:39:43.282 UTC [common.channelconfig] NewStandardValues -> DEBU 967 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:43.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 960 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 968 Processing field: ACLs" +"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: Capabilities" +"2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: AnchorPeers" +"2019-07-20 02:39:43.283 UTC [common.channelconfig] NewStandardValues -> DEBU 96c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: MSP" +"2019-07-20 02:39:43.284 UTC [common.channelconfig] Validate -> DEBU 96e Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:43.284 UTC [common.channelconfig] validateMSP -> DEBU 96f Setting up MSP for org Org1MSP" +"2019-07-20 02:39:43.284 UTC [msp] newBccspMsp -> DEBU 970 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.284 UTC [msp] New -> DEBU 971 Creating Cache-MSP instance" +"2019-07-20 02:39:43.285 UTC [msp] Setup -> DEBU 972 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:43.285 UTC [msp.identity] newIdentity -> DEBU 973 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.286 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.287 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 975 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:43.287 UTC [msp] Validate -> DEBU 976 MSP Org1MSP validating identity" +"2019-07-20 02:39:43.287 UTC [msp] getCertificationChain -> DEBU 977 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.288 UTC [msp] hasOURole -> DEBU 978 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:43.288 UTC [msp] getCertificationChain -> DEBU 979 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97b Processing field: AnchorPeers" +"2019-07-20 02:39:43.288 UTC [common.channelconfig] NewStandardValues -> DEBU 97c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:43.288 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97d Processing field: MSP" +"2019-07-20 02:39:43.288 UTC [common.channelconfig] Validate -> DEBU 97e Anchor peers for org Org2MSP are " +"2019-07-20 02:39:43.288 UTC [common.channelconfig] validateMSP -> DEBU 97f Setting up MSP for org Org2MSP" +"2019-07-20 02:39:43.288 UTC [msp] newBccspMsp -> DEBU 980 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:43.289 UTC [msp] New -> DEBU 981 Creating Cache-MSP instance" +"2019-07-20 02:39:43.289 UTC [msp] Setup -> DEBU 982 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:43.289 UTC [msp.identity] newIdentity -> DEBU 983 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.290 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:43.290 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 985 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:43.290 UTC [msp] Validate -> DEBU 986 MSP Org2MSP validating identity" +"2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 987 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.291 UTC [msp] hasOURole -> DEBU 988 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:43.291 UTC [msp] getCertificationChain -> DEBU 989 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98a Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:43.291 UTC [msp] Setup -> DEBU 98b MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:43.291 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 98f Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 990 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 991 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 992 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 993 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 994 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 995 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:43.292 UTC [policies] NewManagerImpl -> DEBU 996 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:43.293 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:43.294 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a0 Proposed new policy Writers for Channel" +"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy Admins for Channel" +"2019-07-20 02:39:43.295 UTC [policies] NewManagerImpl -> DEBU 9a2 Proposed new policy Readers for Channel" +"2019-07-20 02:39:43.295 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:43.296 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:43.297 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d0 As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:43.297 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d1 As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d2 Manager Channel looking up path [Application]" +"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d3 Manager Channel has managers Application" +"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d4 Manager Channel has managers Orderer" +"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d5 Manager Channel/Application looking up path []" +"2019-07-20 02:39:43.297 UTC [policies] Manager -> DEBU 9d6 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9d7 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d8 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9d9 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9da As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9db Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dc Manager Channel has managers Application" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9dd Manager Channel has managers Orderer" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9de Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:43.298 UTC [policies] Manager -> DEBU 9df Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e0 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e1 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e2 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:43.298 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e4 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:43.298 UTC [common.capabilities] Supported -> DEBU 9e5 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:43.298 UTC [orderer.common.server] func1 -> DEBU 9e6 Executing callback to update root CAs" +"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e7 updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e8 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9e9 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:43.298 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9ea adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:43.300 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9eb [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-07-20 02:39:43.301 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9ec [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-07-20 02:39:43.301 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ed Obtaining default signing identity" +"2019-07-20 02:39:43.302 UTC [msp] GetDefaultSigningIdentity -> DEBU 9ee Obtaining default signing identity" +"2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9ef Sign: plaintext: 0A020801120B0A090A03010203100418...F2CDD8D5A6282CFC0741B2C754C9EB86 " +"2019-07-20 02:39:43.302 UTC [msp.identity] Sign -> DEBU 9f0 Sign: digest: 83FA658AE2186F1919C8D657A3B6EF232379955B505EBBF4C8203590B5F4A732 " +"2019-07-20 02:39:43.304 UTC [fsblkstorage] indexBlock -> DEBU 9f1 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= +txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 +]" +"2019-07-20 02:39:43.306 UTC [fsblkstorage] updateCheckpoint -> DEBU 9f2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47640], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-07-20 02:39:43.306 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9f3 [channel: businesschannel] Wrote block [1]" +"2019-07-20 02:39:43.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:43.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel testchainid took 212.6µs" +"2019-07-20 02:39:43.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.6µs " +"2019-07-20 02:39:43.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f7 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +"2019-07-20 02:39:43.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f8 Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +"2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.9µs " +"2019-07-20 02:39:43.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " +"2019-07-20 02:39:43.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:43.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:44.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:44.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fe Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" +"2019-07-20 02:39:44.008 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2788ms " +"2019-07-20 02:39:44.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 2 on channel businesschannel took 50.3µs" +"2019-07-20 02:39:44.260 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a01 Sending msg of 28 bytes to 3 on channel businesschannel took 112.8µs" +"2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.4µs " +"2019-07-20 02:39:44.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU a03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 492.5µs " +"2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:44.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a07 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-07-20 02:39:44.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU a08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-07-20 02:39:44.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +"2019-07-20 02:39:44.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0a Sending msg of 28 bytes to 3 on channel businesschannel took 53.7µs" +"2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.9µs " +"2019-07-20 02:39:44.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.6µs " +"2019-07-20 02:39:44.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:44.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:45.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a10 Sending msg of 28 bytes to 3 on channel testchainid took 269.8µs" +"2019-07-20 02:39:45.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU a11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.6µs " +"2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-07-20 02:39:45.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a13 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " +"2019-07-20 02:39:45.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 237.3µs " +"2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU a17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.364 UTC [orderer.common.server] Deliver -> DEBU a18 Starting new Deliver handler" +"2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a19 Starting new deliver loop for 172.18.0.9:39070" +"2019-07-20 02:39:45.364 UTC [common.deliver] Handle -> DEBU a1a Attempting to read seek info message from 172.18.0.9:39070" +"2019-07-20 02:39:45.381 UTC [orderer.common.server] Broadcast -> DEBU a1b Starting new Broadcast handler" +"2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] Handle -> DEBU a1c Starting new broadcast loop for 172.18.0.9:39072" +"2019-07-20 02:39:45.381 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1d [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39072" +"2019-07-20 02:39:45.381 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1e Processing config update message for channel businesschannel" +"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:45.382 UTC [policies] Evaluate -> DEBU a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:45.383 UTC [policies] Evaluate -> DEBU a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:39:45.383 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" +"2019-07-20 02:39:45.384 UTC [msp.identity] newIdentity -> DEBU a25 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.384 UTC [cauthdsl] func1 -> DEBU a26 0xc000d78fa0 gate 1563590385384567000 evaluation starts" +"2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a27 0xc000d78fa0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.384 UTC [cauthdsl] func2 -> DEBU a28 0xc000d78fa0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a29 0xc000d78fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:45.385 UTC [cauthdsl] func2 -> DEBU a2a 0xc000d78fa0 principal evaluation fails" +"2019-07-20 02:39:45.385 UTC [cauthdsl] func1 -> DEBU a2b 0xc000d78fa0 gate 1563590385384567000 evaluation fails" +"2019-07-20 02:39:45.385 UTC [policies] Evaluate -> DEBU a2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.386 UTC [policies] Evaluate -> DEBU a2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:39:45.386 UTC [cauthdsl] func1 -> DEBU a2f 0xc000de6120 gate 1563590385386826000 evaluation starts" +"2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a30 0xc000de6120 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.387 UTC [cauthdsl] func2 -> DEBU a31 0xc000de6120 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.387 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a32 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:45.387 UTC [msp] Validate -> DEBU a33 MSP Org2MSP validating identity" +"2019-07-20 02:39:45.388 UTC [msp] getCertificationChain -> DEBU a34 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.388 UTC [cauthdsl] func2 -> DEBU a35 0xc000de6120 principal matched by identity 0" +"2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a36 Verify: digest = 00000000 c5 5a be 1c 29 23 7f 23 39 cf 17 a5 ec 41 e6 c6 |.Z..)#.#9....A..| +00000010 6f c0 2d c4 a5 ab 38 7c ca 36 84 c1 82 cb 1a ce |o.-...8|.6......|" +"2019-07-20 02:39:45.388 UTC [msp.identity] Verify -> DEBU a37 Verify: sig = 00000000 30 44 02 20 67 a5 33 2b c9 f6 28 3d aa 68 79 ec |0D. g.3+..(=.hy.| +00000010 a7 ff 72 cb 1b 25 d6 49 4b fe 8b 44 16 b2 4e e7 |..r..%.IK..D..N.| +00000020 f3 91 ef 22 02 20 7a c3 5b 30 ad 9e 74 1f be 45 |...". z.[0..t..E| +00000030 40 b9 97 df 12 3f 78 68 99 6b 59 36 ec 06 5c 86 |@....?xh.kY6..\.| +00000040 1f 95 16 08 41 48 |....AH|" +"2019-07-20 02:39:45.389 UTC [cauthdsl] func2 -> DEBU a38 0xc000de6120 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:45.389 UTC [cauthdsl] func1 -> DEBU a39 0xc000de6120 gate 1563590385386826000 evaluation succeeds" +"2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.389 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3c Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3e Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:39:45.390 UTC [policies] Evaluate -> DEBU a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.391 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.392 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.393 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.393 UTC [common.configtx] verifyDeltaSet -> DEBU a51 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.393 UTC [common.configtx] policyForItem -> DEBU a52 Getting policy for item Org2MSP with mod_policy Admins" +"2019-07-20 02:39:45.393 UTC [policies] Manager -> DEBU a53 Manager Channel looking up path [Application]" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a54 Manager Channel has managers Application" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a55 Manager Channel has managers Orderer" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a56 Manager Channel/Application looking up path []" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a57 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a58 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a59 Manager Channel/Application looking up path [Org2MSP]" +"2019-07-20 02:39:45.394 UTC [policies] Manager -> DEBU a5a Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5b Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.395 UTC [policies] Manager -> DEBU a5c Manager Channel/Application/Org2MSP looking up path []" +"2019-07-20 02:39:45.395 UTC [policies] Evaluate -> DEBU a5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:39:45.396 UTC [cauthdsl] func1 -> DEBU a5e 0xc000f4d0a0 gate 1563590385396347200 evaluation starts" +"2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a5f 0xc000f4d0a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.396 UTC [cauthdsl] func2 -> DEBU a60 0xc000f4d0a0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.397 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a61 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-07-20 02:39:45.397 UTC [cauthdsl] func2 -> DEBU a62 0xc000f4d0a0 principal matched by identity 0" +"2019-07-20 02:39:45.397 UTC [msp.identity] Verify -> DEBU a63 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +"2019-07-20 02:39:45.398 UTC [msp.identity] Verify -> DEBU a64 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +00000040 e9 49 62 bf 87 8d |.Ib...|" +"2019-07-20 02:39:45.398 UTC [cauthdsl] func2 -> DEBU a65 0xc000f4d0a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:45.398 UTC [cauthdsl] func1 -> DEBU a66 0xc000f4d0a0 gate 1563590385396347200 evaluation succeeds" +"2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a67 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.398 UTC [policies] Evaluate -> DEBU a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.398 UTC [common.configtx] verifyDeltaSet -> DEBU a69 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key Endorsement to " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.400 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a75 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a76 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a77 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a78 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a79 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.401 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.402 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.403 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a81 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a82 Processing field: HashingAlgorithm" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a84 Processing field: OrdererAddresses" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: Consortium" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a86 Processing field: Capabilities" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a87 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a88 Processing field: ACLs" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a89 Processing field: Capabilities" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8b Processing field: AnchorPeers" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] NewStandardValues -> DEBU a8c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: MSP" +"2019-07-20 02:39:45.403 UTC [common.channelconfig] Validate -> DEBU a8e Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:45.404 UTC [common.channelconfig] validateMSP -> DEBU a8f Setting up MSP for org Org1MSP" +"2019-07-20 02:39:45.404 UTC [msp] newBccspMsp -> DEBU a90 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.404 UTC [msp] New -> DEBU a91 Creating Cache-MSP instance" +"2019-07-20 02:39:45.404 UTC [msp] Setup -> DEBU a92 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:45.404 UTC [msp.identity] newIdentity -> DEBU a93 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.405 UTC [msp.identity] newIdentity -> DEBU a94 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.405 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a95 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:45.405 UTC [msp] Validate -> DEBU a96 MSP Org1MSP validating identity" +"2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a97 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.405 UTC [msp] hasOURole -> DEBU a98 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:45.405 UTC [msp] getCertificationChain -> DEBU a99 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: AnchorPeers" +"2019-07-20 02:39:45.406 UTC [common.channelconfig] NewStandardValues -> DEBU a9c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.406 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9d Processing field: MSP" +"2019-07-20 02:39:45.406 UTC [common.channelconfig] Validate -> DEBU a9e Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:39:45.406 UTC [common.channelconfig] validateMSP -> DEBU a9f Setting up MSP for org Org2MSP" +"2019-07-20 02:39:45.406 UTC [msp] newBccspMsp -> DEBU aa0 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.406 UTC [msp] New -> DEBU aa1 Creating Cache-MSP instance" +"2019-07-20 02:39:45.407 UTC [msp] Setup -> DEBU aa2 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:45.407 UTC [msp.identity] newIdentity -> DEBU aa3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.408 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.409 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU aa5 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:45.409 UTC [msp] Validate -> DEBU aa6 MSP Org2MSP validating identity" +"2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa7 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.410 UTC [msp] hasOURole -> DEBU aa8 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:45.410 UTC [msp] getCertificationChain -> DEBU aa9 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.411 UTC [common.channelconfig] NewStandardValues -> DEBU aaa Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:45.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU aab Processing field: ConsensusType" +"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: BatchSize" +"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aad Processing field: BatchTimeout" +"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aae Processing field: KafkaBrokers" +"2019-07-20 02:39:45.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaf Processing field: ChannelRestrictions" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: Capabilities" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: Endpoints" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: MSP" +"2019-07-20 02:39:45.413 UTC [common.channelconfig] validateMSP -> DEBU ab5 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:45.413 UTC [msp] newBccspMsp -> DEBU ab6 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.414 UTC [msp] New -> DEBU ab7 Creating Cache-MSP instance" +"2019-07-20 02:39:45.414 UTC [msp] Setup -> DEBU ab8 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU ab9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.415 UTC [msp.identity] newIdentity -> DEBU aba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.416 UTC [msp] Validate -> DEBU abb MSP OrdererMSP validating identity" +"2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abc Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:45.416 UTC [msp] Setup -> DEBU abd MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:45.416 UTC [policies] NewManagerImpl -> DEBU abe Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU abf Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac0 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac1 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac2 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.417 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ace Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU acf Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:45.418 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel" +"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel" +"2019-07-20 02:39:45.419 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Readers for Channel" +"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:45.420 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:45.421 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:45.422 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:45.423 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:45.424 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:45.425 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:45.426 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:45.427 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:45.427 UTC [common.channelconfig] LogSanityChecks -> DEBU b03 As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:45.428 UTC [common.channelconfig] LogSanityChecks -> DEBU b04 As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b05 Manager Channel looking up path [Application]" +"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b06 Manager Channel has managers Orderer" +"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b07 Manager Channel has managers Application" +"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b08 Manager Channel/Application looking up path []" +"2019-07-20 02:39:45.428 UTC [policies] Manager -> DEBU b09 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0a Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0c As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:45.429 UTC [common.channelconfig] LogSanityChecks -> DEBU b0d As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:45.429 UTC [policies] Manager -> DEBU b0e Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b0f Manager Channel has managers Application" +"2019-07-20 02:39:45.430 UTC [policies] Manager -> DEBU b10 Manager Channel has managers Orderer" +"2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b11 Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:45.431 UTC [policies] Manager -> DEBU b12 Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b15 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:45.431 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b17 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:45.432 UTC [common.capabilities] Supported -> DEBU b18 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b19 Obtaining default signing identity" +"2019-07-20 02:39:45.432 UTC [msp] GetDefaultSigningIdentity -> DEBU b1a Obtaining default signing identity" +"2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1b Sign: plaintext: 0AD2060A1B08011A0608F1FDC9E90522...7868996B5936EC065C861F9516084148 " +"2019-07-20 02:39:45.433 UTC [msp.identity] Sign -> DEBU b1c Sign: digest: 9F6D0925EE9C0929724A0054A3E76FD29F7437D20D76847EDFA00754ACB3E3A9 " +"2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:39:45.433 UTC [policies] Evaluate -> DEBU b1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:45.434 UTC [policies] Evaluate -> DEBU b21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:39:45.434 UTC [msp] DeserializeIdentity -> DEBU b22 Obtaining identity" +"2019-07-20 02:39:45.434 UTC [msp.identity] newIdentity -> DEBU b23 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.435 UTC [cauthdsl] func1 -> DEBU b24 0xc001032ed0 gate 1563590385435836700 evaluation starts" +"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b25 0xc001032ed0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b26 0xc001032ed0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b27 0xc001032ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:39:45.436 UTC [cauthdsl] func2 -> DEBU b28 0xc001032ed0 principal evaluation fails" +"2019-07-20 02:39:45.436 UTC [cauthdsl] func1 -> DEBU b29 0xc001032ed0 gate 1563590385435836700 evaluation fails" +"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.436 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b2d 0xc00105c010 gate 1563590385437043000 evaluation starts" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2e 0xc00105c010 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b2f 0xc00105c010 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b30 0xc00105c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func2 -> DEBU b31 0xc00105c010 principal evaluation fails" +"2019-07-20 02:39:45.437 UTC [cauthdsl] func1 -> DEBU b32 0xc00105c010 gate 1563590385437043000 evaluation fails" +"2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.437 UTC [policies] Evaluate -> DEBU b34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.437 UTC [policies] func1 -> DEBU b35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b36 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:45.438 UTC [policies] Evaluate -> DEBU b3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:45.438 UTC [cauthdsl] func1 -> DEBU b3b 0xc00105cd20 gate 1563590385438562200 evaluation starts" +"2019-07-20 02:39:45.438 UTC [cauthdsl] func2 -> DEBU b3c 0xc00105cd20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b3d 0xc00105cd20 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.439 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b3e Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:39:45.439 UTC [msp] Validate -> DEBU b3f MSP OrdererMSP validating identity" +"2019-07-20 02:39:45.439 UTC [cauthdsl] func2 -> DEBU b40 0xc00105cd20 principal matched by identity 0" +"2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b41 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| +00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" +"2019-07-20 02:39:45.439 UTC [msp.identity] Verify -> DEBU b42 Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| +00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| +00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| +00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| +00000040 cb 1b 9e a8 cb 43 |.....C|" +"2019-07-20 02:39:45.440 UTC [cauthdsl] func2 -> DEBU b43 0xc00105cd20 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:45.440 UTC [cauthdsl] func1 -> DEBU b44 0xc00105cd20 gate 1563590385438562200 evaluation succeeds" +"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b45 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b46 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b47 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:39:45.440 UTC [policies] Evaluate -> DEBU b49 Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:39:45.441 UTC [policies] Evaluate -> DEBU b4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:39:45.441 UTC [orderer.common.msgprocessor] Apply -> DEBU b4b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-07-20 02:39:45.441 UTC [common.channelconfig] NewStandardValues -> DEBU b4c Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4d Processing field: HashingAlgorithm" +"2019-07-20 02:39:45.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4e Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4f Processing field: OrdererAddresses" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b50 Processing field: Consortium" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b51 Processing field: Capabilities" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] NewStandardValues -> DEBU b52 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b53 Processing field: ACLs" +"2019-07-20 02:39:45.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: Capabilities" +"2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: AnchorPeers" +"2019-07-20 02:39:45.443 UTC [common.channelconfig] NewStandardValues -> DEBU b57 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: MSP" +"2019-07-20 02:39:45.443 UTC [common.channelconfig] Validate -> DEBU b59 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:45.443 UTC [common.channelconfig] validateMSP -> DEBU b5a Setting up MSP for org Org1MSP" +"2019-07-20 02:39:45.443 UTC [msp] newBccspMsp -> DEBU b5b Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.443 UTC [msp] New -> DEBU b5c Creating Cache-MSP instance" +"2019-07-20 02:39:45.443 UTC [msp] Setup -> DEBU b5d Setting up MSP instance Org1MSP" +"2019-07-20 02:39:45.443 UTC [msp.identity] newIdentity -> DEBU b5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.444 UTC [msp.identity] newIdentity -> DEBU b5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.444 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b60 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:45.445 UTC [msp] Validate -> DEBU b61 MSP Org1MSP validating identity" +"2019-07-20 02:39:45.445 UTC [msp] getCertificationChain -> DEBU b62 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.446 UTC [msp] hasOURole -> DEBU b63 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:45.446 UTC [msp] getCertificationChain -> DEBU b64 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b65 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b66 Processing field: AnchorPeers" +"2019-07-20 02:39:45.446 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.446 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: MSP" +"2019-07-20 02:39:45.447 UTC [common.channelconfig] Validate -> DEBU b69 Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:39:45.447 UTC [common.channelconfig] validateMSP -> DEBU b6a Setting up MSP for org Org2MSP" +"2019-07-20 02:39:45.447 UTC [msp] newBccspMsp -> DEBU b6b Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.447 UTC [msp] New -> DEBU b6c Creating Cache-MSP instance" +"2019-07-20 02:39:45.447 UTC [msp] Setup -> DEBU b6d Setting up MSP instance Org2MSP" +"2019-07-20 02:39:45.447 UTC [msp.identity] newIdentity -> DEBU b6e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.448 UTC [msp.identity] newIdentity -> DEBU b6f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.448 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b70 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:45.448 UTC [msp] Validate -> DEBU b71 MSP Org2MSP validating identity" +"2019-07-20 02:39:45.448 UTC [msp] getCertificationChain -> DEBU b72 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.449 UTC [msp] hasOURole -> DEBU b73 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:45.449 UTC [msp] getCertificationChain -> DEBU b74 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b75 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ConsensusType" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: BatchSize" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b78 Processing field: BatchTimeout" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: KafkaBrokers" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7a Processing field: ChannelRestrictions" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: Capabilities" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7c Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7d Processing field: Endpoints" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] NewStandardValues -> DEBU b7e Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.449 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7f Processing field: MSP" +"2019-07-20 02:39:45.450 UTC [common.channelconfig] validateMSP -> DEBU b80 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:45.450 UTC [msp] newBccspMsp -> DEBU b81 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.450 UTC [msp] New -> DEBU b82 Creating Cache-MSP instance" +"2019-07-20 02:39:45.450 UTC [msp] Setup -> DEBU b83 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b84 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.450 UTC [msp.identity] newIdentity -> DEBU b85 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.451 UTC [msp] Validate -> DEBU b86 MSP OrdererMSP validating identity" +"2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b87 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:45.451 UTC [msp] Setup -> DEBU b88 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.451 UTC [policies] NewManagerImpl -> DEBU b8a Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8b Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8d Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8e Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:45.452 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9c Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9d Proposed new policy Writers for Channel" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9e Proposed new policy Admins for Channel" +"2019-07-20 02:39:45.453 UTC [policies] NewManagerImpl -> DEBU b9f Proposed new policy Readers for Channel" +"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.453 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:45.454 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:45.455 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc8 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bc9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bca Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:45.456 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] propose -> INFO bce Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:39:45.456 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bcf [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39072" +"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bd0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-07-20 02:39:45.456 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd1 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:39:45.463 UTC [common.deliver] Handle -> WARN bd2 Error reading from 172.18.0.9:39070: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:45.463 UTC [orderer.common.server] func1 -> DEBU bd3 Closing Deliver stream" +"2019-07-20 02:39:45.463 UTC [comm.grpc.server] 1 -> INFO bd4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.9045ms +"2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:45.464 UTC [orderer.common.broadcast] Handle -> WARN bd6 Error reading from 172.18.0.9:39072: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:45.464 UTC [orderer.common.server] func1 -> DEBU bd7 Closing Broadcast stream" +"2019-07-20 02:39:45.464 UTC [comm.grpc.server] 1 -> INFO bd8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.1023ms +"2019-07-20 02:39:45.464 UTC [grpc] infof -> DEBU bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 22872 bytes to 2 on channel businesschannel took 19.8µs" +"2019-07-20 02:39:45.464 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdb Sending msg of 22872 bytes to 3 on channel businesschannel took 14µs" +"2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdc Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +"2019-07-20 02:39:45.464 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdd Send of ConsensusRequest for channel businesschannel with payload of size 22872 to orderer1.example.com(orderer1.example.com:7050) took 94.8µs " +"2019-07-20 02:39:45.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU bde Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bdf Sending msg of 28 bytes to 2 on channel businesschannel took 9.1µs" +"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU be0 Sending msg of 28 bytes to 3 on channel businesschannel took 48.5µs" +"2019-07-20 02:39:45.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +"2019-07-20 02:39:45.470 UTC [orderer.consensus.etcdraft] writeBlock -> INFO be2 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-07-20 02:39:45.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU be3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bec Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bed Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bee Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bef Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.472 UTC [common.configtx] addToMap -> DEBU bf4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.473 UTC [common.configtx] verifyDeltaSet -> DEBU bf5 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.473 UTC [common.configtx] policyForItem -> DEBU bf6 Getting policy for item Org2MSP with mod_policy Admins" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf7 Manager Channel looking up path [Application]" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf8 Manager Channel has managers Orderer" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bf9 Manager Channel has managers Application" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfa Manager Channel/Application looking up path []" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfb Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfc Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfd Manager Channel/Application looking up path [Org2MSP]" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bfe Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU bff Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.473 UTC [policies] Manager -> DEBU c00 Manager Channel/Application/Org2MSP looking up path []" +"2019-07-20 02:39:45.473 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c02 0xc0011fb840 gate 1563590385474029500 evaluation starts" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c03 0xc0011fb840 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c04 0xc0011fb840 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c05 0xc0011fb840 principal matched by identity 0" +"2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c06 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +"2019-07-20 02:39:45.474 UTC [msp.identity] Verify -> DEBU c07 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +00000040 e9 49 62 bf 87 8d |.Ib...|" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func2 -> DEBU c08 0xc0011fb840 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:45.474 UTC [cauthdsl] func1 -> DEBU c09 0xc0011fb840 gate 1563590385474029500 evaluation succeeds" +"2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.474 UTC [policies] Evaluate -> DEBU c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.474 UTC [common.configtx] verifyDeltaSet -> DEBU c0c Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Writers to " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c13 Setting policy for key Admins to " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c14 Setting policy for key Endorsement to " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c15 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c16 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.475 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.476 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.3075ms " +"2019-07-20 02:39:45.476 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.489 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.490 UTC [common.configtx] recurseConfigMap -> DEBU c1e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c1f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.491 UTC [common.configtx] recurseConfigMap -> DEBU c20 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.492 UTC [common.configtx] recurseConfigMap -> DEBU c21 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c22 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c23 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.493 UTC [common.configtx] recurseConfigMap -> DEBU c24 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:45.494 UTC [common.channelconfig] NewStandardValues -> DEBU c25 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c26 Processing field: HashingAlgorithm" +"2019-07-20 02:39:45.494 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c28 Processing field: OrdererAddresses" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: Consortium" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2a Processing field: Capabilities" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2b Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2c Processing field: ACLs" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2d Processing field: Capabilities" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c2e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c2f Processing field: AnchorPeers" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: MSP" +"2019-07-20 02:39:45.495 UTC [common.channelconfig] Validate -> DEBU c32 Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:39:45.495 UTC [common.channelconfig] validateMSP -> DEBU c33 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:45.495 UTC [msp] newBccspMsp -> DEBU c34 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.495 UTC [msp] New -> DEBU c35 Creating Cache-MSP instance" +"2019-07-20 02:39:45.495 UTC [msp] Setup -> DEBU c36 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.496 UTC [msp.identity] newIdentity -> DEBU c38 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.500 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c39 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:45.500 UTC [msp] Validate -> DEBU c3a MSP Org2MSP validating identity" +"2019-07-20 02:39:45.500 UTC [msp] getCertificationChain -> DEBU c3b MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.501 UTC [msp] hasOURole -> DEBU c3c MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:45.501 UTC [msp] getCertificationChain -> DEBU c3d MSP Org2MSP getting certification chain" +"2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c3e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: AnchorPeers" +"2019-07-20 02:39:45.501 UTC [common.channelconfig] NewStandardValues -> DEBU c40 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: MSP" +"2019-07-20 02:39:45.505 UTC [common.channelconfig] Validate -> DEBU c43 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:45.505 UTC [common.channelconfig] validateMSP -> DEBU c44 Setting up MSP for org Org1MSP" +"2019-07-20 02:39:45.505 UTC [msp] newBccspMsp -> DEBU c45 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.505 UTC [msp] New -> DEBU c46 Creating Cache-MSP instance" +"2019-07-20 02:39:45.505 UTC [msp] Setup -> DEBU c47 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:45.505 UTC [msp.identity] newIdentity -> DEBU c48 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.506 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.506 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c4a Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:45.506 UTC [msp] Validate -> DEBU c4b MSP Org1MSP validating identity" +"2019-07-20 02:39:45.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.516 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:45.516 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2019-07-20 02:39:45.515 UTC [msp] getCertificationChain -> DEBU c4f MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.521 UTC [msp] hasOURole -> DEBU c50 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:45.521 UTC [msp] getCertificationChain -> DEBU c51 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] NewStandardValues -> DEBU c52 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c53 Processing field: ConsensusType" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c54 Processing field: BatchSize" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c55 Processing field: BatchTimeout" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c56 Processing field: KafkaBrokers" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c57 Processing field: ChannelRestrictions" +"2019-07-20 02:39:45.522 UTC [common.channelconfig] initializeProtosStruct -> DEBU c58 Processing field: Capabilities" +"2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c59 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5a Processing field: Endpoints" +"2019-07-20 02:39:45.523 UTC [common.channelconfig] NewStandardValues -> DEBU c5b Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:45.523 UTC [common.channelconfig] initializeProtosStruct -> DEBU c5c Processing field: MSP" +"2019-07-20 02:39:45.523 UTC [common.channelconfig] validateMSP -> DEBU c5d Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:45.524 UTC [msp] newBccspMsp -> DEBU c5e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:45.524 UTC [msp] New -> DEBU c5f Creating Cache-MSP instance" +"2019-07-20 02:39:45.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU c60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +"2019-07-20 02:39:45.525 UTC [msp] Setup -> DEBU c61 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:45.525 UTC [msp.identity] newIdentity -> DEBU c62 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.526 UTC [msp.identity] newIdentity -> DEBU c63 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:45.526 UTC [msp] Validate -> DEBU c64 MSP OrdererMSP validating identity" +"2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c65 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:45.527 UTC [msp] Setup -> DEBU c66 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c67 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c68 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c69 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6a Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6b Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6c Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6d Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6e Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c6f Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.527 UTC [policies] NewManagerImpl -> DEBU c70 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c71 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c72 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c73 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c74 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c75 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:45.528 UTC [policies] NewManagerImpl -> DEBU c76 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c77 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c78 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c79 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7a Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7b Proposed new policy Writers for Channel" +"2019-07-20 02:39:45.529 UTC [policies] NewManagerImpl -> DEBU c7c Proposed new policy Admins for Channel" +"2019-07-20 02:39:45.530 UTC [policies] NewManagerImpl -> DEBU c7d Proposed new policy Readers for Channel" +"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Group] /Channel" +"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:45.530 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:45.531 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c91 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c92 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c93 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c94 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c95 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c96 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:45.532 UTC [common.configtx] addToMap -> DEBU c97 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c98 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c99 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU c9f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca2 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca3 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca4 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca5 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:45.533 UTC [common.configtx] addToMap -> DEBU ca6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca7 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca8 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU ca9 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU caa Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:45.534 UTC [common.configtx] addToMap -> DEBU cab Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cac As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:45.534 UTC [common.channelconfig] LogSanityChecks -> DEBU cad As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cae Manager Channel looking up path [Application]" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU caf Manager Channel has managers Orderer" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb0 Manager Channel has managers Application" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb1 Manager Channel/Application looking up path []" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb2 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:45.534 UTC [policies] Manager -> DEBU cb3 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb4 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb5 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:45.535 UTC [common.channelconfig] LogSanityChecks -> DEBU cb6 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb7 Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb8 Manager Channel has managers Orderer" +"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cb9 Manager Channel has managers Application" +"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cba Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:45.536 UTC [policies] Manager -> DEBU cbb Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbd As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:45.536 UTC [common.channelconfig] LogSanityChecks -> DEBU cbe As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:45.537 UTC [common.channelconfig] LogSanityChecks -> DEBU cbf As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc0 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:45.537 UTC [common.capabilities] Supported -> DEBU cc1 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:45.537 UTC [orderer.common.server] func1 -> DEBU cc2 Executing callback to update root CAs" +"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc3 updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc4 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc5 adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:45.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU cc6 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc7 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-07-20 02:39:45.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cc8 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cc9 Obtaining default signing identity" +"2019-07-20 02:39:45.538 UTC [msp] GetDefaultSigningIdentity -> DEBU cca Obtaining default signing identity" +"2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccb Sign: plaintext: 0A020802120B0A090A03010203100418...D73374974139F129A9820B7A112A17B7 " +"2019-07-20 02:39:45.538 UTC [msp.identity] Sign -> DEBU ccc Sign: digest: EC2AF97FF1FA7BB4F053EAEFF9365BF57FB7A816189F3740CC5BC0EDB381C885 " +"2019-07-20 02:39:45.541 UTC [fsblkstorage] indexBlock -> DEBU ccd Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= +txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 +]" +"2019-07-20 02:39:45.542 UTC [fsblkstorage] updateCheckpoint -> DEBU cce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71390], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-07-20 02:39:45.542 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ccf [channel: businesschannel] Wrote block [2]" +"2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd0 Sending msg of 28 bytes to 2 on channel businesschannel took 29.4µs" +"2019-07-20 02:39:45.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +"2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.3µs " +"2019-07-20 02:39:45.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " +"2019-07-20 02:39:45.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:45.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:46.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:46.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 3 on channel testchainid took 152.2µs" +"2019-07-20 02:39:46.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +"2019-07-20 02:39:46.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd9 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" +"2019-07-20 02:39:46.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2019-07-20 02:39:46.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 433.1µs " +"2019-07-20 02:39:46.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 661.6µs " +"2019-07-20 02:39:46.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:46.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU cde Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:46.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:46.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 3 on channel testchainid took 441.5µs" +"2019-07-20 02:39:46.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.8µs " +"2019-07-20 02:39:46.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce2 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-07-20 02:39:46.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.2µs " +"2019-07-20 02:39:46.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.2µs " +"2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:46.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:47.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:47.004 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +"2019-07-20 02:39:47.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU cea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +"2019-07-20 02:39:47.109 UTC [orderer.common.server] Deliver -> DEBU ceb Starting new Deliver handler" +"2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU cec Starting new deliver loop for 172.18.0.8:50246" +"2019-07-20 02:39:47.109 UTC [common.deliver] Handle -> DEBU ced Attempting to read seek info message from 172.18.0.8:50246" +"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.111 UTC [policies] Evaluate -> DEBU cf0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU cf2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:39:47.112 UTC [msp] DeserializeIdentity -> DEBU cf3 Obtaining identity" +"2019-07-20 02:39:47.113 UTC [msp.identity] newIdentity -> DEBU cf4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.114 UTC [cauthdsl] func1 -> DEBU cf5 0xc00098cf70 gate 1563590387113997400 evaluation starts" +"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf6 0xc00098cf70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf7 0xc00098cf70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf8 0xc00098cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-07-20 02:39:47.114 UTC [cauthdsl] func2 -> DEBU cf9 0xc00098cf70 principal evaluation fails" +"2019-07-20 02:39:47.115 UTC [cauthdsl] func1 -> DEBU cfa 0xc00098cf70 gate 1563590387113997400 evaluation fails" +"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfb Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:47.115 UTC [policies] func1 -> DEBU cfd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-07-20 02:39:47.115 UTC [policies] Evaluate -> DEBU cfe Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU cff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.116 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.117 UTC [cauthdsl] func1 -> DEBU d03 0xc000a9a660 gate 1563590387117229100 evaluation starts" +"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d04 0xc000a9a660 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d05 0xc000a9a660 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.117 UTC [cauthdsl] func2 -> DEBU d06 0xc000a9a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.118 UTC [cauthdsl] func2 -> DEBU d07 0xc000a9a660 principal evaluation fails" +"2019-07-20 02:39:47.118 UTC [cauthdsl] func1 -> DEBU d08 0xc000a9a660 gate 1563590387117229100 evaluation fails" +"2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d09 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.118 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.119 UTC [policies] Evaluate -> DEBU d0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.119 UTC [cauthdsl] func1 -> DEBU d0c 0xc000a9aec0 gate 1563590387119254800 evaluation starts" +"2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0d 0xc000a9aec0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.119 UTC [cauthdsl] func2 -> DEBU d0e 0xc000a9aec0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.119 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d0f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:47.119 UTC [msp] Validate -> DEBU d10 MSP Org2MSP validating identity" +"2019-07-20 02:39:47.120 UTC [msp] getCertificationChain -> DEBU d11 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.120 UTC [cauthdsl] func2 -> DEBU d12 0xc000a9aec0 principal matched by identity 0" +"2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d13 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| +00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" +"2019-07-20 02:39:47.121 UTC [msp.identity] Verify -> DEBU d14 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| +00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| +00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| +00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| +00000040 f0 df 1f af fc f3 dc |.......|" +"2019-07-20 02:39:47.121 UTC [cauthdsl] func2 -> DEBU d15 0xc000a9aec0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.121 UTC [cauthdsl] func1 -> DEBU d16 0xc000a9aec0 gate 1563590387119254800 evaluation succeeds" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d17 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d18 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d19 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1b Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:39:47.121 UTC [policies] Evaluate -> DEBU d1c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:39:47.122 UTC [common.deliver] deliverBlocks -> DEBU d1d [channel: businesschannel] Received seekInfo (0xc000d15040) start: > stop: > from 172.18.0.8:50246" +"2019-07-20 02:39:47.122 UTC [fsblkstorage] Next -> DEBU d1e Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-07-20 02:39:47.122 UTC [fsblkstorage] newBlockfileStream -> DEBU d1f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d20 Remaining bytes=[47443], Going to peek [8] bytes" +"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d21 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +"2019-07-20 02:39:47.122 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d22 blockbytes [23690] read from file [0]" +"2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d23 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d24 Remaining bytes=[23750], Going to peek [8] bytes" +"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d25 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +"2019-07-20 02:39:47.123 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d26 blockbytes [23747] read from file [0]" +"2019-07-20 02:39:47.123 UTC [common.deliver] deliverBlocks -> DEBU d27 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:39:47.124 UTC [fsblkstorage] waitForBlock -> DEBU d28 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-07-20 02:39:47.246 UTC [orderer.common.server] Deliver -> DEBU d29 Starting new Deliver handler" +"2019-07-20 02:39:47.246 UTC [common.deliver] Handle -> DEBU d2a Starting new deliver loop for 172.18.0.7:44748" +"2019-07-20 02:39:47.247 UTC [common.deliver] Handle -> DEBU d2b Attempting to read seek info message from 172.18.0.7:44748" +"2019-07-20 02:39:47.247 UTC [policies] Evaluate -> DEBU d2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.248 UTC [policies] Evaluate -> DEBU d30 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:39:47.249 UTC [msp] DeserializeIdentity -> DEBU d31 Obtaining identity" +"2019-07-20 02:39:47.249 UTC [msp.identity] newIdentity -> DEBU d32 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d33 0xc000372b00 gate 1563590387250332700 evaluation starts" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d34 0xc000372b00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d35 0xc000372b00 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d36 0xc000372b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func2 -> DEBU d37 0xc000372b00 principal evaluation fails" +"2019-07-20 02:39:47.250 UTC [cauthdsl] func1 -> DEBU d38 0xc000372b00 gate 1563590387250332700 evaluation fails" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d39 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:47.251 UTC [policies] func1 -> DEBU d3b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3c Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.251 UTC [policies] Evaluate -> DEBU d40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d41 0xc0001c8490 gate 1563590387252058500 evaluation starts" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d42 0xc0001c8490 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d43 0xc0001c8490 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d44 0xc0001c8490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func2 -> DEBU d45 0xc0001c8490 principal evaluation fails" +"2019-07-20 02:39:47.252 UTC [cauthdsl] func1 -> DEBU d46 0xc0001c8490 gate 1563590387252058500 evaluation fails" +"2019-07-20 02:39:47.252 UTC [policies] Evaluate -> DEBU d47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.253 UTC [policies] Evaluate -> DEBU d49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.253 UTC [cauthdsl] func1 -> DEBU d4a 0xc0001c8d20 gate 1563590387253349900 evaluation starts" +"2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4b 0xc0001c8d20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.253 UTC [cauthdsl] func2 -> DEBU d4c 0xc0001c8d20 processing identity 0 with bytes of fd0280" +"2019-07-20 02:39:47.253 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d4d Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:47.253 UTC [msp] Validate -> DEBU d4e MSP Org2MSP validating identity" +"2019-07-20 02:39:47.254 UTC [msp] getCertificationChain -> DEBU d4f MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.254 UTC [cauthdsl] func2 -> DEBU d50 0xc0001c8d20 principal matched by identity 0" +"2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 a3 6c 91 0d 93 c2 2b b7 84 4f c8 13 c2 e8 ec ac |.l....+..O......| +00000010 69 f1 88 f4 ef 83 1f d4 73 fe 27 7c 4d 2c 47 4d |i.......s.'|M,GM|" +"2019-07-20 02:39:47.254 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 45 02 21 00 8c 87 61 6a 22 10 2f 66 11 6e 4d |0E.!...aj"./f.nM| +00000010 a3 04 ef 75 b5 e3 22 96 86 ad f2 79 9f ed 05 b1 |...u.."....y....| +00000020 8d e3 ec 68 9d 02 20 14 82 79 23 28 47 2f f6 12 |...h.. ..y#(G/..| +00000030 4b 4c 70 b7 45 df ab f5 65 80 5a df 45 e2 e3 8a |KLp.E...e.Z.E...| +00000040 db 2a f3 7a cd d7 10 |.*.z...|" +"2019-07-20 02:39:47.255 UTC [cauthdsl] func2 -> DEBU d53 0xc0001c8d20 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.255 UTC [cauthdsl] func1 -> DEBU d54 0xc0001c8d20 gate 1563590387253349900 evaluation succeeds" +"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d57 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.256 UTC [policies] Evaluate -> DEBU d59 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:39:47.257 UTC [policies] Evaluate -> DEBU d5a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:39:47.257 UTC [common.deliver] deliverBlocks -> DEBU d5b [channel: businesschannel] Received seekInfo (0xc0008d0100) start: > stop: > from 172.18.0.7:44748" +"2019-07-20 02:39:47.257 UTC [fsblkstorage] Next -> DEBU d5c Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-07-20 02:39:47.257 UTC [fsblkstorage] newBlockfileStream -> DEBU d5d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5e Remaining bytes=[47443], Going to peek [8] bytes" +"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d5f Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +"2019-07-20 02:39:47.258 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d60 blockbytes [23690] read from file [0]" +"2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" +"2019-07-20 02:39:47.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +"2019-07-20 02:39:47.259 UTC [common.deliver] deliverBlocks -> DEBU d64 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" +"2019-07-20 02:39:47.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.9µs " +"2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d66 Remaining bytes=[23750], Going to peek [8] bytes" +"2019-07-20 02:39:47.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d67 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +"2019-07-20 02:39:47.260 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d68 blockbytes [23747] read from file [0]" +"2019-07-20 02:39:47.260 UTC [common.deliver] deliverBlocks -> DEBU d69 [channel: businesschannel] Delivering block for (0xc0008d0100) for 172.18.0.7:44748" +"2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:47.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:47.274 UTC [fsblkstorage] waitForBlock -> DEBU d6c Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-07-20 02:39:47.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:47.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-07-20 02:39:47.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +"2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2019-07-20 02:39:47.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76µs " +"2019-07-20 02:39:47.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " +"2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:47.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:48.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU d76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:48.006 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel testchainid took 549.1µs" +"2019-07-20 02:39:48.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.7µs " +"2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 2 on channel businesschannel took 110.7µs" +"2019-07-20 02:39:48.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +"2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.4µs " +"2019-07-20 02:39:48.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +"2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:48.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:48.508 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:48.510 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel testchainid took 1.0259ms" +"2019-07-20 02:39:48.511 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.5µs " +"2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2019-07-20 02:39:48.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +"2019-07-20 02:39:48.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.2µs " +"2019-07-20 02:39:48.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU d85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.3µs " +"2019-07-20 02:39:48.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:49.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:49.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel testchainid took 74.6µs" +"2019-07-20 02:39:49.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8b Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +"2019-07-20 02:39:49.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2019-07-20 02:39:49.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.1µs " +"2019-07-20 02:39:49.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.3µs " +"2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:49.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:49.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU d91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:49.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-07-20 02:39:49.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +"2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +"2019-07-20 02:39:49.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.8µs " +"2019-07-20 02:39:49.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU d97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60µs " +"2019-07-20 02:39:49.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:49.766 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:50.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:50.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2019-07-20 02:39:50.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 623.2µs " +"2019-07-20 02:39:50.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2019-07-20 02:39:50.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:50.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:50.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 733.7µs " +"2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU da3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:50.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 46µs" +"2019-07-20 02:39:50.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2019-07-20 02:39:50.744 UTC [orderer.common.server] Broadcast -> DEBU da6 Starting new Broadcast handler" +"2019-07-20 02:39:50.745 UTC [orderer.common.broadcast] Handle -> DEBU da7 Starting new broadcast loop for 172.18.0.9:39140" +"2019-07-20 02:39:50.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da8 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-07-20 02:39:50.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 3 on channel businesschannel took 382.5µs" +"2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU daa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +"2019-07-20 02:39:50.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " +"2019-07-20 02:39:50.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:51.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:51.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-07-20 02:39:51.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " +"2019-07-20 02:39:51.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db1 Sending msg of 28 bytes to 2 on channel businesschannel took 43.3µs" +"2019-07-20 02:39:51.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" +"2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.6µs " +"2019-07-20 02:39:51.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.7µs " +"2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:51.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:51.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-07-20 02:39:51.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU db9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.9µs " +"2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dba Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +"2019-07-20 02:39:51.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +"2019-07-20 02:39:51.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.6µs " +"2019-07-20 02:39:51.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.345ms " +"2019-07-20 02:39:51.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:52.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:52.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc1 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-07-20 02:39:52.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.9µs " +"2019-07-20 02:39:52.108 UTC [common.deliver] deliverBlocks -> DEBU dc3 Context canceled, aborting wait for next block" +"2019-07-20 02:39:52.108 UTC [orderer.common.server] func1 -> DEBU dc4 Closing Deliver stream" +"2019-07-20 02:39:52.108 UTC [grpc] infof -> DEBU dc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc6 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc8 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-07-20 02:39:52.109 UTC [fsblkstorage] waitForBlock -> DEBU dc9 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-07-20 02:39:52.109 UTC [comm.grpc.server] 1 -> INFO dc7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:44748 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.8632684s +"2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-07-20 02:39:52.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-07-20 02:39:52.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.4µs " +"2019-07-20 02:39:52.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 407µs " +"2019-07-20 02:39:52.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:52.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:52.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-07-20 02:39:52.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +"2019-07-20 02:39:52.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +"2019-07-20 02:39:52.760 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 2 on channel businesschannel took 11.6µs" +"2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 524.6µs " +"2019-07-20 02:39:52.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.7µs " +"2019-07-20 02:39:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:52.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:53.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:53.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-07-20 02:39:53.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " +"2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 2 on channel businesschannel took 53.2µs" +"2019-07-20 02:39:53.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +"2019-07-20 02:39:53.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:53.261 UTC [orderer.common.cluster.step] sendMessage -> DEBU de0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6647ms " +"2019-07-20 02:39:53.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:53.506 UTC [orderer.common.cluster.step] handleMessage -> DEBU de2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:53.507 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 3 on channel testchainid took 40.9µs" +"2019-07-20 02:39:53.508 UTC [orderer.common.cluster.step] sendMessage -> DEBU de4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 579.9µs " +"2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 27.3µs" +"2019-07-20 02:39:53.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " +"2019-07-20 02:39:53.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de7 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4015ms " +"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:53.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:54.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU deb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:54.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2019-07-20 02:39:54.009 UTC [orderer.common.cluster.step] sendMessage -> DEBU ded Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257.9µs " +"2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +"2019-07-20 02:39:54.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel businesschannel took 9.3µs" +"2019-07-20 02:39:54.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " +"2019-07-20 02:39:54.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU df1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " +"2019-07-20 02:39:54.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:54.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:54.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU df4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:54.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2019-07-20 02:39:54.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU df6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.3µs " +"2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-07-20 02:39:54.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +"2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.9µs " +"2019-07-20 02:39:54.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " +"2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:54.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:55.005 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:55.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-07-20 02:39:55.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU dff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " +"2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2019-07-20 02:39:55.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-07-20 02:39:55.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202µs " +"2019-07-20 02:39:55.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1379ms " +"2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:55.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:55.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:55.504 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2019-07-20 02:39:55.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 469.8µs " +"2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-07-20 02:39:55.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +"2019-07-20 02:39:55.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481µs " +"2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 765.8µs " +"2019-07-20 02:39:55.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:55.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:56.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:56.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-07-20 02:39:56.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +"2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-07-20 02:39:56.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +"2019-07-20 02:39:56.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 405.8µs " +"2019-07-20 02:39:56.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:56.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:56.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e18 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:56.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel testchainid took 161µs" +"2019-07-20 02:39:56.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.4µs " +"2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-07-20 02:39:56.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " +"2019-07-20 02:39:56.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1d Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:56.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 605.8µs " +"2019-07-20 02:39:56.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:57.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e21 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:57.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2019-07-20 02:39:57.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e23 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.9µs " +"2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-07-20 02:39:57.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-07-20 02:39:57.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.6µs " +"2019-07-20 02:39:57.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:57.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:57.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:57.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2019-07-20 02:39:57.506 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.4µs " +"2019-07-20 02:39:57.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +"2019-07-20 02:39:57.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +"2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +"2019-07-20 02:39:57.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +"2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:57.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:58.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e33 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:58.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2019-07-20 02:39:58.005 UTC [orderer.common.cluster.step] sendMessage -> DEBU e35 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.3µs " +"2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2019-07-20 02:39:58.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2019-07-20 02:39:58.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.2µs " +"2019-07-20 02:39:58.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1584ms " +"2019-07-20 02:39:58.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:58.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:58.505 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:58.506 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +"2019-07-20 02:39:58.507 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.4µs " +"2019-07-20 02:39:58.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-07-20 02:39:58.759 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel businesschannel took 362.7µs" +"2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.6µs " +"2019-07-20 02:39:58.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.2µs " +"2019-07-20 02:39:58.760 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:58.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:59.006 UTC [orderer.common.cluster.step] handleMessage -> DEBU e45 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:59.007 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-07-20 02:39:59.007 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " +"2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 2 on channel businesschannel took 48.1µs" +"2019-07-20 02:39:59.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +"2019-07-20 02:39:59.259 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-07-20 02:39:59.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 43.7µs " +"2019-07-20 02:39:59.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:59.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:59.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:39:59.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-07-20 02:39:59.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e50 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.2µs " +"2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +"2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.2µs " +"2019-07-20 02:39:59.759 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +"2019-07-20 02:39:59.758 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:59.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:39:59.866 UTC [orderer.common.server] replicateDisabledChains -> DEBU e57 No inactive chains to try to replicate" +"2019-07-20 02:40:00.004 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:00.005 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-07-20 02:40:00.006 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.1µs " +"2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +"2019-07-20 02:40:00.259 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.9µs " +"2019-07-20 02:40:00.258 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:00.260 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +"2019-07-20 02:40:00.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU e60 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:00.504 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:00.505 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +"2019-07-20 02:40:00.505 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 322.8µs " +"2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +"2019-07-20 02:40:00.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +"2019-07-20 02:40:00.739 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.3µs " +"2019-07-20 02:40:00.741 UTC [orderer.common.cluster.step] sendMessage -> DEBU e67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.4µs " +"2019-07-20 02:40:00.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:00.743 UTC [orderer.common.cluster.step] handleMessage -> DEBU e69 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:00.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:00.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-07-20 02:40:00.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.1µs " +"2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-07-20 02:40:01.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6e Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2019-07-20 02:40:01.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +"2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 777µs " +"2019-07-20 02:40:01.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:01.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU e72 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:01.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:01.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-07-20 02:40:01.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 397.5µs " +"2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-07-20 02:40:01.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e77 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2019-07-20 02:40:01.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU e78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 633.1µs " +"2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.6767ms " +"2019-07-20 02:40:01.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:01.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:01.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:01.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-07-20 02:40:01.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 383.6µs " +"2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +"2019-07-20 02:40:02.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e80 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2019-07-20 02:40:02.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU e81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +"2019-07-20 02:40:02.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0933ms " +"2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e84 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:02.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:02.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-07-20 02:40:02.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.4µs " +"2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 2 on channel businesschannel took 49.6µs" +"2019-07-20 02:40:02.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " +"2019-07-20 02:40:02.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" +"2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 992.9µs " +"2019-07-20 02:40:02.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:02.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:02.969 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:02.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel testchainid took 46.8µs" +"2019-07-20 02:40:02.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.8µs " +"2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +"2019-07-20 02:40:03.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e92 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.7µs " +"2019-07-20 02:40:03.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU e94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 745.3µs " +"2019-07-20 02:40:03.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:03.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU e96 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:03.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:03.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-07-20 02:40:03.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " +"2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-07-20 02:40:03.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.8µs " +"2019-07-20 02:40:03.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 610.9µs " +"2019-07-20 02:40:03.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:03.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:03.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:03.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-07-20 02:40:03.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.6µs " +"2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +"2019-07-20 02:40:04.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea4 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-07-20 02:40:04.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.1µs " +"2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1502ms " +"2019-07-20 02:40:04.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:04.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea8 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:04.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:04.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2019-07-20 02:40:04.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.8µs " +"2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +"2019-07-20 02:40:04.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ead Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-07-20 02:40:04.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU eae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +"2019-07-20 02:40:04.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU eaf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 736µs " +"2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:04.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:04.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:04.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-07-20 02:40:04.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.6µs " +"2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2019-07-20 02:40:05.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156µs " +"2019-07-20 02:40:05.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:05.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1143ms " +"2019-07-20 02:40:05.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eba Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:05.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:05.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +"2019-07-20 02:40:05.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel testchainid took 124.3µs" +"2019-07-20 02:40:05.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2019-07-20 02:40:05.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebf Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +"2019-07-20 02:40:05.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 317.6µs " +"2019-07-20 02:40:05.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 317.4µs " +"2019-07-20 02:40:05.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:05.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:05.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-07-20 02:40:05.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.4µs " +"2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 54.1µs" +"2019-07-20 02:40:06.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.3µs " +"2019-07-20 02:40:06.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +"2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU eca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 574.8µs " +"2019-07-20 02:40:06.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:06.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:06.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:06.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +"2019-07-20 02:40:06.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.8µs " +"2019-07-20 02:40:06.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 2 on channel businesschannel took 55µs" +"2019-07-20 02:40:06.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +"2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.5µs " +"2019-07-20 02:40:06.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.4µs " +"2019-07-20 02:40:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:06.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:06.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:06.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel testchainid took 29µs" +"2019-07-20 02:40:06.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +"2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 2 on channel businesschannel took 43.4µs" +"2019-07-20 02:40:07.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eda Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2019-07-20 02:40:07.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU edb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.5µs " +"2019-07-20 02:40:07.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:07.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2615ms " +"2019-07-20 02:40:07.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU ede Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:07.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:07.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +"2019-07-20 02:40:07.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.8µs " +"2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2019-07-20 02:40:07.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee3 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +"2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " +"2019-07-20 02:40:07.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.7µs " +"2019-07-20 02:40:07.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:07.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:07.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:07.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel testchainid took 202.8µs" +"2019-07-20 02:40:07.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.1µs " +"2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-07-20 02:40:08.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " +"2019-07-20 02:40:08.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:08.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163µs " +"2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:08.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2019-07-20 02:40:08.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305µs " +"2019-07-20 02:40:08.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +"2019-07-20 02:40:08.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2019-07-20 02:40:08.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +"2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +"2019-07-20 02:40:08.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:08.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:08.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +"2019-07-20 02:40:08.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +"2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-07-20 02:40:09.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efe Sending msg of 28 bytes to 2 on channel businesschannel took 9.2µs" +"2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU eff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.4µs " +"2019-07-20 02:40:09.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +"2019-07-20 02:40:09.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:09.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f02 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:09.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:09.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-07-20 02:40:09.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +"2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2019-07-20 02:40:09.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f07 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2019-07-20 02:40:09.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.6µs " +"2019-07-20 02:40:09.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " +"2019-07-20 02:40:09.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:09.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:09.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-07-20 02:40:09.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " +"2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-07-20 02:40:10.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f10 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f11 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " +"2019-07-20 02:40:10.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:10.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 635.4µs " +"2019-07-20 02:40:10.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f14 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:10.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:10.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-07-20 02:40:10.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231µs " +"2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2019-07-20 02:40:10.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f19 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +"2019-07-20 02:40:10.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " +"2019-07-20 02:40:10.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.1µs " +"2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:10.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:10.978 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2019-07-20 02:40:10.978 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.2µs " +"2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +"2019-07-20 02:40:11.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f22 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +"2019-07-20 02:40:11.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " +"2019-07-20 02:40:11.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2578ms " +"2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:11.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f26 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:11.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:11.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-07-20 02:40:11.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.6µs " +"2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-07-20 02:40:11.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2b Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +"2019-07-20 02:40:11.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.1µs " +"2019-07-20 02:40:11.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.5µs " +"2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:11.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:11.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2019-07-20 02:40:11.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " +"2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-07-20 02:40:12.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.8µs " +"2019-07-20 02:40:12.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.5µs " +"2019-07-20 02:40:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:12.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU f38 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:12.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-07-20 02:40:12.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2019-07-20 02:40:12.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 2 on channel businesschannel took 192.3µs" +"2019-07-20 02:40:12.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3d Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-07-20 02:40:12.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.9µs " +"2019-07-20 02:40:12.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467.8µs " +"2019-07-20 02:40:12.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU f41 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:12.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:12.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-07-20 02:40:12.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.3µs " +"2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2019-07-20 02:40:13.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f46 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " +"2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:13.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:13.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.8µs " +"2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:13.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2019-07-20 02:40:13.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +"2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +"2019-07-20 02:40:13.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " +"2019-07-20 02:40:13.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2019-07-20 02:40:13.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:13.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +"2019-07-20 02:40:13.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:13.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:13.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-07-20 02:40:13.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +"2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +"2019-07-20 02:40:14.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.7µs " +"2019-07-20 02:40:14.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.8µs " +"2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:14.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:14.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:14.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +"2019-07-20 02:40:14.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.5µs " +"2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 2 on channel businesschannel took 49.7µs" +"2019-07-20 02:40:14.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f61 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +"2019-07-20 02:40:14.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " +"2019-07-20 02:40:14.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:14.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f65 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:14.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:14.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-07-20 02:40:14.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127µs " +"2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2019-07-20 02:40:15.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6a Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-07-20 02:40:15.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +"2019-07-20 02:40:15.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.9µs " +"2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:15.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:15.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2019-07-20 02:40:15.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.1µs " +"2019-07-20 02:40:15.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +"2019-07-20 02:40:15.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 3 on channel businesschannel took 144.4µs" +"2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.7µs " +"2019-07-20 02:40:15.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137µs " +"2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f77 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:15.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:15.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-07-20 02:40:15.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +"2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2019-07-20 02:40:16.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7c Sending msg of 28 bytes to 3 on channel businesschannel took 8.8µs" +"2019-07-20 02:40:16.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0763ms " +"2019-07-20 02:40:16.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f80 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:16.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:16.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel testchainid took 11.8µs" +"2019-07-20 02:40:16.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.4µs " +"2019-07-20 02:40:16.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-07-20 02:40:16.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f85 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " +"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.5µs " +"2019-07-20 02:40:16.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:16.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f89 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:16.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:16.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-07-20 02:40:16.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +"2019-07-20 02:40:17.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2019-07-20 02:40:17.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8e Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " +"2019-07-20 02:40:17.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.8µs " +"2019-07-20 02:40:17.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:17.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU f92 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:17.469 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:17.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +"2019-07-20 02:40:17.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.1µs " +"2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2019-07-20 02:40:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f97 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2019-07-20 02:40:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.1µs " +"2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:17.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:17.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:17.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" +"2019-07-20 02:40:17.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2019-07-20 02:40:18.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +"2019-07-20 02:40:18.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.8µs " +"2019-07-20 02:40:18.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:18.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:18.473 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +"2019-07-20 02:40:18.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.3µs " +"2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-07-20 02:40:18.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 37.3µs" +"2019-07-20 02:40:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +"2019-07-20 02:40:18.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.9µs " +"2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:18.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] handleMessage -> DEBU fae Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:18.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-07-20 02:40:18.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +"2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +"2019-07-20 02:40:19.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.4µs " +"2019-07-20 02:40:19.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.7µs " +"2019-07-20 02:40:19.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:19.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:19.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +"2019-07-20 02:40:19.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.7µs " +"2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-07-20 02:40:19.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +"2019-07-20 02:40:19.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.7µs " +"2019-07-20 02:40:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:19.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:19.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:19.972 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-07-20 02:40:19.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2019-07-20 02:40:20.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +"2019-07-20 02:40:20.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 42.6µs " +"2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:20.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:20.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-07-20 02:40:20.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.7µs " +"2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2019-07-20 02:40:20.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcd Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-07-20 02:40:20.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.5µs " +"2019-07-20 02:40:20.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1387ms " +"2019-07-20 02:40:20.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:20.814 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39140 with txid '79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f' of type ENDORSER_TRANSACTION" +"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:40:20.815 UTC [policies] Evaluate -> DEBU fd6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.816 UTC [policies] Evaluate -> DEBU fd7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:20.816 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" +"2019-07-20 02:40:20.816 UTC [msp.identity] newIdentity -> DEBU fd9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:20.817 UTC [cauthdsl] func1 -> DEBU fda 0xc000bfa3b0 gate 1563590420817456800 evaluation starts" +"2019-07-20 02:40:20.817 UTC [cauthdsl] func2 -> DEBU fdb 0xc000bfa3b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.819 UTC [cauthdsl] func2 -> DEBU fdc 0xc000bfa3b0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:20.820 UTC [cauthdsl] func2 -> DEBU fdd 0xc000bfa3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-07-20 02:40:20.821 UTC [cauthdsl] func2 -> DEBU fde 0xc000bfa3b0 principal evaluation fails" +"2019-07-20 02:40:20.821 UTC [cauthdsl] func1 -> DEBU fdf 0xc000bfa3b0 gate 1563590420817456800 evaluation fails" +"2019-07-20 02:40:20.821 UTC [policies] Evaluate -> DEBU fe0 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:20.822 UTC [policies] Evaluate -> DEBU fe1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:20.822 UTC [policies] func1 -> DEBU fe2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-07-20 02:40:20.823 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.824 UTC [policies] Evaluate -> DEBU fe7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:20.824 UTC [cauthdsl] func1 -> DEBU fe8 0xc000bfb9e0 gate 1563590420824690400 evaluation starts" +"2019-07-20 02:40:20.824 UTC [cauthdsl] func2 -> DEBU fe9 0xc000bfb9e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.825 UTC [cauthdsl] func2 -> DEBU fea 0xc000bfb9e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:20.825 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU feb Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:40:20.825 UTC [msp] Validate -> DEBU fec MSP Org1MSP validating identity" +"2019-07-20 02:40:20.826 UTC [msp] getCertificationChain -> DEBU fed MSP Org1MSP getting certification chain" +"2019-07-20 02:40:20.826 UTC [cauthdsl] func2 -> DEBU fee 0xc000bfb9e0 principal matched by identity 0" +"2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU fef Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +"2019-07-20 02:40:20.826 UTC [msp.identity] Verify -> DEBU ff0 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +00000040 d7 3e d5 8f e5 b0 |.>....|" +"2019-07-20 02:40:20.827 UTC [cauthdsl] func2 -> DEBU ff1 0xc000bfb9e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.827 UTC [cauthdsl] func1 -> DEBU ff2 0xc000bfb9e0 gate 1563590420824690400 evaluation succeeds" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff5 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:40:20.828 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:40:20.830 UTC [orderer.common.blockcutter] Ordered -> DEBU ff9 Enqueuing message into batch" +"2019-07-20 02:40:20.830 UTC [orderer.common.broadcast] ProcessMessage -> DEBU ffa [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39140" +"2019-07-20 02:40:20.833 UTC [orderer.common.broadcast] Handle -> WARN ffb Error reading from 172.18.0.9:39140: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:20.834 UTC [orderer.common.server] func1 -> DEBU ffc Closing Broadcast stream" +"2019-07-20 02:40:20.834 UTC [comm.grpc.server] 1 -> INFO ffd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.1246301s +"2019-07-20 02:40:20.837 UTC [grpc] infof -> DEBU ffe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:20.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +"2019-07-20 02:40:20.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +"2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-07-20 02:40:22.002 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1004 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.3µs " +"2019-07-20 02:40:22.002 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1003 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1006 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.3µs " +"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +"2019-07-20 02:40:22.003 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +"2019-07-20 02:40:22.003 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +"2019-07-20 02:40:22.008 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.009 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-07-20 02:40:22.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.9µs " +"2019-07-20 02:40:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1011 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +"2019-07-20 02:40:22.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.473 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1014 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:22.474 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +"2019-07-20 02:40:22.475 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.9µs " +"2019-07-20 02:40:22.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1017 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" +"2019-07-20 02:40:22.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 727µs " +"2019-07-20 02:40:22.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1019 Sending msg of 28 bytes to 3 on channel businesschannel took 282.7µs" +"2019-07-20 02:40:22.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.5µs " +"2019-07-20 02:40:22.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 101d Batch timer expired, creating block" channel=businesschannel node=1 +"2019-07-20 02:40:22.831 UTC [orderer.consensus.etcdraft] propose -> INFO 101e Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:40:22.833 UTC [orderer.consensus.etcdraft] 2 -> DEBU 101f Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 3650 bytes to 2 on channel businesschannel took 16.8µs" +"2019-07-20 02:40:22.835 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 3650 bytes to 3 on channel businesschannel took 21.2µs" +"2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer1.example.com(orderer1.example.com:7050) took 121µs " +"2019-07-20 02:40:22.835 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1023 Send of ConsensusRequest for channel businesschannel with payload of size 3650 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 10.3µs" +"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.8µs " +"2019-07-20 02:40:22.839 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1028 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 102a [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102b Obtaining default signing identity" +"2019-07-20 02:40:22.839 UTC [msp] GetDefaultSigningIdentity -> DEBU 102c Obtaining default signing identity" +"2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102d Sign: plaintext: 0A020802120B0A090A03010203100418...CB2402E5A0B3BA87B6BF21DA5A95E292 " +"2019-07-20 02:40:22.839 UTC [msp.identity] Sign -> DEBU 102e Sign: digest: 6AFBD00D77A5732785EA5D33CF685F7A83868270E23725D9865CFE05D8FF32A5 " +"2019-07-20 02:40:22.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.5µs " +"2019-07-20 02:40:22.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.842 UTC [fsblkstorage] indexBlock -> DEBU 1031 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= +txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 +]" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] updateCheckpoint -> DEBU 1032 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[75919], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-07-20 02:40:22.843 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1033 [channel: businesschannel] Wrote block [3]" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1034 Came out of wait. maxAvailaBlockNumber=[3]" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1035 Remaining bytes=[4529], Going to peek [8] bytes" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1036 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1037 blockbytes [4527] read from file [0]" +"2019-07-20 02:40:22.843 UTC [common.deliver] deliverBlocks -> DEBU 1038 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:40:22.843 UTC [fsblkstorage] waitForBlock -> DEBU 1039 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-07-20 02:40:22.848 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:22.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:22.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +"2019-07-20 02:40:22.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +"2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +"2019-07-20 02:40:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2019-07-20 02:40:23.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.5µs " +"2019-07-20 02:40:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 795.8µs " +"2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:23.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:23.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:23.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2019-07-20 02:40:23.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.5µs " +"2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +"2019-07-20 02:40:23.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.6µs" +"2019-07-20 02:40:23.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.9µs " +"2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " +"2019-07-20 02:40:23.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:23.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:23.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2019-07-20 02:40:23.970 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.8µs " +"2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +"2019-07-20 02:40:24.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1051 Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +"2019-07-20 02:40:24.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1053 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 682.6µs " +"2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:24.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1055 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:24.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1056 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:24.471 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 3 on channel testchainid took 36.9µs" +"2019-07-20 02:40:24.472 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +"2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1059 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-07-20 02:40:24.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105a Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-07-20 02:40:24.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.9µs " +"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.8µs " +"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:24.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:24.772 UTC [orderer.common.server] Broadcast -> DEBU 105f Starting new Broadcast handler" +"2019-07-20 02:40:24.772 UTC [orderer.common.broadcast] Handle -> DEBU 1060 Starting new broadcast loop for 172.18.0.9:39158" +"2019-07-20 02:40:24.808 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1061 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39158 with txid '3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732' of type ENDORSER_TRANSACTION" +"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1062 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1063 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.809 UTC [policies] Evaluate -> DEBU 1064 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1065 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.810 UTC [policies] Evaluate -> DEBU 1066 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:24.810 UTC [cauthdsl] func1 -> DEBU 1067 0xc000fa8c70 gate 1563590424810651600 evaluation starts" +"2019-07-20 02:40:24.810 UTC [cauthdsl] func2 -> DEBU 1068 0xc000fa8c70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 1069 0xc000fa8c70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:24.811 UTC [cauthdsl] func2 -> DEBU 106a 0xc000fa8c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-07-20 02:40:24.812 UTC [cauthdsl] func2 -> DEBU 106b 0xc000fa8c70 principal evaluation fails" +"2019-07-20 02:40:24.812 UTC [cauthdsl] func1 -> DEBU 106c 0xc000fa8c70 gate 1563590424810651600 evaluation fails" +"2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106d Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:24.812 UTC [policies] Evaluate -> DEBU 106e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:24.813 UTC [policies] func1 -> DEBU 106f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1070 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-07-20 02:40:24.813 UTC [policies] Evaluate -> DEBU 1071 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1072 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1073 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.814 UTC [policies] Evaluate -> DEBU 1074 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:24.815 UTC [cauthdsl] func1 -> DEBU 1075 0xc000fa9960 gate 1563590424814985400 evaluation starts" +"2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1076 0xc000fa9960 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.815 UTC [cauthdsl] func2 -> DEBU 1077 0xc000fa9960 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:24.816 UTC [cauthdsl] func2 -> DEBU 1078 0xc000fa9960 principal matched by identity 0" +"2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 1079 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| +00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" +"2019-07-20 02:40:24.816 UTC [msp.identity] Verify -> DEBU 107a Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| +00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| +00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| +00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| +00000040 95 b0 80 c3 bc 80 99 |.......|" +"2019-07-20 02:40:24.817 UTC [cauthdsl] func2 -> DEBU 107b 0xc000fa9960 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.817 UTC [cauthdsl] func1 -> DEBU 107c 0xc000fa9960 gate 1563590424814985400 evaluation succeeds" +"2019-07-20 02:40:24.817 UTC [policies] Evaluate -> DEBU 107d Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 107f Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1080 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:24.818 UTC [policies] Evaluate -> DEBU 1081 Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:40:24.819 UTC [policies] Evaluate -> DEBU 1082 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:40:24.819 UTC [orderer.common.blockcutter] Ordered -> DEBU 1083 Enqueuing message into batch" +"2019-07-20 02:40:24.820 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1084 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39158" +"2019-07-20 02:40:24.825 UTC [orderer.common.broadcast] Handle -> WARN 1085 Error reading from 172.18.0.9:39158: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:24.825 UTC [orderer.common.server] func1 -> DEBU 1086 Closing Broadcast stream" +"2019-07-20 02:40:24.825 UTC [comm.grpc.server] 1 -> INFO 1087 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=52.883ms +"2019-07-20 02:40:24.825 UTC [grpc] infof -> DEBU 1088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:24.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-07-20 02:40:24.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.6µs " +"2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 2 on channel businesschannel took 47.9µs" +"2019-07-20 02:40:25.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108d Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " +"2019-07-20 02:40:25.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " +"2019-07-20 02:40:25.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:25.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:25.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1092 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:25.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.5µs " +"2019-07-20 02:40:25.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel testchainid took 368.4µs" +"2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 44.7µs" +"2019-07-20 02:40:25.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1096 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2019-07-20 02:40:25.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +"2019-07-20 02:40:25.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1098 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 670.1µs " +"2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:25.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:25.971 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:25.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.6µs " +"2019-07-20 02:40:25.973 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 3 on channel testchainid took 1.8469ms" +"2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2019-07-20 02:40:26.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2019-07-20 02:40:26.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " +"2019-07-20 02:40:26.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.2µs " +"2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:26.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a5 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +"2019-07-20 02:40:26.471 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " +"2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 28 bytes to 2 on channel businesschannel took 124.7µs" +"2019-07-20 02:40:26.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 298.8µs " +"2019-07-20 02:40:26.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10aa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 276.4µs " +"2019-07-20 02:40:26.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10ad Batch timer expired, creating block" channel=businesschannel node=1 +"2019-07-20 02:40:26.820 UTC [orderer.consensus.etcdraft] propose -> INFO 10ae Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:40:26.822 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10af Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:40:26.823 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b0 Sending msg of 3114 bytes to 2 on channel businesschannel took 92.7µs" +"2019-07-20 02:40:26.824 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b1 Sending msg of 3114 bytes to 3 on channel businesschannel took 18µs" +"2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b2 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer1.example.com(orderer1.example.com:7050) took 980.1µs " +"2019-07-20 02:40:26.824 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b3 Send of ConsensusRequest for channel businesschannel with payload of size 3114 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " +"2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.827 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +"2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-07-20 02:40:26.828 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10b8 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-07-20 02:40:26.828 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 168.5µs " +"2019-07-20 02:40:26.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " +"2019-07-20 02:40:26.827 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.831 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10bb [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-07-20 02:40:26.832 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bc Obtaining default signing identity" +"2019-07-20 02:40:26.834 UTC [msp] GetDefaultSigningIdentity -> DEBU 10bd Obtaining default signing identity" +"2019-07-20 02:40:26.841 UTC [msp.identity] Sign -> DEBU 10be Sign: plaintext: 0A020802120B0A090A03010203100418...52D1A12ABC704D520BFCB3D4E358B2F9 " +"2019-07-20 02:40:26.846 UTC [msp.identity] Sign -> DEBU 10bf Sign: digest: 9216BD0E940C4DE1C355275BEC0E1803FC1B74F267389F1872A2CEC9948411DC " +"2019-07-20 02:40:26.849 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.857 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:26.859 UTC [fsblkstorage] indexBlock -> DEBU 10c2 Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= +txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 +]" +"2019-07-20 02:40:26.871 UTC [fsblkstorage] updateCheckpoint -> DEBU 10c3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[79913], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-07-20 02:40:26.872 UTC [fsblkstorage] waitForBlock -> DEBU 10c4 Came out of wait. maxAvailaBlockNumber=[4]" +"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c5 Remaining bytes=[3994], Going to peek [8] bytes" +"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c6 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +"2019-07-20 02:40:26.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10c7 blockbytes [3992] read from file [0]" +"2019-07-20 02:40:26.872 UTC [common.deliver] deliverBlocks -> DEBU 10c8 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:40:26.873 UTC [fsblkstorage] waitForBlock -> DEBU 10c9 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-07-20 02:40:26.873 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ca [channel: businesschannel] Wrote block [4]" +"2019-07-20 02:40:26.974 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:26.975 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel testchainid took 35.3µs" +"2019-07-20 02:40:26.977 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +"2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +"2019-07-20 02:40:27.314 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +"2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +"2019-07-20 02:40:27.314 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 79.5µs " +"2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:27.317 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:27.478 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:27.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d5 Sending msg of 28 bytes to 3 on channel testchainid took 861.8µs" +"2019-07-20 02:40:27.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +"2019-07-20 02:40:27.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 2 on channel businesschannel took 47.1µs" +"2019-07-20 02:40:27.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d8 Sending msg of 28 bytes to 3 on channel businesschannel took 58µs" +"2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320µs " +"2019-07-20 02:40:27.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 191µs " +"2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:27.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:27.849 UTC [orderer.common.server] Broadcast -> DEBU 10dd Starting new Broadcast handler" +"2019-07-20 02:40:27.849 UTC [orderer.common.broadcast] Handle -> DEBU 10de Starting new broadcast loop for 172.18.0.9:39172" +"2019-07-20 02:40:27.866 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10df [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:39172 with txid 'cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919' of type ENDORSER_TRANSACTION" +"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.867 UTC [policies] Evaluate -> DEBU 10e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:40:27.868 UTC [policies] Evaluate -> DEBU 10e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.869 UTC [policies] Evaluate -> DEBU 10e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:27.869 UTC [msp] DeserializeIdentity -> DEBU 10e5 Obtaining identity" +"2019-07-20 02:40:27.870 UTC [msp.identity] newIdentity -> DEBU 10e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:27.870 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0011a80e0 gate 1563590427870766300 evaluation starts" +"2019-07-20 02:40:27.870 UTC [cauthdsl] func2 -> DEBU 10e8 0xc0011a80e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10e9 0xc0011a80e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:27.871 UTC [cauthdsl] func2 -> DEBU 10ea 0xc0011a80e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-07-20 02:40:27.872 UTC [cauthdsl] func2 -> DEBU 10eb 0xc0011a80e0 principal evaluation fails" +"2019-07-20 02:40:27.872 UTC [cauthdsl] func1 -> DEBU 10ec 0xc0011a80e0 gate 1563590427870766300 evaluation fails" +"2019-07-20 02:40:27.872 UTC [policies] Evaluate -> DEBU 10ed Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:27.873 UTC [policies] Evaluate -> DEBU 10ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:27.873 UTC [policies] func1 -> DEBU 10ef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-07-20 02:40:27.877 UTC [policies] Evaluate -> DEBU 10f0 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:40:27.878 UTC [policies] Evaluate -> DEBU 10f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:27.879 UTC [policies] Evaluate -> DEBU 10f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.880 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:27.880 UTC [cauthdsl] func1 -> DEBU 10f5 0xc0011a9710 gate 1563590427880758700 evaluation starts" +"2019-07-20 02:40:27.880 UTC [cauthdsl] func2 -> DEBU 10f6 0xc0011a9710 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0011a9710 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:27.881 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0011a9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.882 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0011a9710 principal evaluation fails" +"2019-07-20 02:40:27.882 UTC [cauthdsl] func1 -> DEBU 10fa 0xc0011a9710 gate 1563590427880758700 evaluation fails" +"2019-07-20 02:40:27.882 UTC [policies] Evaluate -> DEBU 10fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.883 UTC [policies] Evaluate -> DEBU 10fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:40:27.883 UTC [cauthdsl] func1 -> DEBU 10fe 0xc0011a9f70 gate 1563590427883598700 evaluation starts" +"2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 10ff 0xc0011a9f70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.883 UTC [cauthdsl] func2 -> DEBU 1100 0xc0011a9f70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:27.884 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1101 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:40:27.884 UTC [msp] Validate -> DEBU 1102 MSP Org2MSP validating identity" +"2019-07-20 02:40:27.884 UTC [msp] getCertificationChain -> DEBU 1103 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:27.885 UTC [cauthdsl] func2 -> DEBU 1104 0xc0011a9f70 principal matched by identity 0" +"2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| +00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" +"2019-07-20 02:40:27.885 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| +00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| +00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| +00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| +00000040 f3 e2 8c ca 4c 85 |....L.|" +"2019-07-20 02:40:27.886 UTC [cauthdsl] func2 -> DEBU 1107 0xc0011a9f70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.886 UTC [cauthdsl] func1 -> DEBU 1108 0xc0011a9f70 gate 1563590427883598700 evaluation succeeds" +"2019-07-20 02:40:27.886 UTC [policies] Evaluate -> DEBU 1109 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.887 UTC [policies] Evaluate -> DEBU 110b Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110d Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:40:27.888 UTC [policies] Evaluate -> DEBU 110e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:40:27.888 UTC [orderer.common.blockcutter] Ordered -> DEBU 110f Enqueuing message into batch" +"2019-07-20 02:40:27.889 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1110 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:39172" +"2019-07-20 02:40:27.897 UTC [grpc] warningf -> DEBU 1111 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39172: read: connection reset by peer" +"2019-07-20 02:40:27.901 UTC [grpc] infof -> DEBU 1112 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:27.902 UTC [orderer.common.broadcast] Handle -> WARN 1113 Error reading from 172.18.0.9:39172: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:27.902 UTC [orderer.common.server] func1 -> DEBU 1114 Closing Broadcast stream" +"2019-07-20 02:40:27.903 UTC [comm.grpc.server] 1 -> INFO 1115 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.0506ms +"2019-07-20 02:40:27.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:27.970 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +"2019-07-20 02:40:27.971 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.4µs " +"2019-07-20 02:40:28.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +"2019-07-20 02:40:28.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-07-20 02:40:28.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 405µs " +"2019-07-20 02:40:28.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.9µs " +"2019-07-20 02:40:28.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:28.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:28.471 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:28.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-07-20 02:40:28.474 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 450.9µs " +"2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 39.2µs" +"2019-07-20 02:40:28.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1123 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +"2019-07-20 02:40:28.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1124 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.4µs " +"2019-07-20 02:40:28.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0312ms " +"2019-07-20 02:40:28.731 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:28.732 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:28.973 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:28.974 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50.1µs" +"2019-07-20 02:40:28.975 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " +"2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" +"2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.2µs " +"2019-07-20 02:40:29.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" +"2019-07-20 02:40:29.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.4µs " +"2019-07-20 02:40:29.232 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.472 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:29.472 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-07-20 02:40:29.473 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +"2019-07-20 02:40:29.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 3 on channel businesschannel took 32.1µs" +"2019-07-20 02:40:29.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 2 on channel businesschannel took 258.8µs" +"2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.3µs " +"2019-07-20 02:40:29.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 584.7µs " +"2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 113a Batch timer expired, creating block" channel=businesschannel node=1 +"2019-07-20 02:40:29.890 UTC [orderer.consensus.etcdraft] propose -> INFO 113b Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:40:29.891 UTC [orderer.consensus.etcdraft] 2 -> DEBU 113c Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:40:29.894 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 3112 bytes to 3 on channel businesschannel took 17µs" +"2019-07-20 02:40:29.895 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113f Sending msg of 3112 bytes to 2 on channel businesschannel took 17.3µs" +"2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +"2019-07-20 02:40:29.895 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1140 Send of ConsensusRequest for channel businesschannel with payload of size 3112 to orderer1.example.com(orderer1.example.com:7050) took 79.2µs " +"2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +"2019-07-20 02:40:29.900 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.2µs " +"2019-07-20 02:40:29.899 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1144 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-07-20 02:40:29.900 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1146 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1147 Obtaining default signing identity" +"2019-07-20 02:40:29.900 UTC [msp] GetDefaultSigningIdentity -> DEBU 1148 Obtaining default signing identity" +"2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 1149 Sign: plaintext: 0A020802120B0A090A03010203100418...03E90289BE6FEC11C4DE24D2242E81F9 " +"2019-07-20 02:40:29.900 UTC [msp.identity] Sign -> DEBU 114a Sign: digest: 0CA473387D6CDB7D787CDA3D7B85AE1D177FA930A3C5FDFB7F504D999C61315F " +"2019-07-20 02:40:29.901 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114b Sending msg of 28 bytes to 3 on channel businesschannel took 893.6µs" +"2019-07-20 02:40:29.901 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " +"2019-07-20 02:40:29.902 UTC [fsblkstorage] indexBlock -> DEBU 114d Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= +txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 +]" +"2019-07-20 02:40:29.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.905 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:29.906 UTC [fsblkstorage] updateCheckpoint -> DEBU 1150 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[83904], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-07-20 02:40:29.907 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1151 [channel: businesschannel] Wrote block [5]" +"2019-07-20 02:40:29.909 UTC [fsblkstorage] waitForBlock -> DEBU 1152 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:29.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Remaining bytes=[3991], Going to peek [8] bytes" +"2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +"2019-07-20 02:40:29.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1155 blockbytes [3989] read from file [0]" +"2019-07-20 02:40:29.914 UTC [common.deliver] deliverBlocks -> DEBU 1156 [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:40:29.914 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:29.970 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:29.971 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 134.1µs" +"2019-07-20 02:40:29.972 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.4µs " +"2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115b Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-07-20 02:40:30.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.2µs " +"2019-07-20 02:40:30.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.3µs " +"2019-07-20 02:40:30.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:30.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:30.470 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1162 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2019-07-20 02:40:30.470 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-07-20 02:40:30.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1165 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1166 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327.6µs " +"2019-07-20 02:40:30.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1167 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 471.7µs " +"2019-07-20 02:40:30.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1168 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:30.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1169 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:30.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116b Sending msg of 28 bytes to 3 on channel testchainid took 316.3µs" +"2019-07-20 02:40:30.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +"2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116d Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2019-07-20 02:40:31.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116e Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.2µs " +"2019-07-20 02:40:31.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1170 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.6µs " +"2019-07-20 02:40:31.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1171 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:31.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1172 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1173 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:31.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1174 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-07-20 02:40:31.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +"2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1176 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-07-20 02:40:31.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1177 Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +"2019-07-20 02:40:31.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1178 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2436ms " +"2019-07-20 02:40:31.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1179 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.9µs " +"2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:31.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:31.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:31.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-07-20 02:40:31.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.6882ms " +"2019-07-20 02:40:32.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-07-20 02:40:32.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.9µs " +"2019-07-20 02:40:32.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1182 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.9µs " +"2019-07-20 02:40:32.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:32.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1184 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1185 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:32.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1186 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +"2019-07-20 02:40:32.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1187 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +"2019-07-20 02:40:32.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1188 Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2019-07-20 02:40:32.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:32.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1189 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.9µs " +"2019-07-20 02:40:32.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2019-07-20 02:40:32.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:32.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118f Sending msg of 28 bytes to 3 on channel testchainid took 51.8µs" +"2019-07-20 02:40:32.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1190 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-07-20 02:40:33.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1192 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1193 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +"2019-07-20 02:40:33.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1194 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:33.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " +"2019-07-20 02:40:33.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1196 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:33.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:33.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1198 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +"2019-07-20 02:40:33.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1199 Sending msg of 28 bytes to 3 on channel testchainid took 111.4µs" +"2019-07-20 02:40:33.617 UTC [orderer.common.server] Deliver -> DEBU 119a Starting new Deliver handler" +"2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119b Starting new deliver loop for 172.18.0.9:39218" +"2019-07-20 02:40:33.618 UTC [common.deliver] Handle -> DEBU 119c Attempting to read seek info message from 172.18.0.9:39218" +"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.618 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:33.618 UTC [msp] DeserializeIdentity -> DEBU 11a2 Obtaining identity" +"2019-07-20 02:40:33.619 UTC [msp.identity] newIdentity -> DEBU 11a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:33.619 UTC [cauthdsl] func1 -> DEBU 11a4 0xc000f79400 gate 1563590433619571000 evaluation starts" +"2019-07-20 02:40:33.619 UTC [cauthdsl] func2 -> DEBU 11a5 0xc000f79400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.624 UTC [cauthdsl] func2 -> DEBU 11a6 0xc000f79400 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:33.624 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a7 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:40:33.624 UTC [msp] Validate -> DEBU 11a8 MSP OrdererMSP validating identity" +"2019-07-20 02:40:33.625 UTC [cauthdsl] func2 -> DEBU 11a9 0xc000f79400 principal matched by identity 0" +"2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 55 c9 26 71 a9 da 8f 39 4f 12 4f 6c f0 e9 45 30 |U.&q...9O.Ol..E0| +00000010 9c 1f 65 0e 71 cd 0b fc 87 3b 26 9b bf af 0f b7 |..e.q....;&.....|" +"2019-07-20 02:40:33.626 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 13 d1 7a 88 5c 59 6e d7 83 10 61 2a |0D. ..z.\Yn...a*| +00000010 cc d9 b5 7b 34 21 e2 06 ae 3f 74 89 f3 c8 b9 56 |...{4!...?t....V| +00000020 94 88 ac 9d 02 20 4b 56 d3 98 42 a4 81 45 8c 3b |..... KV..B..E.;| +00000030 e3 70 af d5 0b bb 8f 15 46 0e 6e 35 cc 57 76 3a |.p......F.n5.Wv:| +00000040 fe b2 06 79 24 ab |...y$.|" +"2019-07-20 02:40:33.627 UTC [cauthdsl] func2 -> DEBU 11ac 0xc000f79400 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.627 UTC [cauthdsl] func1 -> DEBU 11ad 0xc000f79400 gate 1563590433619571000 evaluation succeeds" +"2019-07-20 02:40:33.628 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.629 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.631 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:33.633 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:33.634 UTC [common.deliver] deliverBlocks -> DEBU 11b4 [channel: businesschannel] Received seekInfo (0xc00118d8c0) start: > stop: > from 172.18.0.9:39218" +"2019-07-20 02:40:33.634 UTC [fsblkstorage] Next -> DEBU 11b5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:33.634 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Remaining bytes=[3991], Going to peek [8] bytes" +"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +"2019-07-20 02:40:33.635 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b9 blockbytes [3989] read from file [0]" +"2019-07-20 02:40:33.635 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Delivering block for (0xc00118d8c0) for 172.18.0.9:39218" +"2019-07-20 02:40:33.636 UTC [common.deliver] deliverBlocks -> DEBU 11bb [channel: businesschannel] Done delivering to 172.18.0.9:39218 for (0xc00118d8c0)" +"2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bc Waiting for new SeekInfo from 172.18.0.9:39218" +"2019-07-20 02:40:33.636 UTC [common.deliver] Handle -> DEBU 11bd Attempting to read seek info message from 172.18.0.9:39218" +"2019-07-20 02:40:33.636 UTC [fsblkstorage] waitForBlock -> DEBU 11be Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:33.637 UTC [fsblkstorage] waitForBlock -> DEBU 11bf Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:33.644 UTC [grpc] warningf -> DEBU 11c0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39218: read: connection reset by peer" +"2019-07-20 02:40:33.646 UTC [common.deliver] Handle -> WARN 11c1 Error reading from 172.18.0.9:39218: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:33.646 UTC [orderer.common.server] func1 -> DEBU 11c2 Closing Deliver stream" +"2019-07-20 02:40:33.646 UTC [comm.grpc.server] 1 -> INFO 11c3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39218 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.802ms +"2019-07-20 02:40:33.649 UTC [grpc] infof -> DEBU 11c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:33.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +"2019-07-20 02:40:33.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c6 Sending msg of 28 bytes to 3 on channel businesschannel took 138.9µs" +"2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.8µs " +"2019-07-20 02:40:33.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.1µs " +"2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:33.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ca Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:33.889 UTC [orderer.common.server] Deliver -> DEBU 11cb Starting new Deliver handler" +"2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cc Starting new deliver loop for 172.18.0.9:39220" +"2019-07-20 02:40:33.889 UTC [common.deliver] Handle -> DEBU 11cd Attempting to read seek info message from 172.18.0.9:39220" +"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.890 UTC [policies] Evaluate -> DEBU 11d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.891 UTC [policies] Evaluate -> DEBU 11d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:33.892 UTC [cauthdsl] func1 -> DEBU 11d3 0xc00126b620 gate 1563590433891872700 evaluation starts" +"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d4 0xc00126b620 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d5 0xc00126b620 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:33.892 UTC [cauthdsl] func2 -> DEBU 11d6 0xc00126b620 principal matched by identity 0" +"2019-07-20 02:40:33.892 UTC [msp.identity] Verify -> DEBU 11d7 Verify: digest = 00000000 13 d8 2c 3b 19 3b 56 2b de 29 07 d5 a7 58 51 51 |..,;.;V+.)...XQQ| +00000010 2c a5 24 fa 2d be 90 7a 13 07 ec bb 28 fa a0 75 |,.$.-..z....(..u|" +"2019-07-20 02:40:33.893 UTC [msp.identity] Verify -> DEBU 11d8 Verify: sig = 00000000 30 44 02 20 38 3b 2b 4e 6c e1 52 68 ba be 33 3f |0D. 8;+Nl.Rh..3?| +00000010 d6 8c 76 d3 a8 19 dd 8f 42 b8 e8 ab 0b 36 a8 fd |..v.....B....6..| +00000020 f5 52 77 a7 02 20 62 ec 99 2a c5 17 af 85 b8 4d |.Rw.. b..*.....M| +00000030 bd c2 ff 9b 55 67 36 1a 52 7f 7c 0a 3e fe 7d 10 |....Ug6.R.|.>.}.| +00000040 59 05 00 c8 fa 88 |Y.....|" +"2019-07-20 02:40:33.894 UTC [cauthdsl] func2 -> DEBU 11d9 0xc00126b620 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.894 UTC [cauthdsl] func1 -> DEBU 11da 0xc00126b620 gate 1563590433891872700 evaluation succeeds" +"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11db Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.894 UTC [policies] Evaluate -> DEBU 11dd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11df Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:33.895 UTC [policies] Evaluate -> DEBU 11e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:33.896 UTC [common.deliver] deliverBlocks -> DEBU 11e1 [channel: businesschannel] Received seekInfo (0xc000fe9640) start: > stop: > from 172.18.0.9:39220" +"2019-07-20 02:40:33.896 UTC [fsblkstorage] Next -> DEBU 11e2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:33.896 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +"2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e4 Remaining bytes=[3991], Going to peek [8] bytes" +"2019-07-20 02:40:33.897 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +"2019-07-20 02:40:33.898 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 blockbytes [3989] read from file [0]" +"2019-07-20 02:40:33.899 UTC [common.deliver] deliverBlocks -> DEBU 11e7 [channel: businesschannel] Delivering block for (0xc000fe9640) for 172.18.0.9:39220" +"2019-07-20 02:40:33.900 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9640)" +"2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11e9 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:33.901 UTC [fsblkstorage] waitForBlock -> DEBU 11ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:33.901 UTC [common.deliver] Handle -> DEBU 11eb Waiting for new SeekInfo from 172.18.0.9:39220" +"2019-07-20 02:40:33.902 UTC [common.deliver] Handle -> DEBU 11ec Attempting to read seek info message from 172.18.0.9:39220" +"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:33.904 UTC [policies] Evaluate -> DEBU 11f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.906 UTC [policies] Evaluate -> DEBU 11f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:33.907 UTC [cauthdsl] func1 -> DEBU 11f2 0xc001299650 gate 1563590433907098600 evaluation starts" +"2019-07-20 02:40:33.907 UTC [cauthdsl] func2 -> DEBU 11f3 0xc001299650 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f4 0xc001299650 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:33.909 UTC [cauthdsl] func2 -> DEBU 11f5 0xc001299650 principal matched by identity 0" +"2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f6 Verify: digest = 00000000 4e 8f 7f 37 eb 86 61 f8 3b a4 3a d5 32 0f a5 e1 |N..7..a.;.:.2...| +00000010 e7 ad 54 65 39 59 bf 01 7d e9 93 a0 4c e6 69 9c |..Te9Y..}...L.i.|" +"2019-07-20 02:40:33.909 UTC [msp.identity] Verify -> DEBU 11f7 Verify: sig = 00000000 30 44 02 20 2a a1 af a0 ea d8 96 d9 ab 68 52 17 |0D. *........hR.| +00000010 22 12 bf fa 81 9a 3f 11 f8 78 dc 65 73 ca 36 94 |".....?..x.es.6.| +00000020 45 c4 79 3f 02 20 14 61 ea 34 83 b9 4c 1e 47 5e |E.y?. .a.4..L.G^| +00000030 4b a4 44 12 58 29 e9 7c f0 7a ad 65 ab 63 db ad |K.D.X).|.z.e.c..| +00000040 7f 37 d8 86 95 a8 |.7....|" +"2019-07-20 02:40:33.910 UTC [cauthdsl] func2 -> DEBU 11f8 0xc001299650 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.910 UTC [cauthdsl] func1 -> DEBU 11f9 0xc001299650 gate 1563590433907098600 evaluation succeeds" +"2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.910 UTC [policies] Evaluate -> DEBU 11fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:33.911 UTC [policies] Evaluate -> DEBU 11fe Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:33.912 UTC [policies] Evaluate -> DEBU 11ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:33.912 UTC [common.deliver] deliverBlocks -> DEBU 1200 [channel: businesschannel] Received seekInfo (0xc000fe9a00) start: > stop: > from 172.18.0.9:39220" +"2019-07-20 02:40:33.912 UTC [fsblkstorage] Next -> DEBU 1201 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:33.912 UTC [fsblkstorage] newBlockfileStream -> DEBU 1202 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +"2019-07-20 02:40:33.913 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1203 Remaining bytes=[36264], Going to peek [8] bytes" +"2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1204 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +"2019-07-20 02:40:33.914 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1205 blockbytes [23747] read from file [0]" +"2019-07-20 02:40:33.914 UTC [common.deliver] deliverBlocks -> DEBU 1206 [channel: businesschannel] Delivering block for (0xc000fe9a00) for 172.18.0.9:39220" +"2019-07-20 02:40:33.916 UTC [common.deliver] deliverBlocks -> DEBU 1207 [channel: businesschannel] Done delivering to 172.18.0.9:39220 for (0xc000fe9a00)" +"2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1208 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:33.916 UTC [fsblkstorage] waitForBlock -> DEBU 1209 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:33.917 UTC [common.deliver] Handle -> DEBU 120a Waiting for new SeekInfo from 172.18.0.9:39220" +"2019-07-20 02:40:33.921 UTC [common.deliver] Handle -> DEBU 120b Attempting to read seek info message from 172.18.0.9:39220" +"2019-07-20 02:40:33.927 UTC [common.deliver] Handle -> WARN 120c Error reading from 172.18.0.9:39220: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:33.927 UTC [orderer.common.server] func1 -> DEBU 120d Closing Deliver stream" +"2019-07-20 02:40:33.927 UTC [comm.grpc.server] 1 -> INFO 120e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39220 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.5069ms +"2019-07-20 02:40:33.927 UTC [grpc] infof -> DEBU 120f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:33.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1210 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:33.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1211 Sending msg of 28 bytes to 3 on channel testchainid took 144.5µs" +"2019-07-20 02:40:33.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1212 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 641.5µs " +"2019-07-20 02:40:34.084 UTC [orderer.common.server] Deliver -> DEBU 1213 Starting new Deliver handler" +"2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1214 Starting new deliver loop for 172.18.0.9:39222" +"2019-07-20 02:40:34.084 UTC [common.deliver] Handle -> DEBU 1215 Attempting to read seek info message from 172.18.0.9:39222" +"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.092 UTC [policies] Evaluate -> DEBU 1218 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 1219 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.094 UTC [policies] Evaluate -> DEBU 121a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:34.094 UTC [cauthdsl] func1 -> DEBU 121b 0xc0012b7f40 gate 1563590434094666400 evaluation starts" +"2019-07-20 02:40:34.094 UTC [cauthdsl] func2 -> DEBU 121c 0xc0012b7f40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121d 0xc0012b7f40 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:34.095 UTC [cauthdsl] func2 -> DEBU 121e 0xc0012b7f40 principal matched by identity 0" +"2019-07-20 02:40:34.095 UTC [msp.identity] Verify -> DEBU 121f Verify: digest = 00000000 7e 43 fb 52 94 7b bc 04 7f d2 6c 9f 95 25 f7 37 |~C.R.{....l..%.7| +00000010 cb dd 56 7a 09 c9 84 75 79 b9 ce fe e3 94 b6 a8 |..Vz...uy.......|" +"2019-07-20 02:40:34.096 UTC [msp.identity] Verify -> DEBU 1220 Verify: sig = 00000000 30 44 02 20 30 ff 5b 04 1f bb 8e 30 0c 4b 0d df |0D. 0.[....0.K..| +00000010 da 16 e8 1e 80 32 90 2a e0 3b c0 b3 17 30 c1 de |.....2.*.;...0..| +00000020 40 a9 a7 be 02 20 3f 66 5d 22 21 3c bd 50 53 04 |@.... ?f]"!<.PS.| +00000030 15 d4 8e 53 77 2c e1 82 f2 2a f8 dc f8 92 2c ea |...Sw,...*....,.| +00000040 bd 03 a8 60 34 1b |...`4.|" +"2019-07-20 02:40:34.103 UTC [cauthdsl] func2 -> DEBU 1221 0xc0012b7f40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:34.104 UTC [cauthdsl] func1 -> DEBU 1222 0xc0012b7f40 gate 1563590434094666400 evaluation succeeds" +"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1223 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1224 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.104 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:34.105 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:34.105 UTC [common.deliver] deliverBlocks -> DEBU 1229 [channel: businesschannel] Received seekInfo (0xc0013160c0) start: > stop: > from 172.18.0.9:39222" +"2019-07-20 02:40:34.106 UTC [fsblkstorage] Next -> DEBU 122a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:34.106 UTC [fsblkstorage] newBlockfileStream -> DEBU 122b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:34.106 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122c Remaining bytes=[83904], Going to peek [8] bytes" +"2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:34.107 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e blockbytes [23944] read from file [0]" +"2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 122f [channel: businesschannel] Delivering block for (0xc0013160c0) for 172.18.0.9:39222" +"2019-07-20 02:40:34.107 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Done delivering to 172.18.0.9:39222 for (0xc0013160c0)" +"2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1231 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:34.108 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:34.109 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:39222" +"2019-07-20 02:40:34.114 UTC [grpc] infof -> DEBU 1234 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:34.111 UTC [common.deliver] Handle -> DEBU 1235 Attempting to read seek info message from 172.18.0.9:39222" +"2019-07-20 02:40:34.114 UTC [common.deliver] Handle -> WARN 1236 Error reading from 172.18.0.9:39222: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:34.114 UTC [orderer.common.server] func1 -> DEBU 1237 Closing Deliver stream" +"2019-07-20 02:40:34.114 UTC [comm.grpc.server] 1 -> INFO 1238 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39222 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.6095ms +"2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 2 on channel businesschannel took 73.5µs" +"2019-07-20 02:40:34.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 123a Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +"2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 819.6µs " +"2019-07-20 02:40:34.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.5µs " +"2019-07-20 02:40:34.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:34.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 123e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:34.288 UTC [orderer.common.server] Deliver -> DEBU 123f Starting new Deliver handler" +"2019-07-20 02:40:34.288 UTC [common.deliver] Handle -> DEBU 1240 Starting new deliver loop for 172.18.0.9:39224" +"2019-07-20 02:40:34.289 UTC [common.deliver] Handle -> DEBU 1241 Attempting to read seek info message from 172.18.0.9:39224" +"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1243 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1244 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1245 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.290 UTC [policies] Evaluate -> DEBU 1246 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:34.290 UTC [cauthdsl] func1 -> DEBU 1247 0xc000266930 gate 1563590434290750100 evaluation starts" +"2019-07-20 02:40:34.290 UTC [cauthdsl] func2 -> DEBU 1248 0xc000266930 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 1249 0xc000266930 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124a 0xc000266930 principal matched by identity 0" +"2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 b6 ff ca 28 9e 7c 64 7c 18 2f fe 11 67 9f 5c e6 |...(.|d|./..g.\.| +00000010 98 c3 94 a2 a5 7c b7 2f 11 b6 5d 99 65 38 31 a1 |.....|./..].e81.|" +"2019-07-20 02:40:34.291 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 25 76 f6 0c 6b 08 93 d0 c9 c9 8b 6e |0D. %v..k......n| +00000010 39 ab 6d 08 97 a9 96 eb 84 0f d7 99 67 27 4c c8 |9.m.........g'L.| +00000020 eb 35 ec 00 02 20 64 0d 0d d0 2b 97 19 7f 7c 97 |.5... d...+...|.| +00000030 ff 71 2f 38 d7 cb 37 14 b3 79 d5 4d de 0a ef b3 |.q/8..7..y.M....| +00000040 dd a6 af 00 3d ed |....=.|" +"2019-07-20 02:40:34.291 UTC [cauthdsl] func2 -> DEBU 124d 0xc000266930 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:34.291 UTC [cauthdsl] func1 -> DEBU 124e 0xc000266930 gate 1563590434290750100 evaluation succeeds" +"2019-07-20 02:40:34.291 UTC [policies] Evaluate -> DEBU 124f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1250 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1251 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1252 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1253 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:34.292 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:34.293 UTC [common.deliver] deliverBlocks -> DEBU 1255 [channel: businesschannel] Received seekInfo (0xc000d14600) start: > stop: > from 172.18.0.9:39224" +"2019-07-20 02:40:34.293 UTC [fsblkstorage] Next -> DEBU 1256 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:34.293 UTC [fsblkstorage] newBlockfileStream -> DEBU 1257 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1258 Remaining bytes=[59957], Going to peek [8] bytes" +"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +"2019-07-20 02:40:34.294 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a blockbytes [23690] read from file [0]" +"2019-07-20 02:40:34.294 UTC [common.deliver] deliverBlocks -> DEBU 125b [channel: businesschannel] Delivering block for (0xc000d14600) for 172.18.0.9:39224" +"2019-07-20 02:40:34.295 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Done delivering to 172.18.0.9:39224 for (0xc000d14600)" +"2019-07-20 02:40:34.295 UTC [fsblkstorage] waitForBlock -> DEBU 125d Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:34.296 UTC [fsblkstorage] waitForBlock -> DEBU 125e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:34.295 UTC [common.deliver] Handle -> DEBU 125f Waiting for new SeekInfo from 172.18.0.9:39224" +"2019-07-20 02:40:34.296 UTC [common.deliver] Handle -> DEBU 1260 Attempting to read seek info message from 172.18.0.9:39224" +"2019-07-20 02:40:34.304 UTC [common.deliver] Handle -> WARN 1261 Error reading from 172.18.0.9:39224: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:34.304 UTC [orderer.common.server] func1 -> DEBU 1262 Closing Deliver stream" +"2019-07-20 02:40:34.304 UTC [comm.grpc.server] 1 -> INFO 1263 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39224 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.6359ms +"2019-07-20 02:40:34.304 UTC [grpc] infof -> DEBU 1264 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:34.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1265 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:34.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1266 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-07-20 02:40:34.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1267 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +"2019-07-20 02:40:34.458 UTC [orderer.common.server] Deliver -> DEBU 1268 Starting new Deliver handler" +"2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 1269 Starting new deliver loop for 172.18.0.9:39226" +"2019-07-20 02:40:34.458 UTC [common.deliver] Handle -> DEBU 126a Attempting to read seek info message from 172.18.0.9:39226" +"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.460 UTC [policies] Evaluate -> DEBU 126f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:34.460 UTC [cauthdsl] func1 -> DEBU 1270 0xc00029c200 gate 1563590434460744000 evaluation starts" +"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1271 0xc00029c200 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1272 0xc00029c200 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:34.461 UTC [cauthdsl] func2 -> DEBU 1273 0xc00029c200 principal matched by identity 0" +"2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 e1 5a 7b 9e 59 a0 ff dd e8 71 0e d6 50 2b b3 6b |.Z{.Y....q..P+.k| +00000010 eb 35 f7 c1 54 12 29 76 94 77 c8 7a 86 11 61 e3 |.5..T.)v.w.z..a.|" +"2019-07-20 02:40:34.461 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 44 02 20 33 2e 3f 3e e0 52 ff 41 fe b5 d3 a0 |0D. 3.?>.R.A....| +00000010 2d 27 e8 cf 58 7c ed 69 8b d4 f6 3d ab d4 9f a2 |-'..X|.i...=....| +00000020 c9 0d 27 04 02 20 39 44 87 05 83 70 f7 bd bd be |..'.. 9D...p....| +00000030 8c db 61 83 e9 1b 08 b9 80 be 5e ca 20 db a9 77 |..a.......^. ..w| +00000040 e6 dd 8c e8 6f 62 |....ob|" +"2019-07-20 02:40:34.462 UTC [cauthdsl] func2 -> DEBU 1276 0xc00029c200 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:34.462 UTC [cauthdsl] func1 -> DEBU 1277 0xc00029c200 gate 1563590434460744000 evaluation succeeds" +"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1278 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 1279 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.462 UTC [policies] Evaluate -> DEBU 127a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:34.463 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:34.463 UTC [common.deliver] deliverBlocks -> DEBU 127e [channel: businesschannel] Received seekInfo (0xc00121e580) start: > stop: > from 172.18.0.9:39226" +"2019-07-20 02:40:34.463 UTC [fsblkstorage] Next -> DEBU 127f Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:34.463 UTC [fsblkstorage] newBlockfileStream -> DEBU 1280 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1281 Remaining bytes=[36264], Going to peek [8] bytes" +"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1282 Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +"2019-07-20 02:40:34.464 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1283 blockbytes [23747] read from file [0]" +"2019-07-20 02:40:34.465 UTC [common.deliver] deliverBlocks -> DEBU 1284 [channel: businesschannel] Delivering block for (0xc00121e580) for 172.18.0.9:39226" +"2019-07-20 02:40:34.466 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Done delivering to 172.18.0.9:39226 for (0xc00121e580)" +"2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1286 Waiting for new SeekInfo from 172.18.0.9:39226" +"2019-07-20 02:40:34.467 UTC [common.deliver] Handle -> DEBU 1287 Attempting to read seek info message from 172.18.0.9:39226" +"2019-07-20 02:40:34.467 UTC [fsblkstorage] waitForBlock -> DEBU 1288 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:34.469 UTC [fsblkstorage] waitForBlock -> DEBU 1289 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:34.479 UTC [common.deliver] Handle -> WARN 128a Error reading from 172.18.0.9:39226: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:34.479 UTC [orderer.common.server] func1 -> DEBU 128b Closing Deliver stream" +"2019-07-20 02:40:34.479 UTC [comm.grpc.server] 1 -> INFO 128c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39226 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.8288ms +"2019-07-20 02:40:34.480 UTC [grpc] infof -> DEBU 128d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:34.685 UTC [orderer.common.server] Deliver -> DEBU 128e Starting new Deliver handler" +"2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 128f Starting new deliver loop for 172.18.0.9:39228" +"2019-07-20 02:40:34.685 UTC [common.deliver] Handle -> DEBU 1290 Attempting to read seek info message from 172.18.0.9:39228" +"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.686 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:34.687 UTC [cauthdsl] func1 -> DEBU 1296 0xc000bac420 gate 1563590434687004600 evaluation starts" +"2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1297 0xc000bac420 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:34.687 UTC [cauthdsl] func2 -> DEBU 1298 0xc000bac420 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:34.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 129a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.4µs " +"2019-07-20 02:40:34.691 UTC [cauthdsl] func2 -> DEBU 129b 0xc000bac420 principal matched by identity 0" +"2019-07-20 02:40:34.691 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 02 a4 1e 39 0d 23 70 6d 9f f9 40 d6 b3 e5 e0 92 |...9.#pm..@.....| +00000010 ca 59 28 b5 b1 75 d7 fa 41 f1 a7 d7 fb 4d b6 5b |.Y(..u..A....M.[|" +"2019-07-20 02:40:34.692 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 45 02 21 00 b3 bb c4 d7 0e 11 6a 64 b5 70 f2 |0E.!.......jd.p.| +00000010 a4 2f 1f 35 ef 03 2f 5c e0 ad e3 d3 2e d4 e2 dc |./.5../\........| +00000020 77 ce 7d 5c 03 02 20 59 2f 4b 35 61 19 df f7 e0 |w.}\.. Y/K5a....| +00000030 cb 0d 19 13 68 c4 9a 6f 5d 78 fa 5c f8 68 55 59 |....h..o]x.\.hUY| +00000040 10 07 f3 98 52 ba fc |....R..|" +"2019-07-20 02:40:34.692 UTC [cauthdsl] func2 -> DEBU 129e 0xc000bac420 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:34.692 UTC [cauthdsl] func1 -> DEBU 129f 0xc000bac420 gate 1563590434687004600 evaluation succeeds" +"2019-07-20 02:40:34.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a3 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.693 UTC [policies] Evaluate -> DEBU 12a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1299 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" +"2019-07-20 02:40:34.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12a5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.5µs" +"2019-07-20 02:40:34.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12a6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.3µs " +"2019-07-20 02:40:34.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12a7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:34.694 UTC [policies] Evaluate -> DEBU 12a8 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:34.697 UTC [policies] Evaluate -> DEBU 12a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:34.698 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Received seekInfo (0xc00121eb80) start: > stop: > from 172.18.0.9:39228" +"2019-07-20 02:40:34.698 UTC [fsblkstorage] Next -> DEBU 12ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:34.699 UTC [fsblkstorage] newBlockfileStream -> DEBU 12ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" +"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad Remaining bytes=[12514], Going to peek [8] bytes" +"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ae Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +"2019-07-20 02:40:34.700 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12af blockbytes [4527] read from file [0]" +"2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b0 [channel: businesschannel] Delivering block for (0xc00121eb80) for 172.18.0.9:39228" +"2019-07-20 02:40:34.701 UTC [common.deliver] deliverBlocks -> DEBU 12b1 [channel: businesschannel] Done delivering to 172.18.0.9:39228 for (0xc00121eb80)" +"2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b2 Waiting for new SeekInfo from 172.18.0.9:39228" +"2019-07-20 02:40:34.702 UTC [common.deliver] Handle -> DEBU 12b3 Attempting to read seek info message from 172.18.0.9:39228" +"2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b4 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:34.702 UTC [fsblkstorage] waitForBlock -> DEBU 12b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:34.710 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.9:39228: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:34.711 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" +"2019-07-20 02:40:34.710 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:34.712 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39228 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.4236ms +"2019-07-20 02:40:34.873 UTC [orderer.common.server] Deliver -> DEBU 12ba Starting new Deliver handler" +"2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bb Starting new deliver loop for 172.18.0.9:39230" +"2019-07-20 02:40:34.873 UTC [common.deliver] Handle -> DEBU 12bc Attempting to read seek info message from 172.18.0.9:39230" +"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:34.874 UTC [policies] Evaluate -> DEBU 12c1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:34.875 UTC [cauthdsl] func1 -> DEBU 12c2 0xc0003215b0 gate 1563590434875079900 evaluation starts" +"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003215b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003215b0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:34.875 UTC [cauthdsl] func2 -> DEBU 12c5 0xc0003215b0 principal matched by identity 0" +"2019-07-20 02:40:34.875 UTC [msp.identity] Verify -> DEBU 12c6 Verify: digest = 00000000 0d 6a 08 6e fa 8f 49 c2 62 af 5e b4 fa b8 cf 31 |.j.n..I.b.^....1| +00000010 9b d4 09 ce 65 9c 3a fe 53 fc 4f f8 fa 94 c5 2e |....e.:.S.O.....|" +"2019-07-20 02:40:34.876 UTC [msp.identity] Verify -> DEBU 12c7 Verify: sig = 00000000 30 45 02 21 00 b3 a8 89 f8 62 5b 5e e1 09 f0 07 |0E.!.....b[^....| +00000010 73 8d a2 99 7b 67 53 94 f8 56 14 78 9c 08 9f 2a |s...{gS..V.x...*| +00000020 47 10 0c 83 e2 02 20 57 a8 87 84 de 18 db 18 fd |G..... W........| +00000030 03 e7 40 b9 1a 50 6e cd 00 44 a2 2e 76 44 95 fb |..@..Pn..D..vD..| +00000040 94 0c 2a 5b 54 de da |..*[T..|" +"2019-07-20 02:40:34.876 UTC [cauthdsl] func2 -> DEBU 12c8 0xc0003215b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:34.877 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003215b0 gate 1563590434875079900 evaluation succeeds" +"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12ca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.877 UTC [policies] Evaluate -> DEBU 12cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12ce Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:34.878 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:34.878 UTC [common.deliver] deliverBlocks -> DEBU 12d0 [channel: businesschannel] Received seekInfo (0xc00121f300) start: > stop: > from 172.18.0.9:39230" +"2019-07-20 02:40:34.879 UTC [fsblkstorage] Next -> DEBU 12d1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:34.879 UTC [fsblkstorage] newBlockfileStream -> DEBU 12d2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" +"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d3 Remaining bytes=[7985], Going to peek [8] bytes" +"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d4 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +"2019-07-20 02:40:34.879 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d5 blockbytes [3992] read from file [0]" +"2019-07-20 02:40:34.880 UTC [common.deliver] deliverBlocks -> DEBU 12d6 [channel: businesschannel] Delivering block for (0xc00121f300) for 172.18.0.9:39230" +"2019-07-20 02:40:34.881 UTC [common.deliver] deliverBlocks -> DEBU 12d7 [channel: businesschannel] Done delivering to 172.18.0.9:39230 for (0xc00121f300)" +"2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d8 Waiting for new SeekInfo from 172.18.0.9:39230" +"2019-07-20 02:40:34.881 UTC [common.deliver] Handle -> DEBU 12d9 Attempting to read seek info message from 172.18.0.9:39230" +"2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12da Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:34.881 UTC [fsblkstorage] waitForBlock -> DEBU 12db Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:34.889 UTC [grpc] infof -> DEBU 12dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:34.889 UTC [common.deliver] Handle -> WARN 12dd Error reading from 172.18.0.9:39230: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:34.889 UTC [orderer.common.server] func1 -> DEBU 12de Closing Deliver stream" +"2019-07-20 02:40:34.890 UTC [comm.grpc.server] 1 -> INFO 12df streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39230 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2245ms +"2019-07-20 02:40:34.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12e0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:34.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12e1 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2019-07-20 02:40:34.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12e2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.6µs " +"2019-07-20 02:40:35.053 UTC [orderer.common.server] Deliver -> DEBU 12e3 Starting new Deliver handler" +"2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e4 Starting new deliver loop for 172.18.0.9:39232" +"2019-07-20 02:40:35.054 UTC [common.deliver] Handle -> DEBU 12e5 Attempting to read seek info message from 172.18.0.9:39232" +"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.054 UTC [policies] Evaluate -> DEBU 12ea == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.055 UTC [cauthdsl] func1 -> DEBU 12eb 0xc000c73a60 gate 1563590435055006700 evaluation starts" +"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ec 0xc000c73a60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ed 0xc000c73a60 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12ee 0xc000c73a60 principal matched by identity 0" +"2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12ef Verify: digest = 00000000 ac a4 e2 6b 85 76 c4 74 3c f2 ed 90 1d 38 82 3b |...k.v.t<....8.;| +00000010 a0 c5 2e 02 1b bc a5 1e 72 ed 54 a8 a8 51 12 40 |........r.T..Q.@|" +"2019-07-20 02:40:35.056 UTC [msp.identity] Verify -> DEBU 12f0 Verify: sig = 00000000 30 44 02 20 62 a1 1a 7d 4f 7a a7 76 ae 13 c5 ee |0D. b..}Oz.v....| +00000010 c1 18 b3 61 8e 0b 41 10 63 85 b2 a0 9b d8 0b f0 |...a..A.c.......| +00000020 e6 4e 6b 9b 02 20 79 f5 a2 9c 06 11 e5 d3 58 50 |.Nk.. y.......XP| +00000030 19 34 3b 23 73 79 56 ce 3a 78 61 8c 6a 2b 2a b2 |.4;#syV.:xa.j+*.| +00000040 a8 90 b3 51 05 21 |...Q.!|" +"2019-07-20 02:40:35.056 UTC [cauthdsl] func2 -> DEBU 12f1 0xc000c73a60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.057 UTC [cauthdsl] func1 -> DEBU 12f2 0xc000c73a60 gate 1563590435055006700 evaluation succeeds" +"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f3 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f5 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.057 UTC [policies] Evaluate -> DEBU 12f7 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.058 UTC [policies] Evaluate -> DEBU 12f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.058 UTC [common.deliver] deliverBlocks -> DEBU 12f9 [channel: businesschannel] Received seekInfo (0xc000d154c0) start: > stop: > from 172.18.0.9:39232" +"2019-07-20 02:40:35.059 UTC [fsblkstorage] Next -> DEBU 12fa Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-07-20 02:40:35.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12fb newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fc Remaining bytes=[3991], Going to peek [8] bytes" +"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fd Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +"2019-07-20 02:40:35.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12fe blockbytes [3989] read from file [0]" +"2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Delivering block for (0xc000d154c0) for 172.18.0.9:39232" +"2019-07-20 02:40:35.060 UTC [common.deliver] deliverBlocks -> DEBU 1300 [channel: businesschannel] Done delivering to 172.18.0.9:39232 for (0xc000d154c0)" +"2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1301 Waiting for new SeekInfo from 172.18.0.9:39232" +"2019-07-20 02:40:35.061 UTC [common.deliver] Handle -> DEBU 1302 Attempting to read seek info message from 172.18.0.9:39232" +"2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1303 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-07-20 02:40:35.061 UTC [fsblkstorage] waitForBlock -> DEBU 1304 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-07-20 02:40:35.067 UTC [common.deliver] Handle -> WARN 1305 Error reading from 172.18.0.9:39232: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:35.067 UTC [orderer.common.server] func1 -> DEBU 1306 Closing Deliver stream" +"2019-07-20 02:40:35.067 UTC [comm.grpc.server] 1 -> INFO 1307 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39232 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8221ms +"2019-07-20 02:40:35.067 UTC [grpc] infof -> DEBU 1308 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1309 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-07-20 02:40:35.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 130a Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +"2019-07-20 02:40:35.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 130c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 303.2µs " +"2019-07-20 02:40:35.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:35.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 130e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:35.229 UTC [orderer.common.server] Deliver -> DEBU 130f Starting new Deliver handler" +"2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1310 Starting new deliver loop for 172.18.0.9:39234" +"2019-07-20 02:40:35.229 UTC [common.deliver] Handle -> DEBU 1311 Attempting to read seek info message from 172.18.0.9:39234" +"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1314 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1315 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.230 UTC [policies] Evaluate -> DEBU 1316 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.230 UTC [msp] DeserializeIdentity -> DEBU 1317 Obtaining identity" +"2019-07-20 02:40:35.230 UTC [msp.identity] newIdentity -> DEBU 1318 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:35.231 UTC [cauthdsl] func1 -> DEBU 1319 0xc0003727b0 gate 1563590435231243700 evaluation starts" +"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131a 0xc0003727b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131b 0xc0003727b0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.231 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 131c Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:40:35.231 UTC [msp] Validate -> DEBU 131d MSP OrdererMSP validating identity" +"2019-07-20 02:40:35.231 UTC [cauthdsl] func2 -> DEBU 131e 0xc0003727b0 principal matched by identity 0" +"2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 131f Verify: digest = 00000000 21 3d 69 43 6a 6e 6b f0 67 21 36 03 79 43 b0 c4 |!=iCjnk.g!6.yC..| +00000010 00 5a b3 48 51 44 03 c7 11 f8 7a a3 64 02 ec d7 |.Z.HQD....z.d...|" +"2019-07-20 02:40:35.231 UTC [msp.identity] Verify -> DEBU 1320 Verify: sig = 00000000 30 45 02 21 00 cb 67 74 a4 b1 dc 3a 46 5a ed d1 |0E.!..gt...:FZ..| +00000010 c0 11 27 6e d2 fc 73 57 a5 16 e7 57 77 2f 31 ad |..'n..sW...Ww/1.| +00000020 7d 3e fe bb cc 02 20 16 e8 63 82 c0 a8 3b 0f bd |}>.... ..c...;..| +00000030 25 b8 3b a6 96 d6 8d 4b b7 2b b4 14 7b 36 4b f0 |%.;....K.+..{6K.| +00000040 93 6a 99 32 d9 6a d9 |.j.2.j.|" +"2019-07-20 02:40:35.232 UTC [cauthdsl] func2 -> DEBU 1321 0xc0003727b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.232 UTC [cauthdsl] func1 -> DEBU 1322 0xc0003727b0 gate 1563590435231243700 evaluation succeeds" +"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1323 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1324 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1325 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.232 UTC [policies] Evaluate -> DEBU 1327 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.233 UTC [policies] Evaluate -> DEBU 1328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.233 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: testchainid] Received seekInfo (0xc00121fd40) start: > stop: > from 172.18.0.9:39234" +"2019-07-20 02:40:35.233 UTC [fsblkstorage] Next -> DEBU 132a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:35.233 UTC [fsblkstorage] newBlockfileStream -> DEBU 132b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132c Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:35.234 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 132e blockbytes [25832] read from file [0]" +"2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: testchainid] Delivering block for (0xc00121fd40) for 172.18.0.9:39234" +"2019-07-20 02:40:35.235 UTC [common.deliver] deliverBlocks -> DEBU 1330 [channel: testchainid] Done delivering to 172.18.0.9:39234 for (0xc00121fd40)" +"2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1331 Waiting for new SeekInfo from 172.18.0.9:39234" +"2019-07-20 02:40:35.235 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:39234" +"2019-07-20 02:40:35.240 UTC [common.deliver] Handle -> WARN 1333 Error reading from 172.18.0.9:39234: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:35.240 UTC [orderer.common.server] func1 -> DEBU 1334 Closing Deliver stream" +"2019-07-20 02:40:35.241 UTC [grpc] infof -> DEBU 1336 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:35.240 UTC [comm.grpc.server] 1 -> INFO 1335 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39234 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.5766ms +"2019-07-20 02:40:35.387 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" +"2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:39236" +"2019-07-20 02:40:35.387 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:39236" +"2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.388 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.389 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.389 UTC [cauthdsl] func1 -> DEBU 133f 0xc000a9aba0 gate 1563590435389465100 evaluation starts" +"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1340 0xc000a9aba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1341 0xc000a9aba0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.389 UTC [cauthdsl] func2 -> DEBU 1342 0xc000a9aba0 principal matched by identity 0" +"2019-07-20 02:40:35.389 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 a3 e8 db 37 f6 15 94 6d cc 5b a8 1f fa 58 84 32 |...7...m.[...X.2| +00000010 9e b6 7b c3 61 44 5b 13 f9 b5 26 72 c7 d1 3e f6 |..{.aD[...&r..>.|" +"2019-07-20 02:40:35.390 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 44 02 20 6c 05 0c e0 64 52 d7 27 1e d3 5b 00 |0D. l...dR.'..[.| +00000010 0e 37 3e 87 0d 56 dd cd bc 6a f9 6a c6 9a 7f e3 |.7>..V...j.j....| +00000020 8d 52 4d e4 02 20 46 45 1f 56 83 eb ea 3a 47 23 |.RM.. FE.V...:G#| +00000030 80 46 c6 40 d8 6c 3d dc ae dc 82 53 d2 b2 6f c7 |.F.@.l=....S..o.| +00000040 d4 73 3a 68 8c eb |.s:h..|" +"2019-07-20 02:40:35.390 UTC [cauthdsl] func2 -> DEBU 1345 0xc000a9aba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.390 UTC [cauthdsl] func1 -> DEBU 1346 0xc000a9aba0 gate 1563590435389465100 evaluation succeeds" +"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1347 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1348 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.390 UTC [policies] Evaluate -> DEBU 1349 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134b Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.391 UTC [policies] Evaluate -> DEBU 134c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.391 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: testchainid] Received seekInfo (0xc000d15f40) start: > stop: > from 172.18.0.9:39236" +"2019-07-20 02:40:35.391 UTC [fsblkstorage] Next -> DEBU 134e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:35.392 UTC [fsblkstorage] newBlockfileStream -> DEBU 134f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1350 Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1351 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:35.392 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1352 blockbytes [25832] read from file [0]" +"2019-07-20 02:40:35.392 UTC [common.deliver] deliverBlocks -> DEBU 1353 [channel: testchainid] Delivering block for (0xc000d15f40) for 172.18.0.9:39236" +"2019-07-20 02:40:35.393 UTC [common.deliver] deliverBlocks -> DEBU 1354 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000d15f40)" +"2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1355 Waiting for new SeekInfo from 172.18.0.9:39236" +"2019-07-20 02:40:35.393 UTC [common.deliver] Handle -> DEBU 1356 Attempting to read seek info message from 172.18.0.9:39236" +"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1357 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1358 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 1359 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.397 UTC [policies] Evaluate -> DEBU 135b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.397 UTC [cauthdsl] func1 -> DEBU 135c 0xc00098ce00 gate 1563590435397329000 evaluation starts" +"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135d 0xc00098ce00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135e 0xc00098ce00 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.397 UTC [cauthdsl] func2 -> DEBU 135f 0xc00098ce00 principal matched by identity 0" +"2019-07-20 02:40:35.397 UTC [msp.identity] Verify -> DEBU 1360 Verify: digest = 00000000 68 c4 79 92 c2 31 53 58 65 63 fa cc e1 56 f0 c4 |h.y..1SXec...V..| +00000010 9d d8 6e 00 df a3 a9 99 e4 54 6f 66 dc 98 8b bb |..n......Tof....|" +"2019-07-20 02:40:35.398 UTC [msp.identity] Verify -> DEBU 1361 Verify: sig = 00000000 30 44 02 20 0a 30 2c b9 8b 65 2d bb 3b a0 a8 4f |0D. .0,..e-.;..O| +00000010 59 46 86 89 be b5 60 b6 1b 99 70 e7 57 b2 9e 05 |YF....`...p.W...| +00000020 fa 1a af 13 02 20 37 b6 be 8d 11 b7 5f 8c bd ff |..... 7....._...| +00000030 1c e6 68 15 f4 0b 4b 6e 39 d1 83 1f df 9b 61 57 |..h...Kn9.....aW| +00000040 1a b3 b6 b9 26 d7 |....&.|" +"2019-07-20 02:40:35.398 UTC [cauthdsl] func2 -> DEBU 1362 0xc00098ce00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.398 UTC [cauthdsl] func1 -> DEBU 1363 0xc00098ce00 gate 1563590435397329000 evaluation succeeds" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1364 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1365 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1366 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1368 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.398 UTC [policies] Evaluate -> DEBU 1369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.398 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: testchainid] Received seekInfo (0xc000ba6380) start: > stop: > from 172.18.0.9:39236" +"2019-07-20 02:40:35.398 UTC [fsblkstorage] Next -> DEBU 136b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:35.398 UTC [fsblkstorage] newBlockfileStream -> DEBU 136c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:35.398 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136d Remaining bytes=[44254], Going to peek [8] bytes" +"2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136e Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:35.399 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 136f blockbytes [18416] read from file [0]" +"2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1370 [channel: testchainid] Delivering block for (0xc000ba6380) for 172.18.0.9:39236" +"2019-07-20 02:40:35.399 UTC [common.deliver] deliverBlocks -> DEBU 1371 [channel: testchainid] Done delivering to 172.18.0.9:39236 for (0xc000ba6380)" +"2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1372 Waiting for new SeekInfo from 172.18.0.9:39236" +"2019-07-20 02:40:35.399 UTC [common.deliver] Handle -> DEBU 1373 Attempting to read seek info message from 172.18.0.9:39236" +"2019-07-20 02:40:35.407 UTC [common.deliver] Handle -> WARN 1374 Error reading from 172.18.0.9:39236: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:35.407 UTC [orderer.common.server] func1 -> DEBU 1375 Closing Deliver stream" +"2019-07-20 02:40:35.407 UTC [comm.grpc.server] 1 -> INFO 1376 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39236 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.797ms +"2019-07-20 02:40:35.407 UTC [grpc] infof -> DEBU 1377 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:35.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1378 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:35.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1379 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-07-20 02:40:35.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 137a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +"2019-07-20 02:40:35.532 UTC [orderer.common.server] Deliver -> DEBU 137b Starting new Deliver handler" +"2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137c Starting new deliver loop for 172.18.0.9:39238" +"2019-07-20 02:40:35.532 UTC [common.deliver] Handle -> DEBU 137d Attempting to read seek info message from 172.18.0.9:39238" +"2019-07-20 02:40:35.532 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1381 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.533 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.533 UTC [cauthdsl] func1 -> DEBU 1383 0xc0003d82d0 gate 1563590435533775300 evaluation starts" +"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1384 0xc0003d82d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1385 0xc0003d82d0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003d82d0 principal matched by identity 0" +"2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1387 Verify: digest = 00000000 5f 0f 4a 9d 65 bf b8 72 3a 23 8b 74 bb 3c eb 0a |_.J.e..r:#.t.<..| +00000010 5c 83 45 be 21 cb b8 82 64 47 77 dc c3 82 94 b1 |\.E.!...dGw.....|" +"2019-07-20 02:40:35.534 UTC [msp.identity] Verify -> DEBU 1388 Verify: sig = 00000000 30 44 02 20 55 dd fb 5f 82 29 2f 02 b4 96 12 2e |0D. U.._.)/.....| +00000010 cf 06 87 34 fb 14 87 9e f2 d3 4d e1 9a 41 da 1b |...4......M..A..| +00000020 e9 6c 31 74 02 20 0e c3 35 48 74 a6 7a ba bc c4 |.l1t. ..5Ht.z...| +00000030 9d ca 57 36 61 08 e0 86 35 25 85 e0 6a 97 1a f0 |..W6a...5%..j...| +00000040 5f ca 0b ee ae 2b |_....+|" +"2019-07-20 02:40:35.534 UTC [cauthdsl] func2 -> DEBU 1389 0xc0003d82d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.535 UTC [cauthdsl] func1 -> DEBU 138a 0xc0003d82d0 gate 1563590435533775300 evaluation succeeds" +"2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.535 UTC [policies] Evaluate -> DEBU 138c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.536 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.536 UTC [common.deliver] deliverBlocks -> DEBU 1391 [channel: testchainid] Received seekInfo (0xc0011d5300) start: > stop: > from 172.18.0.9:39238" +"2019-07-20 02:40:35.537 UTC [fsblkstorage] Next -> DEBU 1392 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:35.537 UTC [fsblkstorage] newBlockfileStream -> DEBU 1393 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1394 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-07-20 02:40:35.537 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1395 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:35.538 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1396 blockbytes [18416] read from file [0]" +"2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1397 [channel: testchainid] Delivering block for (0xc0011d5300) for 172.18.0.9:39238" +"2019-07-20 02:40:35.538 UTC [common.deliver] deliverBlocks -> DEBU 1398 [channel: testchainid] Done delivering to 172.18.0.9:39238 for (0xc0011d5300)" +"2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 1399 Waiting for new SeekInfo from 172.18.0.9:39238" +"2019-07-20 02:40:35.539 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 172.18.0.9:39238" +"2019-07-20 02:40:35.548 UTC [common.deliver] Handle -> WARN 139b Error reading from 172.18.0.9:39238: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:35.548 UTC [orderer.common.server] func1 -> DEBU 139c Closing Deliver stream" +"2019-07-20 02:40:35.548 UTC [comm.grpc.server] 1 -> INFO 139d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39238 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.69ms +"2019-07-20 02:40:35.549 UTC [grpc] infof -> DEBU 139e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 139f Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-07-20 02:40:35.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13a0 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-07-20 02:40:35.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-07-20 02:40:35.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 336.3µs " +"2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:35.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13a4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:35.702 UTC [orderer.common.server] Deliver -> DEBU 13a5 Starting new Deliver handler" +"2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a6 Starting new deliver loop for 172.18.0.9:39240" +"2019-07-20 02:40:35.702 UTC [common.deliver] Handle -> DEBU 13a7 Attempting to read seek info message from 172.18.0.9:39240" +"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.702 UTC [policies] Evaluate -> DEBU 13ac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:35.703 UTC [cauthdsl] func1 -> DEBU 13ad 0xc00096f690 gate 1563590435702988800 evaluation starts" +"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13ae 0xc00096f690 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13af 0xc00096f690 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:35.703 UTC [cauthdsl] func2 -> DEBU 13b0 0xc00096f690 principal matched by identity 0" +"2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b1 Verify: digest = 00000000 19 14 01 e4 ac 98 0d 33 b0 e7 e6 d9 29 ad da 78 |.......3....)..x| +00000010 5f 7f d8 63 22 18 6f c2 02 98 d1 16 ec c2 3a 40 |_..c".o.......:@|" +"2019-07-20 02:40:35.703 UTC [msp.identity] Verify -> DEBU 13b2 Verify: sig = 00000000 30 45 02 21 00 9a 96 af 90 93 69 2a e6 7c 2d e0 |0E.!......i*.|-.| +00000010 82 36 7d 5e 62 6a 40 ee 39 d4 0a 45 3d 05 fc a7 |.6}^bj@.9..E=...| +00000020 55 06 db 29 a9 02 20 24 38 5d 25 1f af c8 7e 67 |U..).. $8]%...~g| +00000030 be 9e 81 7e 9a c9 39 f9 28 bb 1e 72 6c 02 55 cf |...~..9.(..rl.U.| +00000040 3a 80 84 4b b9 48 5e |:..K.H^|" +"2019-07-20 02:40:35.704 UTC [cauthdsl] func2 -> DEBU 13b3 0xc00096f690 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.704 UTC [cauthdsl] func1 -> DEBU 13b4 0xc00096f690 gate 1563590435702988800 evaluation succeeds" +"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b7 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:35.704 UTC [policies] Evaluate -> DEBU 13b9 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:35.705 UTC [policies] Evaluate -> DEBU 13ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:35.705 UTC [common.deliver] deliverBlocks -> DEBU 13bb [channel: testchainid] Received seekInfo (0xc0011d5a80) start: > stop: > from 172.18.0.9:39240" +"2019-07-20 02:40:35.705 UTC [fsblkstorage] Next -> DEBU 13bc Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:35.705 UTC [fsblkstorage] newBlockfileStream -> DEBU 13bd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13be Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:35.705 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13bf Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:35.706 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c0 blockbytes [25832] read from file [0]" +"2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c1 [channel: testchainid] Delivering block for (0xc0011d5a80) for 172.18.0.9:39240" +"2019-07-20 02:40:35.706 UTC [common.deliver] deliverBlocks -> DEBU 13c2 [channel: testchainid] Done delivering to 172.18.0.9:39240 for (0xc0011d5a80)" +"2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c3 Waiting for new SeekInfo from 172.18.0.9:39240" +"2019-07-20 02:40:35.706 UTC [common.deliver] Handle -> DEBU 13c4 Attempting to read seek info message from 172.18.0.9:39240" +"2019-07-20 02:40:35.713 UTC [grpc] infof -> DEBU 13c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:35.714 UTC [common.deliver] Handle -> WARN 13c6 Error reading from 172.18.0.9:39240: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:35.714 UTC [orderer.common.server] func1 -> DEBU 13c7 Closing Deliver stream" +"2019-07-20 02:40:35.714 UTC [comm.grpc.server] 1 -> INFO 13c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39240 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8108ms +"2019-07-20 02:40:35.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13c9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:35.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ca Sending msg of 28 bytes to 3 on channel testchainid took 19.4µs" +"2019-07-20 02:40:35.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.7µs " +"2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cc Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2019-07-20 02:40:36.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13cd Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" +"2019-07-20 02:40:36.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.8µs " +"2019-07-20 02:40:36.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619µs " +"2019-07-20 02:40:36.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d0 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:36.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:36.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-07-20 02:40:36.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +"2019-07-20 02:40:36.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68µs " +"2019-07-20 02:40:36.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.2µs " +"2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:36.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13db Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:36.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13dc Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2019-07-20 02:40:36.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +"2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2019-07-20 02:40:37.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13df Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +"2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +"2019-07-20 02:40:37.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61µs " +"2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:37.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:37.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:37.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e5 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2019-07-20 02:40:37.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.5µs " +"2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e7 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-07-20 02:40:37.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e8 Sending msg of 28 bytes to 3 on channel businesschannel took 86.8µs" +"2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.9µs " +"2019-07-20 02:40:37.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +"2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13eb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:37.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ec Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:37.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ed Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:37.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ee Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-07-20 02:40:37.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.9µs " +"2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f0 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-07-20 02:40:38.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f1 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +"2019-07-20 02:40:38.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.8µs " +"2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f4 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:38.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:38.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f7 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-07-20 02:40:38.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +"2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f9 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2019-07-20 02:40:38.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13fa Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +"2019-07-20 02:40:38.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.2µs " +"2019-07-20 02:40:38.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fd Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:38.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ff Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:38.944 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1400 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-07-20 02:40:38.944 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1401 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.3µs " +"2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1402 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-07-20 02:40:39.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1403 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1404 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " +"2019-07-20 02:40:39.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1405 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.2µs " +"2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1406 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:39.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1407 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:39.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1408 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:39.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1409 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-07-20 02:40:39.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.6µs " +"2019-07-20 02:40:39.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +"2019-07-20 02:40:39.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 140c Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +"2019-07-20 02:40:39.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 513.5µs " +"2019-07-20 02:40:39.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 140e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.5µs " +"2019-07-20 02:40:39.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 140f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:39.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1410 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:39.797 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1411 No inactive chains to try to replicate" +"2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1412 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:39.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1413 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-07-20 02:40:39.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1414 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.7µs " +"2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1415 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +"2019-07-20 02:40:40.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1416 Sending msg of 28 bytes to 2 on channel businesschannel took 37.5µs" +"2019-07-20 02:40:40.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1417 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.4µs " +"2019-07-20 02:40:40.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1418 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.6µs " +"2019-07-20 02:40:40.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1419 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:40.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:40.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 141b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:40.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141c Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-07-20 02:40:40.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 141d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.6µs " +"2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +"2019-07-20 02:40:40.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +"2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2019-07-20 02:40:40.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +"2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:40.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:40.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1424 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:40.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1425 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2019-07-20 02:40:40.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.9µs " +"2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1427 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +"2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1428 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " +"2019-07-20 02:40:41.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1429 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2019-07-20 02:40:41.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.4µs " +"2019-07-20 02:40:41.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:41.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:41.434 UTC [orderer.common.cluster.step] handleMessage -> DEBU 142d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:41.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 142e Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +"2019-07-20 02:40:41.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 142f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +"2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1430 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-07-20 02:40:41.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1431 Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1432 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.1µs " +"2019-07-20 02:40:41.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1433 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.5µs " +"2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1434 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:41.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1435 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:41.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1436 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:41.938 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1437 Sending msg of 28 bytes to 3 on channel testchainid took 19µs" +"2019-07-20 02:40:41.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1438 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +"2019-07-20 02:40:42.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1439 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2019-07-20 02:40:42.206 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 143c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.2µs " +"2019-07-20 02:40:42.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 143a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.7µs " +"2019-07-20 02:40:42.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:42.207 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:42.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 143f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:42.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1440 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-07-20 02:40:42.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1441 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 380.7µs " +"2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1442 Sending msg of 28 bytes to 3 on channel businesschannel took 128.5µs" +"2019-07-20 02:40:42.755 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1443 Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-07-20 02:40:42.756 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1444 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 324.3µs " +"2019-07-20 02:40:42.757 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 492.8µs " +"2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1446 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:42.769 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1447 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:42.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 107.8µs" +"2019-07-20 02:40:42.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.1µs " +"2019-07-20 02:40:43.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144b Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +"2019-07-20 02:40:43.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144c Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +"2019-07-20 02:40:43.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.5µs " +"2019-07-20 02:40:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144f Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:43.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1450 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:43.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1451 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:43.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-07-20 02:40:43.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175µs " +"2019-07-20 02:40:43.708 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1454 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-07-20 02:40:43.709 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1455 Sending msg of 28 bytes to 3 on channel businesschannel took 96.5µs" +"2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1456 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.6µs " +"2019-07-20 02:40:43.709 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1457 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +"2019-07-20 02:40:43.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1458 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:43.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1459 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:43.939 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145b Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-07-20 02:40:43.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +"2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145d Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2019-07-20 02:40:44.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +"2019-07-20 02:40:44.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +"2019-07-20 02:40:44.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1461 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:44.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:44.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:44.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 3 on channel testchainid took 47.5µs" +"2019-07-20 02:40:44.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1465 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1466 Sending msg of 28 bytes to 2 on channel businesschannel took 39µs" +"2019-07-20 02:40:44.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1467 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2019-07-20 02:40:44.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1468 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +"2019-07-20 02:40:44.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1469 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.252ms " +"2019-07-20 02:40:44.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:44.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146b Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:44.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:44.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.3µs " +"2019-07-20 02:40:44.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146e Sending msg of 28 bytes to 3 on channel testchainid took 142.3µs" +"2019-07-20 02:40:45.006 UTC [orderer.common.server] Deliver -> DEBU 146f Starting new Deliver handler" +"2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1470 Starting new deliver loop for 172.18.0.9:39242" +"2019-07-20 02:40:45.006 UTC [common.deliver] Handle -> DEBU 1471 Attempting to read seek info message from 172.18.0.9:39242" +"2019-07-20 02:40:45.027 UTC [orderer.common.server] Broadcast -> DEBU 1472 Starting new Broadcast handler" +"2019-07-20 02:40:45.027 UTC [orderer.common.broadcast] Handle -> DEBU 1473 Starting new broadcast loop for 172.18.0.9:39244" +"2019-07-20 02:40:45.028 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1474 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39244" +"2019-07-20 02:40:45.028 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1475 Processing config update message for channel businesschannel" +"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1476 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1477 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1478 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 1479 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.029 UTC [policies] Evaluate -> DEBU 147a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:45.030 UTC [cauthdsl] func1 -> DEBU 147b 0xc0008d5e60 gate 1563590445030059300 evaluation starts" +"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147c 0xc0008d5e60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147d 0xc0008d5e60 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147e 0xc0008d5e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-07-20 02:40:45.030 UTC [cauthdsl] func2 -> DEBU 147f 0xc0008d5e60 principal evaluation fails" +"2019-07-20 02:40:45.031 UTC [cauthdsl] func1 -> DEBU 1480 0xc0008d5e60 gate 1563590445030059300 evaluation fails" +"2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1481 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.031 UTC [policies] Evaluate -> DEBU 1482 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.031 UTC [policies] func1 -> DEBU 1483 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1484 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1485 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1486 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:45.032 UTC [policies] Evaluate -> DEBU 1487 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.033 UTC [policies] Evaluate -> DEBU 1488 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:45.034 UTC [cauthdsl] func1 -> DEBU 1489 0xc000ff8b60 gate 1563590445034097500 evaluation starts" +"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148a 0xc000ff8b60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148b 0xc000ff8b60 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.034 UTC [cauthdsl] func2 -> DEBU 148c 0xc000ff8b60 principal matched by identity 0" +"2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148d Verify: digest = 00000000 d7 e2 4c 93 ff 7a b3 77 17 51 c6 90 73 4c d0 56 |..L..z.w.Q..sL.V| +00000010 38 2e 22 82 94 37 ee e8 42 7e db 1a 70 1b 33 b9 |8."..7..B~..p.3.|" +"2019-07-20 02:40:45.035 UTC [msp.identity] Verify -> DEBU 148e Verify: sig = 00000000 30 45 02 21 00 83 bb 89 24 35 e9 6f 9d ce 34 d2 |0E.!....$5.o..4.| +00000010 b8 0c 69 a7 39 e5 ba 1c 81 f9 c4 7b 9d a8 bd 53 |..i.9......{...S| +00000020 ee 9e dd 57 63 02 20 0c e4 bd e5 9c 35 78 1a 06 |...Wc. .....5x..| +00000030 6c da db e8 5a 85 7e 27 0c 66 30 bb 89 9e b1 8e |l...Z.~'.f0.....| +00000040 81 d5 3e f4 76 50 e1 |..>.vP.|" +"2019-07-20 02:40:45.036 UTC [cauthdsl] func2 -> DEBU 148f 0xc000ff8b60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.036 UTC [cauthdsl] func1 -> DEBU 1490 0xc000ff8b60 gate 1563590445034097500 evaluation succeeds" +"2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1491 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.036 UTC [policies] Evaluate -> DEBU 1492 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1493 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1494 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1495 Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:40:45.037 UTC [policies] Evaluate -> DEBU 1496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1497 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.038 UTC [common.configtx] addToMap -> DEBU 1498 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 1499 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.039 UTC [common.configtx] addToMap -> DEBU 149b Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149c Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149d Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.040 UTC [common.configtx] addToMap -> DEBU 149e Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 149f Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.041 UTC [common.configtx] addToMap -> DEBU 14a1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a2 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a3 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.042 UTC [common.configtx] addToMap -> DEBU 14a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a6 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.043 UTC [common.configtx] addToMap -> DEBU 14a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.044 UTC [common.configtx] addToMap -> DEBU 14ac Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ad Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14ae Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14af Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b1 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.045 UTC [common.configtx] addToMap -> DEBU 14b2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b3 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.046 UTC [common.configtx] verifyDeltaSet -> DEBU 14b4 Processing change to key: [Group] /Channel/Application" +"2019-07-20 02:40:45.046 UTC [common.configtx] policyForItem -> DEBU 14b5 Getting policy for item Application with mod_policy Admins" +"2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b6 Manager Channel looking up path []" +"2019-07-20 02:40:45.046 UTC [policies] Manager -> DEBU 14b7 Manager Channel has managers Orderer" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b8 Manager Channel has managers Application" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14b9 Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14ba Manager Channel has managers Orderer" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bb Manager Channel has managers Application" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bc Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14bd Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.047 UTC [policies] Manager -> DEBU 14be Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.048 UTC [policies] Evaluate -> DEBU 14c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:40:45.048 UTC [cauthdsl] deduplicate -> WARN 14c2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.048 UTC [cauthdsl] func1 -> DEBU 14c3 0xc0008d80c0 gate 1563590445048642600 evaluation starts" +"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c4 0xc0008d80c0 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c5 0xc0008d80c0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.048 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0008d80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0008d80c0 processing identity 1 with bytes of fd0280" +"2019-07-20 02:40:45.049 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14c8 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-07-20 02:40:45.049 UTC [cauthdsl] func2 -> DEBU 14c9 0xc0008d80c0 principal matched by identity 1" +"2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14ca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +"2019-07-20 02:40:45.049 UTC [msp.identity] Verify -> DEBU 14cb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +00000040 6a a2 e2 e3 7c fb |j...|.|" +"2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14cc 0xc0008d80c0 principal evaluation succeeds for identity 1" +"2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14cd 0xc0008d80c0 gate 1563590445048642600 evaluation succeeds" +"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.050 UTC [policies] Evaluate -> DEBU 14d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:40:45.050 UTC [cauthdsl] deduplicate -> WARN 14d1 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.050 UTC [cauthdsl] func1 -> DEBU 14d2 0xc0008d8ba0 gate 1563590445050800500 evaluation starts" +"2019-07-20 02:40:45.050 UTC [cauthdsl] func2 -> DEBU 14d3 0xc0008d8ba0 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d4 0xc0008d8ba0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.051 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 14d5 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d6 0xc0008d8ba0 principal matched by identity 0" +"2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d7 Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +"2019-07-20 02:40:45.051 UTC [msp.identity] Verify -> DEBU 14d8 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +00000040 ed 0f 29 74 0b 84 |..)t..|" +"2019-07-20 02:40:45.051 UTC [cauthdsl] func2 -> DEBU 14d9 0xc0008d8ba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.052 UTC [cauthdsl] func1 -> DEBU 14da 0xc0008d8ba0 gate 1563590445050800500 evaluation succeeds" +"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14db Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14dd Signature set satisfies policy /Channel/Application/Admins" +"2019-07-20 02:40:45.052 UTC [policies] Evaluate -> DEBU 14de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14df Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e1 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.052 UTC [common.configtx] verifyDeltaSet -> DEBU 14e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.053 UTC [common.configtx] verifyDeltaSet -> DEBU 14e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.053 UTC [common.configtx] recurseConfigMap -> DEBU 14e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14e9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14ea Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.054 UTC [common.configtx] recurseConfigMap -> DEBU 14eb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ec Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.055 UTC [common.configtx] recurseConfigMap -> DEBU 14f0 Setting policy for key Admins to " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f1 Setting policy for key Endorsement to " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f2 Setting policy for key LifecycleEndorsement to " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f3 Setting policy for key Readers to " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f4 Setting policy for key Writers to " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.056 UTC [common.configtx] recurseConfigMap -> DEBU 14f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14f9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fa Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.configtx] recurseConfigMap -> DEBU 14fe Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.057 UTC [common.channelconfig] NewStandardValues -> DEBU 14ff Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1500 Processing field: HashingAlgorithm" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1501 Processing field: BlockDataHashingStructure" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1502 Processing field: OrdererAddresses" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1503 Processing field: Consortium" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1504 Processing field: Capabilities" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] NewStandardValues -> DEBU 1505 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1506 Processing field: ACLs" +"2019-07-20 02:40:45.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1507 Processing field: Capabilities" +"2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 1508 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1509 Processing field: AnchorPeers" +"2019-07-20 02:40:45.059 UTC [common.channelconfig] NewStandardValues -> DEBU 150a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 150b Processing field: MSP" +"2019-07-20 02:40:45.060 UTC [common.channelconfig] Validate -> DEBU 150c Anchor peers for org Org3MSP are " +"2019-07-20 02:40:45.060 UTC [common.channelconfig] validateMSP -> DEBU 150d Setting up MSP for org Org3MSP" +"2019-07-20 02:40:45.060 UTC [msp] newBccspMsp -> DEBU 150e Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.060 UTC [msp] New -> DEBU 150f Creating Cache-MSP instance" +"2019-07-20 02:40:45.060 UTC [msp] Setup -> DEBU 1510 Setting up MSP instance Org3MSP" +"2019-07-20 02:40:45.060 UTC [msp.identity] newIdentity -> DEBU 1511 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.061 UTC [msp.identity] newIdentity -> DEBU 1512 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1513 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-07-20 02:40:45.061 UTC [msp] Validate -> DEBU 1514 MSP Org3MSP validating identity" +"2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1515 MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.062 UTC [msp] hasOURole -> DEBU 1516 MSP Org3MSP checking if the identity is a client" +"2019-07-20 02:40:45.062 UTC [msp] getCertificationChain -> DEBU 1517 MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 1518 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1519 Processing field: AnchorPeers" +"2019-07-20 02:40:45.062 UTC [common.channelconfig] NewStandardValues -> DEBU 151a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU 151b Processing field: MSP" +"2019-07-20 02:40:45.063 UTC [common.channelconfig] Validate -> DEBU 151c Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:40:45.063 UTC [common.channelconfig] validateMSP -> DEBU 151d Setting up MSP for org Org1MSP" +"2019-07-20 02:40:45.063 UTC [msp] newBccspMsp -> DEBU 151e Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.063 UTC [msp] New -> DEBU 151f Creating Cache-MSP instance" +"2019-07-20 02:40:45.063 UTC [msp] Setup -> DEBU 1520 Setting up MSP instance Org1MSP" +"2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1521 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.064 UTC [msp.identity] newIdentity -> DEBU 1522 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.065 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1523 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:40:45.066 UTC [msp] Validate -> DEBU 1524 MSP Org1MSP validating identity" +"2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1525 MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.066 UTC [msp] hasOURole -> DEBU 1526 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:40:45.066 UTC [msp] getCertificationChain -> DEBU 1527 MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 1528 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1529 Processing field: AnchorPeers" +"2019-07-20 02:40:45.067 UTC [common.channelconfig] NewStandardValues -> DEBU 152a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 152b Processing field: MSP" +"2019-07-20 02:40:45.067 UTC [common.channelconfig] Validate -> DEBU 152c Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:40:45.068 UTC [common.channelconfig] validateMSP -> DEBU 152d Setting up MSP for org Org2MSP" +"2019-07-20 02:40:45.068 UTC [msp] newBccspMsp -> DEBU 152e Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.068 UTC [msp] New -> DEBU 152f Creating Cache-MSP instance" +"2019-07-20 02:40:45.068 UTC [msp] Setup -> DEBU 1530 Setting up MSP instance Org2MSP" +"2019-07-20 02:40:45.069 UTC [msp.identity] newIdentity -> DEBU 1531 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.070 UTC [msp.identity] newIdentity -> DEBU 1532 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.070 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1533 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:40:45.070 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.071 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:40:45.071 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.072 UTC [common.channelconfig] NewStandardValues -> DEBU 1538 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1539 Processing field: ConsensusType" +"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153a Processing field: BatchSize" +"2019-07-20 02:40:45.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153b Processing field: BatchTimeout" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153c Processing field: KafkaBrokers" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153d Processing field: ChannelRestrictions" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153e Processing field: Capabilities" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 153f Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1540 Processing field: Endpoints" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] NewStandardValues -> DEBU 1541 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1542 Processing field: MSP" +"2019-07-20 02:40:45.073 UTC [common.channelconfig] validateMSP -> DEBU 1543 Setting up MSP for org OrdererOrg" +"2019-07-20 02:40:45.074 UTC [msp] newBccspMsp -> DEBU 1544 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.074 UTC [msp] New -> DEBU 1545 Creating Cache-MSP instance" +"2019-07-20 02:40:45.074 UTC [msp] Setup -> DEBU 1546 Setting up MSP instance OrdererMSP" +"2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1547 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.075 UTC [msp.identity] newIdentity -> DEBU 1548 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.076 UTC [msp] Validate -> DEBU 1549 MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154a Setting up the MSP manager (4 msps)" +"2019-07-20 02:40:45.077 UTC [msp] Setup -> DEBU 154b MSP manager setup complete, setup 4 msps" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154c Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154d Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154e Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 154f Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1550 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.077 UTC [policies] NewManagerImpl -> DEBU 1551 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1552 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1553 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1554 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1555 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1556 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.078 UTC [policies] NewManagerImpl -> DEBU 1557 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1558 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1559 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155a Proposed new policy Admins for Channel/Application" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155b Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155c Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 155f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1560 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:40:45.079 UTC [policies] NewManagerImpl -> DEBU 1561 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1562 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1563 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1564 Proposed new policy Writers for Channel" +"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1565 Proposed new policy Admins for Channel" +"2019-07-20 02:40:45.080 UTC [policies] NewManagerImpl -> DEBU 1566 Proposed new policy Readers for Channel" +"2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.080 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1569 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156b Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156c Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156d Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156e Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 156f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1570 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:40:45.081 UTC [common.configtx] addToMap -> DEBU 1571 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1572 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1573 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1574 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1575 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.082 UTC [common.configtx] addToMap -> DEBU 1576 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1577 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1578 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 1579 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157c Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:40:45.083 UTC [common.configtx] addToMap -> DEBU 157d Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157e Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 157f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1580 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1581 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1582 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1583 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1584 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:40:45.084 UTC [common.configtx] addToMap -> DEBU 1585 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1586 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1587 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1588 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.085 UTC [common.configtx] addToMap -> DEBU 1589 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:40:45.086 UTC [common.configtx] addToMap -> DEBU 158e Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 158f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1590 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1591 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1592 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1593 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1594 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:40:45.087 UTC [common.configtx] addToMap -> DEBU 1595 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1596 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1597 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1598 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 1599 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:40:45.088 UTC [common.configtx] addToMap -> DEBU 159a Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159b As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:40:45.088 UTC [common.channelconfig] LogSanityChecks -> DEBU 159c As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159d Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.088 UTC [policies] Manager -> DEBU 159e Manager Channel has managers Application" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 159f Manager Channel has managers Orderer" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a0 Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a1 Manager Channel/Application has managers Org3MSP" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a2 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a3 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a4 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a5 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:40:45.089 UTC [common.channelconfig] LogSanityChecks -> DEBU 15a6 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a7 Manager Channel looking up path [Orderer]" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a8 Manager Channel has managers Application" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15a9 Manager Channel has managers Orderer" +"2019-07-20 02:40:45.089 UTC [policies] Manager -> DEBU 15aa Manager Channel/Orderer looking up path []" +"2019-07-20 02:40:45.090 UTC [policies] Manager -> DEBU 15ab Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ac As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ad As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15ae As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:40:45.090 UTC [common.channelconfig] LogSanityChecks -> DEBU 15af As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b0 Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.090 UTC [common.capabilities] Supported -> DEBU 15b1 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b2 Obtaining default signing identity" +"2019-07-20 02:40:45.090 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b3 Obtaining default signing identity" +"2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b4 Sign: plaintext: 0AD2060A1B08011A0608ADFEC9E90522...270C6630BB899EB18E81D53EF47650E1 " +"2019-07-20 02:40:45.091 UTC [msp.identity] Sign -> DEBU 15b5 Sign: digest: E65706ACD2876BC2B6927B61ADD89D93F75A2ABE3D407C2904A013785C74D7B8 " +"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.091 UTC [policies] Evaluate -> DEBU 15ba == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:45.091 UTC [msp] DeserializeIdentity -> DEBU 15bb Obtaining identity" +"2019-07-20 02:40:45.092 UTC [msp.identity] newIdentity -> DEBU 15bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.092 UTC [cauthdsl] func1 -> DEBU 15bd 0xc001062e00 gate 1563590445092476300 evaluation starts" +"2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15be 0xc001062e00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.092 UTC [cauthdsl] func2 -> DEBU 15bf 0xc001062e00 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.092 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c0 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:40:45.092 UTC [msp] Validate -> DEBU 15c1 MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c2 0xc001062e00 principal matched by identity 0" +"2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c3 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| +00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" +"2019-07-20 02:40:45.093 UTC [msp.identity] Verify -> DEBU 15c4 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| +00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| +00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| +00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| +00000040 63 b0 56 6b 0a |c.Vk.|" +"2019-07-20 02:40:45.093 UTC [cauthdsl] func2 -> DEBU 15c5 0xc001062e00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.093 UTC [cauthdsl] func1 -> DEBU 15c6 0xc001062e00 gate 1563590445092476300 evaluation succeeds" +"2019-07-20 02:40:45.093 UTC [policies] Evaluate -> DEBU 15c7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15c9 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cb Signature set satisfies policy /Channel/Writers" +"2019-07-20 02:40:45.094 UTC [policies] Evaluate -> DEBU 15cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-07-20 02:40:45.094 UTC [orderer.common.msgprocessor] Apply -> DEBU 15cd Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-07-20 02:40:45.094 UTC [common.channelconfig] NewStandardValues -> DEBU 15ce Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cf Processing field: HashingAlgorithm" +"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d0 Processing field: BlockDataHashingStructure" +"2019-07-20 02:40:45.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: OrdererAddresses" +"2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d2 Processing field: Consortium" +"2019-07-20 02:40:45.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: Capabilities" +"2019-07-20 02:40:45.096 UTC [common.channelconfig] NewStandardValues -> DEBU 15d4 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d5 Processing field: ACLs" +"2019-07-20 02:40:45.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d6 Processing field: Capabilities" +"2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d8 Processing field: AnchorPeers" +"2019-07-20 02:40:45.097 UTC [common.channelconfig] NewStandardValues -> DEBU 15d9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.097 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15da Processing field: MSP" +"2019-07-20 02:40:45.097 UTC [common.channelconfig] Validate -> DEBU 15db Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:40:45.097 UTC [common.channelconfig] validateMSP -> DEBU 15dc Setting up MSP for org Org2MSP" +"2019-07-20 02:40:45.097 UTC [msp] newBccspMsp -> DEBU 15dd Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.097 UTC [msp] New -> DEBU 15de Creating Cache-MSP instance" +"2019-07-20 02:40:45.097 UTC [msp] Setup -> DEBU 15df Setting up MSP instance Org2MSP" +"2019-07-20 02:40:45.097 UTC [msp.identity] newIdentity -> DEBU 15e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.098 UTC [msp.identity] newIdentity -> DEBU 15e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.098 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15e2 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:40:45.098 UTC [msp] Validate -> DEBU 15e3 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.098 UTC [msp] getCertificationChain -> DEBU 15e4 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.099 UTC [msp] hasOURole -> DEBU 15e5 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:40:45.099 UTC [msp] getCertificationChain -> DEBU 15e6 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: AnchorPeers" +"2019-07-20 02:40:45.099 UTC [common.channelconfig] NewStandardValues -> DEBU 15e9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: MSP" +"2019-07-20 02:40:45.099 UTC [common.channelconfig] Validate -> DEBU 15eb Anchor peers for org Org3MSP are " +"2019-07-20 02:40:45.100 UTC [common.channelconfig] validateMSP -> DEBU 15ec Setting up MSP for org Org3MSP" +"2019-07-20 02:40:45.100 UTC [msp] newBccspMsp -> DEBU 15ed Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.100 UTC [msp] New -> DEBU 15ee Creating Cache-MSP instance" +"2019-07-20 02:40:45.100 UTC [msp] Setup -> DEBU 15ef Setting up MSP instance Org3MSP" +"2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.100 UTC [msp.identity] newIdentity -> DEBU 15f1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.101 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15f2 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-07-20 02:40:45.101 UTC [msp] Validate -> DEBU 15f3 MSP Org3MSP validating identity" +"2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f4 MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.101 UTC [msp] hasOURole -> DEBU 15f5 MSP Org3MSP checking if the identity is a client" +"2019-07-20 02:40:45.101 UTC [msp] getCertificationChain -> DEBU 15f6 MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f8 Processing field: AnchorPeers" +"2019-07-20 02:40:45.102 UTC [common.channelconfig] NewStandardValues -> DEBU 15f9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.102 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15fa Processing field: MSP" +"2019-07-20 02:40:45.102 UTC [common.channelconfig] Validate -> DEBU 15fb Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:40:45.102 UTC [common.channelconfig] validateMSP -> DEBU 15fc Setting up MSP for org Org1MSP" +"2019-07-20 02:40:45.102 UTC [msp] newBccspMsp -> DEBU 15fd Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.102 UTC [msp] New -> DEBU 15fe Creating Cache-MSP instance" +"2019-07-20 02:40:45.102 UTC [msp] Setup -> DEBU 15ff Setting up MSP instance Org1MSP" +"2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.103 UTC [msp.identity] newIdentity -> DEBU 1601 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.104 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1602 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:40:45.104 UTC [msp] Validate -> DEBU 1603 MSP Org1MSP validating identity" +"2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1604 MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.104 UTC [msp] hasOURole -> DEBU 1605 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:40:45.104 UTC [msp] getCertificationChain -> DEBU 1606 MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] NewStandardValues -> DEBU 1607 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1608 Processing field: ConsensusType" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1609 Processing field: BatchSize" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160a Processing field: BatchTimeout" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160b Processing field: KafkaBrokers" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160c Processing field: ChannelRestrictions" +"2019-07-20 02:40:45.104 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160d Processing field: Capabilities" +"2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 160e Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160f Processing field: Endpoints" +"2019-07-20 02:40:45.105 UTC [common.channelconfig] NewStandardValues -> DEBU 1610 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.105 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1611 Processing field: MSP" +"2019-07-20 02:40:45.105 UTC [common.channelconfig] validateMSP -> DEBU 1612 Setting up MSP for org OrdererOrg" +"2019-07-20 02:40:45.105 UTC [msp] newBccspMsp -> DEBU 1613 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.105 UTC [msp] New -> DEBU 1614 Creating Cache-MSP instance" +"2019-07-20 02:40:45.106 UTC [msp] Setup -> DEBU 1615 Setting up MSP instance OrdererMSP" +"2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1616 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.108 UTC [msp.identity] newIdentity -> DEBU 1617 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.109 UTC [msp] Validate -> DEBU 1618 MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 1619 Setting up the MSP manager (4 msps)" +"2019-07-20 02:40:45.109 UTC [msp] Setup -> DEBU 161a MSP manager setup complete, setup 4 msps" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161b Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161e Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 161f Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1620 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1621 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.109 UTC [policies] NewManagerImpl -> DEBU 1622 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1623 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1624 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1625 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1626 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1627 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1628 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:40:45.110 UTC [policies] NewManagerImpl -> DEBU 1629 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162a Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162b Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.111 UTC [policies] NewManagerImpl -> DEBU 162f Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1630 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1631 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1632 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1633 Proposed new policy Writers for Channel" +"2019-07-20 02:40:45.112 UTC [policies] NewManagerImpl -> DEBU 1634 Proposed new policy Admins for Channel" +"2019-07-20 02:40:45.113 UTC [policies] NewManagerImpl -> DEBU 1635 Proposed new policy Readers for Channel" +"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.113 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.114 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:40:45.115 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1645 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1646 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.116 UTC [common.configtx] addToMap -> DEBU 1647 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1648 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 1649 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164a Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164e Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.117 UTC [common.configtx] addToMap -> DEBU 164f Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1650 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1651 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1652 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1653 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1654 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1655 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1656 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:40:45.118 UTC [common.configtx] addToMap -> DEBU 1657 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1658 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 1659 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:40:45.119 UTC [common.configtx] addToMap -> DEBU 165b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 165f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1660 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1661 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1662 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1663 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1664 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1665 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:40:45.120 UTC [common.configtx] addToMap -> DEBU 1666 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1667 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1668 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:40:45.121 UTC [common.configtx] addToMap -> DEBU 1669 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:40:45.121 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 166a [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39244" +"2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] propose -> INFO 166b Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-07-20 02:40:45.122 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 166c Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-07-20 02:40:45.123 UTC [orderer.consensus.etcdraft] 2 -> DEBU 166d Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-07-20 02:40:45.124 UTC [common.deliver] Handle -> WARN 166e Error reading from 172.18.0.9:39242: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.124 UTC [orderer.common.server] func1 -> DEBU 166f Closing Deliver stream" +"2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1670 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39242 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=118.9084ms +"2019-07-20 02:40:45.125 UTC [grpc] infof -> DEBU 1671 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.125 UTC [orderer.common.broadcast] Handle -> WARN 1672 Error reading from 172.18.0.9:39244: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.125 UTC [orderer.common.server] func1 -> DEBU 1673 Closing Broadcast stream" +"2019-07-20 02:40:45.125 UTC [comm.grpc.server] 1 -> INFO 1674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39244 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.4809ms +"2019-07-20 02:40:45.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 34005 bytes to 3 on channel businesschannel took 19µs" +"2019-07-20 02:40:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1678 Sending msg of 34005 bytes to 2 on channel businesschannel took 13.7µs" +"2019-07-20 02:40:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1679 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer1.example.com(orderer1.example.com:7050) took 276.9µs " +"2019-07-20 02:40:45.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel businesschannel with payload of size 34005 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " +"2019-07-20 02:40:45.131 UTC [grpc] infof -> DEBU 1677 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +"2019-07-20 02:40:45.135 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167c Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +"2019-07-20 02:40:45.137 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7105ms " +"2019-07-20 02:40:45.137 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 167e Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 167f Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1680 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1681 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1682 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1683 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1684 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1685 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.137 UTC [common.configtx] addToMap -> DEBU 1686 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1687 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1688 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1689 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168a Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168b Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168d Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 168f Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1690 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1691 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1692 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1693 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1694 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1695 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1696 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.138 UTC [common.configtx] verifyDeltaSet -> DEBU 169c Processing change to key: [Group] /Channel/Application" +"2019-07-20 02:40:45.138 UTC [common.configtx] policyForItem -> DEBU 169d Getting policy for item Application with mod_policy Admins" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169e Manager Channel looking up path []" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 169f Manager Channel has managers Orderer" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a0 Manager Channel has managers Application" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a1 Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a2 Manager Channel has managers Orderer" +"2019-07-20 02:40:45.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66µs " +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a4 Manager Channel has managers Application" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a5 Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a6 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.138 UTC [policies] Manager -> DEBU 16a7 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.138 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:40:45.138 UTC [cauthdsl] deduplicate -> WARN 16ab De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func1 -> DEBU 16ac 0xc000fa71d0 gate 1563590445139011500 evaluation starts" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ad 0xc000fa71d0 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16ae 0xc000fa71d0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16af 0xc000fa71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b0 0xc000fa71d0 processing identity 1 with bytes of fd0280" +"2019-07-20 02:40:45.139 UTC [cauthdsl] func2 -> DEBU 16b1 0xc000fa71d0 principal matched by identity 1" +"2019-07-20 02:40:45.139 UTC [msp.identity] Verify -> DEBU 16b2 Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +"2019-07-20 02:40:45.141 UTC [msp.identity] Verify -> DEBU 16b3 Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +00000040 6a a2 e2 e3 7c fb |j...|.|" +"2019-07-20 02:40:45.141 UTC [cauthdsl] func2 -> DEBU 16b4 0xc000fa71d0 principal evaluation succeeds for identity 1" +"2019-07-20 02:40:45.141 UTC [cauthdsl] func1 -> DEBU 16b5 0xc000fa71d0 gate 1563590445139011500 evaluation succeeds" +"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b6 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.142 UTC [policies] Evaluate -> DEBU 16b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:40:45.143 UTC [cauthdsl] deduplicate -> WARN 16b9 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.144 UTC [cauthdsl] func1 -> DEBU 16bb 0xc000fa7890 gate 1563590445144040900 evaluation starts" +"2019-07-20 02:40:45.144 UTC [cauthdsl] func2 -> DEBU 16bc 0xc000fa7890 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.145 UTC [cauthdsl] func2 -> DEBU 16bd 0xc000fa7890 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.146 UTC [cauthdsl] func2 -> DEBU 16be 0xc000fa7890 principal matched by identity 0" +"2019-07-20 02:40:45.146 UTC [msp.identity] Verify -> DEBU 16bf Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +"2019-07-20 02:40:45.147 UTC [msp.identity] Verify -> DEBU 16c0 Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +00000040 ed 0f 29 74 0b 84 |..)t..|" +"2019-07-20 02:40:45.152 UTC [cauthdsl] func2 -> DEBU 16c1 0xc000fa7890 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.153 UTC [cauthdsl] func1 -> DEBU 16c2 0xc000fa7890 gate 1563590445144040900 evaluation succeeds" +"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c3 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.154 UTC [policies] Evaluate -> DEBU 16c5 Signature set satisfies policy /Channel/Application/Admins" +"2019-07-20 02:40:45.155 UTC [policies] Evaluate -> DEBU 16c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-07-20 02:40:45.155 UTC [common.configtx] verifyDeltaSet -> DEBU 16c7 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c8 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16c9 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16ca Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.156 UTC [common.configtx] verifyDeltaSet -> DEBU 16cb Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.157 UTC [common.configtx] recurseConfigMap -> DEBU 16cd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16ce Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16cf Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.158 UTC [common.configtx] recurseConfigMap -> DEBU 16d3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.159 UTC [common.configtx] recurseConfigMap -> DEBU 16d8 Setting policy for key Admins to " +"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16d9 Setting policy for key Endorsement to " +"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16da Setting policy for key LifecycleEndorsement to " +"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16db Setting policy for key Readers to " +"2019-07-20 02:40:45.160 UTC [common.configtx] recurseConfigMap -> DEBU 16dc Setting policy for key Writers to " +"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16dd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16de Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16df Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.161 UTC [common.configtx] recurseConfigMap -> DEBU 16e1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.162 UTC [common.configtx] recurseConfigMap -> DEBU 16e3 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.163 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.164 UTC [common.channelconfig] NewStandardValues -> DEBU 16e7 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:40:45.164 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e8 Processing field: HashingAlgorithm" +"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e9 Processing field: BlockDataHashingStructure" +"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ea Processing field: OrdererAddresses" +"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16eb Processing field: Consortium" +"2019-07-20 02:40:45.165 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ec Processing field: Capabilities" +"2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16ed Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ee Processing field: ACLs" +"2019-07-20 02:40:45.166 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16ef Processing field: Capabilities" +"2019-07-20 02:40:45.166 UTC [common.channelconfig] NewStandardValues -> DEBU 16f0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f1 Processing field: AnchorPeers" +"2019-07-20 02:40:45.167 UTC [common.channelconfig] NewStandardValues -> DEBU 16f2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.167 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f3 Processing field: MSP" +"2019-07-20 02:40:45.167 UTC [common.channelconfig] Validate -> DEBU 16f4 Anchor peers for org Org3MSP are " +"2019-07-20 02:40:45.167 UTC [common.channelconfig] validateMSP -> DEBU 16f5 Setting up MSP for org Org3MSP" +"2019-07-20 02:40:45.167 UTC [msp] newBccspMsp -> DEBU 16f6 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.168 UTC [msp] New -> DEBU 16f7 Creating Cache-MSP instance" +"2019-07-20 02:40:45.168 UTC [msp] Setup -> DEBU 16f8 Setting up MSP instance Org3MSP" +"2019-07-20 02:40:45.168 UTC [msp.identity] newIdentity -> DEBU 16f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.169 UTC [msp.identity] newIdentity -> DEBU 16fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.169 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16fb Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-07-20 02:40:45.170 UTC [msp] Validate -> DEBU 16fc MSP Org3MSP validating identity" +"2019-07-20 02:40:45.170 UTC [msp] getCertificationChain -> DEBU 16fd MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16ba Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.171 UTC [msp] hasOURole -> DEBU 16fe MSP Org3MSP checking if the identity is a client" +"2019-07-20 02:40:45.171 UTC [msp] getCertificationChain -> DEBU 16ff MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.171 UTC [common.channelconfig] NewStandardValues -> DEBU 1700 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.171 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: AnchorPeers" +"2019-07-20 02:40:45.172 UTC [common.channelconfig] NewStandardValues -> DEBU 1702 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.172 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: MSP" +"2019-07-20 02:40:45.172 UTC [common.channelconfig] Validate -> DEBU 1704 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:40:45.172 UTC [common.channelconfig] validateMSP -> DEBU 1705 Setting up MSP for org Org1MSP" +"2019-07-20 02:40:45.172 UTC [msp] newBccspMsp -> DEBU 1706 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.173 UTC [msp] New -> DEBU 1707 Creating Cache-MSP instance" +"2019-07-20 02:40:45.173 UTC [msp] Setup -> DEBU 1708 Setting up MSP instance Org1MSP" +"2019-07-20 02:40:45.173 UTC [msp.identity] newIdentity -> DEBU 1709 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.174 UTC [msp.identity] newIdentity -> DEBU 170a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.174 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 170b Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:40:45.175 UTC [msp] Validate -> DEBU 170c MSP Org1MSP validating identity" +"2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170d MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.175 UTC [msp] hasOURole -> DEBU 170e MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:40:45.175 UTC [msp] getCertificationChain -> DEBU 170f MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1710 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1711 Processing field: AnchorPeers" +"2019-07-20 02:40:45.176 UTC [common.channelconfig] NewStandardValues -> DEBU 1712 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.176 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1713 Processing field: MSP" +"2019-07-20 02:40:45.176 UTC [common.channelconfig] Validate -> DEBU 1714 Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:40:45.177 UTC [common.channelconfig] validateMSP -> DEBU 1715 Setting up MSP for org Org2MSP" +"2019-07-20 02:40:45.177 UTC [msp] newBccspMsp -> DEBU 1716 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.177 UTC [msp] New -> DEBU 1717 Creating Cache-MSP instance" +"2019-07-20 02:40:45.177 UTC [msp] Setup -> DEBU 1718 Setting up MSP instance Org2MSP" +"2019-07-20 02:40:45.177 UTC [msp.identity] newIdentity -> DEBU 1719 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.178 UTC [msp.identity] newIdentity -> DEBU 171a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.178 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 171b Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:40:45.179 UTC [msp] Validate -> DEBU 171c MSP Org2MSP validating identity" +"2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171d MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.179 UTC [msp] hasOURole -> DEBU 171e MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:40:45.179 UTC [msp] getCertificationChain -> DEBU 171f MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] NewStandardValues -> DEBU 1720 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1721 Processing field: ConsensusType" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1722 Processing field: BatchSize" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1723 Processing field: BatchTimeout" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1724 Processing field: KafkaBrokers" +"2019-07-20 02:40:45.180 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1725 Processing field: ChannelRestrictions" +"2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1726 Processing field: Capabilities" +"2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1727 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:40:45.181 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1728 Processing field: Endpoints" +"2019-07-20 02:40:45.181 UTC [common.channelconfig] NewStandardValues -> DEBU 1729 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.182 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172a Processing field: MSP" +"2019-07-20 02:40:45.182 UTC [common.channelconfig] validateMSP -> DEBU 172b Setting up MSP for org OrdererOrg" +"2019-07-20 02:40:45.182 UTC [msp] newBccspMsp -> DEBU 172c Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.183 UTC [msp] New -> DEBU 172d Creating Cache-MSP instance" +"2019-07-20 02:40:45.183 UTC [msp] Setup -> DEBU 172e Setting up MSP instance OrdererMSP" +"2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 172f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.184 UTC [msp.identity] newIdentity -> DEBU 1730 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.185 UTC [msp] Validate -> DEBU 1731 MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1732 Setting up the MSP manager (4 msps)" +"2019-07-20 02:40:45.185 UTC [msp] Setup -> DEBU 1733 MSP manager setup complete, setup 4 msps" +"2019-07-20 02:40:45.185 UTC [policies] NewManagerImpl -> DEBU 1734 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1735 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1736 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1737 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1738 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 1739 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173a Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173b Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.186 UTC [policies] NewManagerImpl -> DEBU 173c Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173d Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173e Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.187 UTC [policies] NewManagerImpl -> DEBU 173f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1740 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:40:45.188 UTC [policies] NewManagerImpl -> DEBU 1741 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1744 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1745 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:40:45.202 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1747 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:40:45.202 UTC [policies] NewManagerImpl -> DEBU 1748 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.203 UTC [policies] NewManagerImpl -> DEBU 1749 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.204 UTC [policies] NewManagerImpl -> DEBU 174a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1742 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1743 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-07-20 02:40:45.206 UTC [policies] NewManagerImpl -> DEBU 174b Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:40:45.207 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 174c Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-07-20 02:40:45.207 UTC [orderer.common.cluster.step] sendMessage -> DEBU 174d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174e Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:40:45.208 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Writers for Channel" +"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Admins for Channel" +"2019-07-20 02:40:45.209 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Readers for Channel" +"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1754 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1755 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.210 UTC [common.configtx] addToMap -> DEBU 1756 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1757 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.211 UTC [common.configtx] addToMap -> DEBU 1758 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1759 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.213 UTC [common.configtx] addToMap -> DEBU 175a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175b Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.215 UTC [common.configtx] addToMap -> DEBU 175c Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 175d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.216 UTC [common.configtx] addToMap -> DEBU 175e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 175f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1760 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1761 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 1762 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1763 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 1764 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 1765 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.223 UTC [common.configtx] addToMap -> DEBU 1766 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 1767 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1768 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 1769 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.228 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.229 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.230 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.231 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:40:45.232 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:45.233 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:40:45.234 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.236 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:40:45.237 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:40:45.238 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:40:45.239 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:40:45.240 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:40:45.241 UTC [common.channelconfig] LogSanityChecks -> DEBU 178a As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:40:45.242 UTC [common.channelconfig] LogSanityChecks -> DEBU 178b As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178c Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.242 UTC [policies] Manager -> DEBU 178d Manager Channel has managers Application" +"2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178e Manager Channel has managers Orderer" +"2019-07-20 02:40:45.243 UTC [policies] Manager -> DEBU 178f Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1790 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1791 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.244 UTC [policies] Manager -> DEBU 1792 Manager Channel/Application has managers Org3MSP" +"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1793 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1794 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:40:45.245 UTC [common.channelconfig] LogSanityChecks -> DEBU 1795 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:40:45.246 UTC [policies] Manager -> DEBU 1796 Manager Channel looking up path [Orderer]" +"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1797 Manager Channel has managers Application" +"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1798 Manager Channel has managers Orderer" +"2019-07-20 02:40:45.247 UTC [policies] Manager -> DEBU 1799 Manager Channel/Orderer looking up path []" +"2019-07-20 02:40:45.248 UTC [policies] Manager -> DEBU 179a Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179c As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:40:45.248 UTC [common.channelconfig] LogSanityChecks -> DEBU 179d As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:40:45.249 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 179f Orderer capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.250 UTC [common.capabilities] Supported -> DEBU 17a0 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.250 UTC [orderer.common.server] func1 -> DEBU 17a1 Executing callback to update root CAs" +"2019-07-20 02:40:45.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17a2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.250 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a3 updating root CAs for channel [businesschannel]" +"2019-07-20 02:40:45.251 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a4 adding app root CAs for MSP [Org3MSP]" +"2019-07-20 02:40:45.252 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a5 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a6 adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:40:45.253 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17a7 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:40:45.268 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a8 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2019-07-20 02:40:45.270 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17a9 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2019-07-20 02:40:45.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 17aa Obtaining default signing identity" +"2019-07-20 02:40:45.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 17ab Obtaining default signing identity" +"2019-07-20 02:40:45.274 UTC [msp.identity] Sign -> DEBU 17ac Sign: plaintext: 0A020806120B0A090A03010203100418...CAE88F56D183B4805A1EC235F949D7F9 " +"2019-07-20 02:40:45.275 UTC [msp.identity] Sign -> DEBU 17ad Sign: digest: CC6AD12B7A215B899C1845FD388D2A71DF2059FE693C450EC89BAE5083B4D965 " +"2019-07-20 02:40:45.278 UTC [fsblkstorage] indexBlock -> DEBU 17ae Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= +txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +]" +"2019-07-20 02:40:45.280 UTC [fsblkstorage] updateCheckpoint -> DEBU 17af Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118787], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-07-20 02:40:45.280 UTC [fsblkstorage] waitForBlock -> DEBU 17b0 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b1 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:45.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b2 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:45.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17b3 blockbytes [34880] read from file [0]" +"2019-07-20 02:40:45.284 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:45.285 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.286 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.287 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +"2019-07-20 02:40:45.288 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.290 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000a9b000 gate 1563590445290446800 evaluation starts" +"2019-07-20 02:40:45.291 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000a9b000 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000a9b000 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.292 UTC [cauthdsl] func2 -> DEBU 17be 0xc000a9b000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.293 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000a9b000 principal evaluation fails" +"2019-07-20 02:40:45.293 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000a9b000 gate 1563590445290446800 evaluation fails" +"2019-07-20 02:40:45.293 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.294 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.295 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.295 UTC [cauthdsl] func1 -> DEBU 17c4 0xc00004e4e0 gate 1563590445295605800 evaluation starts" +"2019-07-20 02:40:45.295 UTC [cauthdsl] func2 -> DEBU 17c5 0xc00004e4e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.297 UTC [cauthdsl] func2 -> DEBU 17c6 0xc00004e4e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c7 0xc00004e4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.298 UTC [cauthdsl] func2 -> DEBU 17c8 0xc00004e4e0 principal evaluation fails" +"2019-07-20 02:40:45.302 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00004e4e0 gate 1563590445295605800 evaluation fails" +"2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.302 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.303 UTC [policies] Evaluate -> DEBU 17cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.303 UTC [cauthdsl] func1 -> DEBU 17cd 0xc00004f270 gate 1563590445303305800 evaluation starts" +"2019-07-20 02:40:45.303 UTC [cauthdsl] func2 -> DEBU 17ce 0xc00004f270 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.304 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00004f270 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:45.304 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d0 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:40:45.304 UTC [msp] Validate -> DEBU 17d1 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.307 UTC [msp] getCertificationChain -> DEBU 17d2 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.309 UTC [cauthdsl] func2 -> DEBU 17d3 0xc00004f270 principal matched by identity 0" +"2019-07-20 02:40:45.309 UTC [msp.identity] Verify -> DEBU 17d4 Verify: digest = 00000000 3d ed 09 6a 90 8b ae 36 c4 46 b1 80 9b 79 50 eb |=..j...6.F...yP.| +00000010 e1 9a a4 fa c9 37 7f 0d 0d 0b 13 11 fd b6 13 06 |.....7..........|" +"2019-07-20 02:40:45.310 UTC [msp.identity] Verify -> DEBU 17d5 Verify: sig = 00000000 30 45 02 21 00 e9 9b b3 fc 5d ce e7 4b 96 63 aa |0E.!.....]..K.c.| +00000010 14 41 1c 1f 69 50 d4 3a 17 7d 9d 0b cf 58 3f 47 |.A..iP.:.}...X?G| +00000020 26 70 94 2d 91 02 20 5d 41 9d 07 80 46 e0 d0 bc |&p.-.. ]A...F...| +00000030 ca 9d b6 fb 58 27 c3 34 1e dc 66 dd 7a ce 6c 67 |....X'.4..f.z.lg| +00000040 f0 df 1f af fc f3 dc |.......|" +"2019-07-20 02:40:45.310 UTC [cauthdsl] func2 -> DEBU 17d6 0xc00004f270 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.311 UTC [cauthdsl] func1 -> DEBU 17d7 0xc00004f270 gate 1563590445303305800 evaluation succeeds" +"2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.311 UTC [policies] Evaluate -> DEBU 17d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17da Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.312 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:45.313 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:45.313 UTC [common.deliver] deliverBlocks -> DEBU 17de [channel: businesschannel] Delivering block for (0xc000d15040) for 172.18.0.8:50246" +"2019-07-20 02:40:45.314 UTC [fsblkstorage] waitForBlock -> DEBU 17df Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:45.280 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17e0 [channel: businesschannel] Wrote block [6]" +"2019-07-20 02:40:45.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:45.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e2 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2019-07-20 02:40:45.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.8µs " +"2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" +"2019-07-20 02:40:45.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e5 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.2µs " +"2019-07-20 02:40:45.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 553.7µs " +"2019-07-20 02:40:45.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17e9 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:45.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:45.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-07-20 02:40:45.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " +"2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ed Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +"2019-07-20 02:40:46.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ee Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +"2019-07-20 02:40:46.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +"2019-07-20 02:40:46.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f1 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:46.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:46.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17f3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:46.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f4 Sending msg of 28 bytes to 3 on channel testchainid took 22.4µs" +"2019-07-20 02:40:46.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +"2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2019-07-20 02:40:46.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17f7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-07-20 02:40:46.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 196.6µs " +"2019-07-20 02:40:46.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 467µs " +"2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:46.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:46.938 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:46.940 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17fd Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +"2019-07-20 02:40:46.941 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545µs " +"2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ff Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +"2019-07-20 02:40:47.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1800 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1801 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +"2019-07-20 02:40:47.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1802 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 858.2µs " +"2019-07-20 02:40:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1803 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:47.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:47.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:47.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1806 Sending msg of 28 bytes to 3 on channel testchainid took 23.3µs" +"2019-07-20 02:40:47.439 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1807 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " +"2019-07-20 02:40:47.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1808 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-07-20 02:40:47.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +"2019-07-20 02:40:47.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.8µs " +"2019-07-20 02:40:47.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1809 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 175.4µs " +"2019-07-20 02:40:47.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:47.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:47.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 180e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:47.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2019-07-20 02:40:47.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1810 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 856.1µs " +"2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1811 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-07-20 02:40:48.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1813 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1814 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " +"2019-07-20 02:40:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1812 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " +"2019-07-20 02:40:48.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1815 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:48.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1816 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:48.248 UTC [orderer.common.server] Deliver -> DEBU 1817 Starting new Deliver handler" +"2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1818 Starting new deliver loop for 172.18.0.9:39274" +"2019-07-20 02:40:48.248 UTC [common.deliver] Handle -> DEBU 1819 Attempting to read seek info message from 172.18.0.9:39274" +"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.249 UTC [policies] Evaluate -> DEBU 181c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.250 UTC [policies] Evaluate -> DEBU 181e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.250 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +"2019-07-20 02:40:48.251 UTC [msp.identity] newIdentity -> DEBU 1820 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:48.251 UTC [cauthdsl] func1 -> DEBU 1821 0xc000416840 gate 1563590448251684300 evaluation starts" +"2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1822 0xc000416840 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.251 UTC [cauthdsl] func2 -> DEBU 1823 0xc000416840 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1824 0xc000416840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:48.252 UTC [cauthdsl] func2 -> DEBU 1825 0xc000416840 principal evaluation fails" +"2019-07-20 02:40:48.252 UTC [cauthdsl] func1 -> DEBU 1826 0xc000416840 gate 1563590448251684300 evaluation fails" +"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1827 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.253 UTC [policies] Evaluate -> DEBU 1829 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.253 UTC [cauthdsl] func1 -> DEBU 182a 0xc000417b20 gate 1563590448253612300 evaluation starts" +"2019-07-20 02:40:48.253 UTC [cauthdsl] func2 -> DEBU 182b 0xc000417b20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182c 0xc000417b20 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182d 0xc000417b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:48.254 UTC [cauthdsl] func2 -> DEBU 182e 0xc000417b20 principal evaluation fails" +"2019-07-20 02:40:48.254 UTC [cauthdsl] func1 -> DEBU 182f 0xc000417b20 gate 1563590448253612300 evaluation fails" +"2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1830 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.254 UTC [policies] Evaluate -> DEBU 1831 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.255 UTC [policies] Evaluate -> DEBU 1832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.255 UTC [cauthdsl] func1 -> DEBU 1833 0xc00029c6f0 gate 1563590448255311400 evaluation starts" +"2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1834 0xc00029c6f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.255 UTC [cauthdsl] func2 -> DEBU 1835 0xc00029c6f0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1836 0xc00029c6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:48.256 UTC [cauthdsl] func2 -> DEBU 1837 0xc00029c6f0 principal evaluation fails" +"2019-07-20 02:40:48.256 UTC [cauthdsl] func1 -> DEBU 1838 0xc00029c6f0 gate 1563590448255311400 evaluation fails" +"2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 1839 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.256 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.257 UTC [policies] func1 -> DEBU 183b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:48.257 UTC [policies] Evaluate -> DEBU 183f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.258 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:48.258 UTC [cauthdsl] func1 -> DEBU 1841 0xc0001a9070 gate 1563590448258389800 evaluation starts" +"2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1842 0xc0001a9070 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.258 UTC [cauthdsl] func2 -> DEBU 1843 0xc0001a9070 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.259 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:40:48.259 UTC [msp] Validate -> DEBU 1845 MSP OrdererMSP validating identity" +"2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1846 0xc0001a9070 principal matched by identity 0" +"2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1847 Verify: digest = 00000000 43 79 dd b3 45 49 f9 30 dc 8b 58 86 ec 01 dc 4f |Cy..EI.0..X....O| +00000010 44 eb a3 5f 9c b0 b3 42 ed f8 1f f5 39 9f b5 1f |D.._...B....9...|" +"2019-07-20 02:40:48.261 UTC [msp.identity] Verify -> DEBU 1848 Verify: sig = 00000000 30 44 02 20 21 f8 78 31 b1 e9 b0 b5 ac 3c 4d e0 |0D. !.x1.......av.W({*| +00000030 38 15 f3 3d 0f 71 29 b6 3f 37 8e b2 6c 2f 14 5e |8..=.q).?7..l/.^| +00000040 13 a1 5c a3 0c cb |..\...|" +"2019-07-20 02:40:48.261 UTC [cauthdsl] func2 -> DEBU 1849 0xc0001a9070 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.261 UTC [cauthdsl] func1 -> DEBU 184a 0xc0001a9070 gate 1563590448258389800 evaluation succeeds" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:48.262 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:48.263 UTC [common.deliver] deliverBlocks -> DEBU 1851 [channel: businesschannel] Received seekInfo (0xc000c51b00) start: > stop: > from 172.18.0.9:39274" +"2019-07-20 02:40:48.263 UTC [fsblkstorage] Next -> DEBU 1852 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:48.263 UTC [fsblkstorage] newBlockfileStream -> DEBU 1853 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1854 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1855 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:48.263 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1856 blockbytes [34880] read from file [0]" +"2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1857 [channel: businesschannel] Delivering block for (0xc000c51b00) for 172.18.0.9:39274" +"2019-07-20 02:40:48.264 UTC [common.deliver] deliverBlocks -> DEBU 1858 [channel: businesschannel] Done delivering to 172.18.0.9:39274 for (0xc000c51b00)" +"2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 1859 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:48.265 UTC [fsblkstorage] waitForBlock -> DEBU 185a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185b Waiting for new SeekInfo from 172.18.0.9:39274" +"2019-07-20 02:40:48.265 UTC [common.deliver] Handle -> DEBU 185c Attempting to read seek info message from 172.18.0.9:39274" +"2019-07-20 02:40:48.268 UTC [common.deliver] Handle -> WARN 185d Error reading from 172.18.0.9:39274: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:48.268 UTC [orderer.common.server] func1 -> DEBU 185e Closing Deliver stream" +"2019-07-20 02:40:48.270 UTC [comm.grpc.server] 1 -> INFO 185f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39274 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1953ms +"2019-07-20 02:40:48.271 UTC [grpc] infof -> DEBU 1860 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:48.393 UTC [orderer.common.server] Deliver -> DEBU 1861 Starting new Deliver handler" +"2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1862 Starting new deliver loop for 172.18.0.9:39276" +"2019-07-20 02:40:48.394 UTC [common.deliver] Handle -> DEBU 1863 Attempting to read seek info message from 172.18.0.9:39276" +"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1864 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1865 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.394 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.395 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.395 UTC [cauthdsl] func1 -> DEBU 1869 0xc000c8c590 gate 1563590448395449600 evaluation starts" +"2019-07-20 02:40:48.395 UTC [cauthdsl] func2 -> DEBU 186a 0xc000c8c590 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186b 0xc000c8c590 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186c 0xc000c8c590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:48.396 UTC [cauthdsl] func2 -> DEBU 186d 0xc000c8c590 principal evaluation fails" +"2019-07-20 02:40:48.396 UTC [cauthdsl] func1 -> DEBU 186e 0xc000c8c590 gate 1563590448395449600 evaluation fails" +"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.397 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.397 UTC [cauthdsl] func1 -> DEBU 1872 0xc000c8d110 gate 1563590448397574000 evaluation starts" +"2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1873 0xc000c8d110 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.397 UTC [cauthdsl] func2 -> DEBU 1874 0xc000c8d110 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1875 0xc000c8d110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:48.398 UTC [cauthdsl] func2 -> DEBU 1876 0xc000c8d110 principal evaluation fails" +"2019-07-20 02:40:48.398 UTC [cauthdsl] func1 -> DEBU 1877 0xc000c8d110 gate 1563590448397574000 evaluation fails" +"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1878 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 1879 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.398 UTC [policies] Evaluate -> DEBU 187a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.399 UTC [cauthdsl] func1 -> DEBU 187b 0xc000c8dac0 gate 1563590448399099800 evaluation starts" +"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187c 0xc000c8dac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187d 0xc000c8dac0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.399 UTC [cauthdsl] func2 -> DEBU 187e 0xc000c8dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:48.400 UTC [cauthdsl] func2 -> DEBU 187f 0xc000c8dac0 principal evaluation fails" +"2019-07-20 02:40:48.400 UTC [cauthdsl] func1 -> DEBU 1880 0xc000c8dac0 gate 1563590448399099800 evaluation fails" +"2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1881 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.400 UTC [policies] Evaluate -> DEBU 1882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.401 UTC [policies] func1 -> DEBU 1883 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1884 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1885 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1886 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:48.401 UTC [policies] Evaluate -> DEBU 1887 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.402 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:48.402 UTC [cauthdsl] func1 -> DEBU 1889 0xc000d6c930 gate 1563590448402309200 evaluation starts" +"2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188a 0xc000d6c930 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.402 UTC [cauthdsl] func2 -> DEBU 188b 0xc000d6c930 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188c 0xc000d6c930 principal matched by identity 0" +"2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188d Verify: digest = 00000000 76 00 11 52 56 a5 63 2f 81 dc 4f 56 12 a4 66 47 |v..RV.c/..OV..fG| +00000010 ea 7d 1c 1e 7e 14 7d bb 26 da f2 a4 0f d2 72 3a |.}..~.}.&.....r:|" +"2019-07-20 02:40:48.403 UTC [msp.identity] Verify -> DEBU 188e Verify: sig = 00000000 30 45 02 21 00 a6 94 90 ea 98 b6 48 bf f6 1b fb |0E.!.......H....| +00000010 62 f8 a3 5a ab 34 49 e6 89 d9 46 71 aa 9f f6 65 |b..Z.4I...Fq...e| +00000020 0e d1 22 4f 6c 02 20 70 f3 4b df 89 d1 e9 f1 da |.."Ol. p.K......| +00000030 14 5e ee 89 f9 0b ec 0e 8b 97 d6 ff 34 f2 20 a1 |.^..........4. .| +00000040 af 1d 9c 89 33 ec 95 |....3..|" +"2019-07-20 02:40:48.403 UTC [cauthdsl] func2 -> DEBU 188f 0xc000d6c930 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.404 UTC [cauthdsl] func1 -> DEBU 1890 0xc000d6c930 gate 1563590448402309200 evaluation succeeds" +"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1891 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1892 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1893 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1894 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.404 UTC [policies] Evaluate -> DEBU 1895 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:48.405 UTC [policies] Evaluate -> DEBU 1896 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:48.405 UTC [common.deliver] deliverBlocks -> DEBU 1897 [channel: businesschannel] Received seekInfo (0xc000088d40) start: > stop: > from 172.18.0.9:39276" +"2019-07-20 02:40:48.405 UTC [fsblkstorage] Next -> DEBU 1898 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:48.406 UTC [fsblkstorage] newBlockfileStream -> DEBU 1899 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189a Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:48.406 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189b Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:48.407 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 189c blockbytes [34880] read from file [0]" +"2019-07-20 02:40:48.407 UTC [common.deliver] deliverBlocks -> DEBU 189d [channel: businesschannel] Delivering block for (0xc000088d40) for 172.18.0.9:39276" +"2019-07-20 02:40:48.408 UTC [common.deliver] deliverBlocks -> DEBU 189e [channel: businesschannel] Done delivering to 172.18.0.9:39276 for (0xc000088d40)" +"2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 189f Waiting for new SeekInfo from 172.18.0.9:39276" +"2019-07-20 02:40:48.409 UTC [common.deliver] Handle -> DEBU 18a1 Attempting to read seek info message from 172.18.0.9:39276" +"2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a0 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:48.409 UTC [fsblkstorage] waitForBlock -> DEBU 18a2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:48.412 UTC [common.deliver] Handle -> WARN 18a3 Error reading from 172.18.0.9:39276: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:48.412 UTC [orderer.common.server] func1 -> DEBU 18a4 Closing Deliver stream" +"2019-07-20 02:40:48.412 UTC [comm.grpc.server] 1 -> INFO 18a5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39276 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1313ms +"2019-07-20 02:40:48.413 UTC [grpc] infof -> DEBU 18a6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:48.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18a7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:48.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18a8 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-07-20 02:40:48.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +"2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18aa Sending msg of 28 bytes to 2 on channel businesschannel took 49.1µs" +"2019-07-20 02:40:48.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18ab Sending msg of 28 bytes to 3 on channel businesschannel took 120.6µs" +"2019-07-20 02:40:48.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.8µs " +"2019-07-20 02:40:48.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18ad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:48.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.9238ms " +"2019-07-20 02:40:48.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18af Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:48.849 UTC [orderer.common.server] Deliver -> DEBU 18b0 Starting new Deliver handler" +"2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b1 Starting new deliver loop for 172.18.0.9:39278" +"2019-07-20 02:40:48.850 UTC [common.deliver] Handle -> DEBU 18b2 Attempting to read seek info message from 172.18.0.9:39278" +"2019-07-20 02:40:48.851 UTC [policies] Evaluate -> DEBU 18b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:48.853 UTC [policies] Evaluate -> DEBU 18b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.854 UTC [policies] Evaluate -> DEBU 18b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.854 UTC [cauthdsl] func1 -> DEBU 18b8 0xc000ff7c50 gate 1563590448854776700 evaluation starts" +"2019-07-20 02:40:48.855 UTC [cauthdsl] func2 -> DEBU 18b9 0xc000ff7c50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18ba 0xc000ff7c50 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bb 0xc000ff7c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:48.856 UTC [cauthdsl] func2 -> DEBU 18bc 0xc000ff7c50 principal evaluation fails" +"2019-07-20 02:40:48.857 UTC [cauthdsl] func1 -> DEBU 18bd 0xc000ff7c50 gate 1563590448854776700 evaluation fails" +"2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.857 UTC [policies] Evaluate -> DEBU 18bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.858 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.859 UTC [cauthdsl] func1 -> DEBU 18c1 0xc000bade70 gate 1563590448859499700 evaluation starts" +"2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c2 0xc000bade70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.860 UTC [cauthdsl] func2 -> DEBU 18c3 0xc000bade70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000bade70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:48.861 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000bade70 principal evaluation fails" +"2019-07-20 02:40:48.862 UTC [cauthdsl] func1 -> DEBU 18c6 0xc000bade70 gate 1563590448859499700 evaluation fails" +"2019-07-20 02:40:48.862 UTC [policies] Evaluate -> DEBU 18c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.863 UTC [policies] Evaluate -> DEBU 18c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.865 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000d5a6b0 gate 1563590448865720200 evaluation starts" +"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cb 0xc000d5a6b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cc 0xc000d5a6b0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18cd 0xc000d5a6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:48.866 UTC [cauthdsl] func2 -> DEBU 18ce 0xc000d5a6b0 principal evaluation fails" +"2019-07-20 02:40:48.866 UTC [cauthdsl] func1 -> DEBU 18cf 0xc000d5a6b0 gate 1563590448865720200 evaluation fails" +"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.867 UTC [policies] func1 -> DEBU 18d2 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d3 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.867 UTC [policies] Evaluate -> DEBU 18d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.868 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:48.868 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d5b3a0 gate 1563590448868389000 evaluation starts" +"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d5b3a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d5b3a0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:48.868 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d5b3a0 principal matched by identity 0" +"2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dc Verify: digest = 00000000 31 82 70 e0 18 f6 42 43 a0 36 d9 5f 32 fe a1 e1 |1.p...BC.6._2...| +00000010 8f 05 2b 76 1f 99 e9 8d bb 4f 82 89 3c 22 84 38 |..+v.....O..<".8|" +"2019-07-20 02:40:48.869 UTC [msp.identity] Verify -> DEBU 18dd Verify: sig = 00000000 30 44 02 20 5a de 23 c3 fd 33 e3 f3 88 a6 22 89 |0D. Z.#..3....".| +00000010 4c 2d 66 90 83 7c 65 39 6e 2f 1c 5c 2d 7e 10 33 |L-f..|e9n/.\-~.3| +00000020 03 44 ec 08 02 20 4b 25 df 2d 2f e6 ab 69 fa 40 |.D... K%.-/..i.@| +00000030 39 3a 24 68 c5 fc a1 c3 de e8 96 24 ae 93 5d 1b |9:$h.......$..].| +00000040 17 ba b3 71 53 8a |...qS.|" +"2019-07-20 02:40:48.870 UTC [cauthdsl] func2 -> DEBU 18de 0xc000d5b3a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.870 UTC [cauthdsl] func1 -> DEBU 18df 0xc000d5b3a0 gate 1563590448868389000 evaluation succeeds" +"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:48.870 UTC [policies] Evaluate -> DEBU 18e2 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e4 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:48.871 UTC [policies] Evaluate -> DEBU 18e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:48.871 UTC [common.deliver] deliverBlocks -> DEBU 18e6 [channel: businesschannel] Received seekInfo (0xc000089740) start: > stop: > from 172.18.0.9:39278" +"2019-07-20 02:40:48.871 UTC [fsblkstorage] Next -> DEBU 18e7 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:48.871 UTC [fsblkstorage] newBlockfileStream -> DEBU 18e8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18e9 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ea Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:48.872 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18eb blockbytes [34880] read from file [0]" +"2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ec [channel: businesschannel] Delivering block for (0xc000089740) for 172.18.0.9:39278" +"2019-07-20 02:40:48.873 UTC [common.deliver] deliverBlocks -> DEBU 18ed [channel: businesschannel] Done delivering to 172.18.0.9:39278 for (0xc000089740)" +"2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ee Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:48.874 UTC [fsblkstorage] waitForBlock -> DEBU 18ef Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:48.874 UTC [common.deliver] Handle -> DEBU 18f0 Waiting for new SeekInfo from 172.18.0.9:39278" +"2019-07-20 02:40:48.875 UTC [common.deliver] Handle -> DEBU 18f1 Attempting to read seek info message from 172.18.0.9:39278" +"2019-07-20 02:40:48.880 UTC [grpc] infof -> DEBU 18f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:48.880 UTC [common.deliver] Handle -> WARN 18f2 Error reading from 172.18.0.9:39278: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:48.880 UTC [orderer.common.server] func1 -> DEBU 18f4 Closing Deliver stream" +"2019-07-20 02:40:48.881 UTC [comm.grpc.server] 1 -> INFO 18f5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39278 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.5449ms +"2019-07-20 02:40:48.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18f6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:48.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18f7 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-07-20 02:40:48.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.6µs " +"2019-07-20 02:40:49.046 UTC [orderer.common.server] Deliver -> DEBU 18f9 Starting new Deliver handler" +"2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fa Starting new deliver loop for 172.18.0.9:39280" +"2019-07-20 02:40:49.046 UTC [common.deliver] Handle -> DEBU 18fb Attempting to read seek info message from 172.18.0.9:39280" +"2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.047 UTC [policies] Evaluate -> DEBU 18fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 18ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.048 UTC [policies] Evaluate -> DEBU 1900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.049 UTC [cauthdsl] func1 -> DEBU 1901 0xc001099070 gate 1563590449049272500 evaluation starts" +"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1902 0xc001099070 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1903 0xc001099070 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.049 UTC [cauthdsl] func2 -> DEBU 1904 0xc001099070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.050 UTC [cauthdsl] func2 -> DEBU 1905 0xc001099070 principal evaluation fails" +"2019-07-20 02:40:49.050 UTC [cauthdsl] func1 -> DEBU 1906 0xc001099070 gate 1563590449049272500 evaluation fails" +"2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1907 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.050 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.051 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.051 UTC [cauthdsl] func1 -> DEBU 190a 0xc0010998b0 gate 1563590449051280300 evaluation starts" +"2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190b 0xc0010998b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.051 UTC [cauthdsl] func2 -> DEBU 190c 0xc0010998b0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190d 0xc0010998b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.052 UTC [cauthdsl] func2 -> DEBU 190e 0xc0010998b0 principal evaluation fails" +"2019-07-20 02:40:49.052 UTC [cauthdsl] func1 -> DEBU 190f 0xc0010998b0 gate 1563590449051280300 evaluation fails" +"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1910 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.053 UTC [policies] Evaluate -> DEBU 1912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.053 UTC [cauthdsl] func1 -> DEBU 1913 0xc0011aa0f0 gate 1563590449053843400 evaluation starts" +"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1914 0xc0011aa0f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1915 0xc0011aa0f0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1916 0xc0011aa0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.054 UTC [cauthdsl] func2 -> DEBU 1917 0xc0011aa0f0 principal evaluation fails" +"2019-07-20 02:40:49.054 UTC [cauthdsl] func1 -> DEBU 1918 0xc0011aa0f0 gate 1563590449053843400 evaluation fails" +"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 1919 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.055 UTC [policies] func1 -> DEBU 191b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-07-20 02:40:49.055 UTC [policies] Evaluate -> DEBU 191c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 191f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.056 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.056 UTC [cauthdsl] func1 -> DEBU 1921 0xc0011aade0 gate 1563590449056710900 evaluation starts" +"2019-07-20 02:40:49.056 UTC [cauthdsl] func2 -> DEBU 1922 0xc0011aade0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1923 0xc0011aade0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.057 UTC [cauthdsl] func2 -> DEBU 1924 0xc0011aade0 principal matched by identity 0" +"2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1925 Verify: digest = 00000000 34 6b 9e 1b 7c a1 91 de 2d 1d 2e 67 e6 3a 92 40 |4k..|...-..g.:.@| +00000010 1e 77 64 63 ea 52 9c 49 ca b2 0f 72 3d dd 69 26 |.wdc.R.I...r=.i&|" +"2019-07-20 02:40:49.057 UTC [msp.identity] Verify -> DEBU 1926 Verify: sig = 00000000 30 44 02 20 71 79 30 fe a8 5b c8 de 4f 05 26 ea |0D. qy0..[..O.&.| +00000010 d9 78 59 85 f4 7f 27 73 97 ce 18 75 52 a0 36 4e |.xY...'s...uR.6N| +00000020 2b 4b e7 d7 02 20 09 24 f6 8c 1c 63 9e b4 d3 58 |+K... .$...c...X| +00000030 f2 f5 92 09 91 ac 7b 02 5e c8 6c 0b 8b 26 bf e0 |......{.^.l..&..| +00000040 6b 1f 55 fd 57 95 |k.U.W.|" +"2019-07-20 02:40:49.058 UTC [cauthdsl] func2 -> DEBU 1927 0xc0011aade0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.059 UTC [cauthdsl] func1 -> DEBU 1928 0xc0011aade0 gate 1563590449056710900 evaluation succeeds" +"2019-07-20 02:40:49.059 UTC [policies] Evaluate -> DEBU 1929 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.060 UTC [policies] Evaluate -> DEBU 192c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192d Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.061 UTC [policies] Evaluate -> DEBU 192e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.062 UTC [common.deliver] deliverBlocks -> DEBU 192f [channel: businesschannel] Received seekInfo (0xc000089d40) start: > stop: > from 172.18.0.9:39280" +"2019-07-20 02:40:49.062 UTC [fsblkstorage] Next -> DEBU 1930 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.062 UTC [fsblkstorage] newBlockfileStream -> DEBU 1931 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1932 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:49.063 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1933 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:49.064 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1934 blockbytes [34880] read from file [0]" +"2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1935 [channel: businesschannel] Delivering block for (0xc000089d40) for 172.18.0.9:39280" +"2019-07-20 02:40:49.064 UTC [common.deliver] deliverBlocks -> DEBU 1936 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089d40)" +"2019-07-20 02:40:49.065 UTC [fsblkstorage] waitForBlock -> DEBU 1937 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.066 UTC [fsblkstorage] waitForBlock -> DEBU 1938 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 1939 Waiting for new SeekInfo from 172.18.0.9:39280" +"2019-07-20 02:40:49.066 UTC [common.deliver] Handle -> DEBU 193a Attempting to read seek info message from 172.18.0.9:39280" +"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.068 UTC [policies] Evaluate -> DEBU 193f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.068 UTC [cauthdsl] func1 -> DEBU 1940 0xc0008bc0a0 gate 1563590449068929800 evaluation starts" +"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1941 0xc0008bc0a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1942 0xc0008bc0a0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1943 0xc0008bc0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.069 UTC [cauthdsl] func2 -> DEBU 1944 0xc0008bc0a0 principal evaluation fails" +"2019-07-20 02:40:49.069 UTC [cauthdsl] func1 -> DEBU 1945 0xc0008bc0a0 gate 1563590449068929800 evaluation fails" +"2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1946 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.069 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.070 UTC [policies] Evaluate -> DEBU 1948 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 1949 0xc0008bc8e0 gate 1563590449070160000 evaluation starts" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194a 0xc0008bc8e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194b 0xc0008bc8e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194c 0xc0008bc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func2 -> DEBU 194d 0xc0008bc8e0 principal evaluation fails" +"2019-07-20 02:40:49.070 UTC [cauthdsl] func1 -> DEBU 194e 0xc0008bc8e0 gate 1563590449070160000 evaluation fails" +"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 194f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.071 UTC [policies] Evaluate -> DEBU 1951 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.071 UTC [cauthdsl] func1 -> DEBU 1952 0xc0008bd120 gate 1563590449071603400 evaluation starts" +"2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1953 0xc0008bd120 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.071 UTC [cauthdsl] func2 -> DEBU 1954 0xc0008bd120 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1955 0xc0008bd120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.072 UTC [cauthdsl] func2 -> DEBU 1956 0xc0008bd120 principal evaluation fails" +"2019-07-20 02:40:49.072 UTC [cauthdsl] func1 -> DEBU 1957 0xc0008bd120 gate 1563590449071603400 evaluation fails" +"2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1958 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.072 UTC [policies] Evaluate -> DEBU 1959 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.072 UTC [policies] func1 -> DEBU 195a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195b Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.073 UTC [policies] Evaluate -> DEBU 195f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.073 UTC [cauthdsl] func1 -> DEBU 1960 0xc0008bde10 gate 1563590449073713400 evaluation starts" +"2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1961 0xc0008bde10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.073 UTC [cauthdsl] func2 -> DEBU 1962 0xc0008bde10 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.074 UTC [cauthdsl] func2 -> DEBU 1963 0xc0008bde10 principal matched by identity 0" +"2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1964 Verify: digest = 00000000 69 c2 20 14 9e bd df 67 ef c6 0e ec 06 ff 4a ea |i. ....g......J.| +00000010 99 ae 80 c3 73 cd c6 11 95 7f 41 4e 44 c3 49 db |....s.....AND.I.|" +"2019-07-20 02:40:49.074 UTC [msp.identity] Verify -> DEBU 1965 Verify: sig = 00000000 30 44 02 20 70 28 b0 88 ca 7f d9 92 c5 ee 60 3c |0D. p(........`<| +00000010 7c 7d 73 65 fb ef 23 75 b2 51 72 d0 e3 1e 88 ea ||}se..#u.Qr.....| +00000020 34 b3 d2 4d 02 20 4c 7f ca d9 a7 9d 44 62 e4 50 |4..M. L.....Db.P| +00000030 3a 91 d3 6a d7 a1 e4 30 f5 8e 62 b4 ec e2 dc 85 |:..j...0..b.....| +00000040 e9 56 04 a2 52 d7 |.V..R.|" +"2019-07-20 02:40:49.075 UTC [cauthdsl] func2 -> DEBU 1966 0xc0008bde10 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.075 UTC [cauthdsl] func1 -> DEBU 1967 0xc0008bde10 gate 1563590449073713400 evaluation succeeds" +"2019-07-20 02:40:49.075 UTC [policies] Evaluate -> DEBU 1968 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 1969 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196c Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.076 UTC [policies] Evaluate -> DEBU 196d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.076 UTC [common.deliver] deliverBlocks -> DEBU 196e [channel: businesschannel] Received seekInfo (0xc000089f80) start: > stop: > from 172.18.0.9:39280" +"2019-07-20 02:40:49.076 UTC [fsblkstorage] Next -> DEBU 196f Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.076 UTC [fsblkstorage] newBlockfileStream -> DEBU 1970 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1971 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1972 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:49.077 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1973 blockbytes [34880] read from file [0]" +"2019-07-20 02:40:49.077 UTC [common.deliver] deliverBlocks -> DEBU 1974 [channel: businesschannel] Delivering block for (0xc000089f80) for 172.18.0.9:39280" +"2019-07-20 02:40:49.078 UTC [common.deliver] deliverBlocks -> DEBU 1975 [channel: businesschannel] Done delivering to 172.18.0.9:39280 for (0xc000089f80)" +"2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1976 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.078 UTC [common.deliver] Handle -> DEBU 1977 Waiting for new SeekInfo from 172.18.0.9:39280" +"2019-07-20 02:40:49.079 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:39280" +"2019-07-20 02:40:49.078 UTC [fsblkstorage] waitForBlock -> DEBU 1978 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.085 UTC [common.deliver] Handle -> WARN 197a Error reading from 172.18.0.9:39280: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:49.086 UTC [orderer.common.server] func1 -> DEBU 197b Closing Deliver stream" +"2019-07-20 02:40:49.086 UTC [comm.grpc.server] 1 -> INFO 197c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39280 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.909ms +"2019-07-20 02:40:49.086 UTC [grpc] infof -> DEBU 197d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197e Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116µs " +"2019-07-20 02:40:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1980 Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +"2019-07-20 02:40:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1981 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +"2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1982 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:49.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:49.227 UTC [orderer.common.server] Deliver -> DEBU 1984 Starting new Deliver handler" +"2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1985 Starting new deliver loop for 172.18.0.9:39282" +"2019-07-20 02:40:49.227 UTC [common.deliver] Handle -> DEBU 1986 Attempting to read seek info message from 172.18.0.9:39282" +"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.228 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.229 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.229 UTC [cauthdsl] func1 -> DEBU 198c 0xc000b1a660 gate 1563590449229303900 evaluation starts" +"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198d 0xc000b1a660 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198e 0xc000b1a660 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.229 UTC [cauthdsl] func2 -> DEBU 198f 0xc000b1a660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.230 UTC [cauthdsl] func2 -> DEBU 1990 0xc000b1a660 principal evaluation fails" +"2019-07-20 02:40:49.230 UTC [cauthdsl] func1 -> DEBU 1991 0xc000b1a660 gate 1563590449229303900 evaluation fails" +"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.230 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.231 UTC [cauthdsl] func1 -> DEBU 1995 0xc000b1aea0 gate 1563590449231168100 evaluation starts" +"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1996 0xc000b1aea0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1997 0xc000b1aea0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1998 0xc000b1aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.231 UTC [cauthdsl] func2 -> DEBU 1999 0xc000b1aea0 principal evaluation fails" +"2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199a 0xc000b1aea0 gate 1563590449231168100 evaluation fails" +"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.232 UTC [policies] Evaluate -> DEBU 199d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.232 UTC [cauthdsl] func1 -> DEBU 199e 0xc000b1b6e0 gate 1563590449232824500 evaluation starts" +"2019-07-20 02:40:49.232 UTC [cauthdsl] func2 -> DEBU 199f 0xc000b1b6e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a0 0xc000b1b6e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a1 0xc000b1b6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.233 UTC [cauthdsl] func2 -> DEBU 19a2 0xc000b1b6e0 principal evaluation fails" +"2019-07-20 02:40:49.233 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000b1b6e0 gate 1563590449232824500 evaluation fails" +"2019-07-20 02:40:49.233 UTC [policies] Evaluate -> DEBU 19a4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.234 UTC [policies] func1 -> DEBU 19a6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a7 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.234 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.235 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.235 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000bf03d0 gate 1563590449235502300 evaluation starts" +"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000bf03d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000bf03d0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.235 UTC [cauthdsl] func2 -> DEBU 19af 0xc000bf03d0 principal matched by identity 0" +"2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 82 c0 89 76 a5 fb 20 65 67 01 37 2f b9 6b 34 26 |...v.. eg.7/.k4&| +00000010 cf 0d 30 1c ea 6c d5 67 19 7b 6e b3 f4 a3 a6 fd |..0..l.g.{n.....|" +"2019-07-20 02:40:49.236 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 87 0b bd 80 5a 66 e5 87 b0 b5 de |0E.!.....Zf.....| +00000010 95 3a 3c c0 19 6e f9 1e d9 00 9c df ca ab 34 75 |.:<..n........4u| +00000020 95 51 8d 93 6a 02 20 44 80 f3 85 2b ba 00 e1 8a |.Q..j. D...+....| +00000030 59 83 1d 31 c4 76 e2 8a 78 f7 32 2e b5 91 83 5e |Y..1.v..x.2....^| +00000040 1a 63 0b 11 6b ca 49 |.c..k.I|" +"2019-07-20 02:40:49.237 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000bf03d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.237 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000bf03d0 gate 1563590449235502300 evaluation succeeds" +"2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.237 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.238 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.238 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc000ce2840) start: > stop: > from 172.18.0.9:39282" +"2019-07-20 02:40:49.238 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.239 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[118787], Going to peek [8] bytes" +"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[23944], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:49.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [23944] read from file [0]" +"2019-07-20 02:40:49.239 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block for (0xc000ce2840) for 172.18.0.9:39282" +"2019-07-20 02:40:49.240 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:39282 for (0xc000ce2840)" +"2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c2 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.240 UTC [fsblkstorage] waitForBlock -> DEBU 19c3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c4 Waiting for new SeekInfo from 172.18.0.9:39282" +"2019-07-20 02:40:49.241 UTC [common.deliver] Handle -> DEBU 19c5 Attempting to read seek info message from 172.18.0.9:39282" +"2019-07-20 02:40:49.247 UTC [common.deliver] Handle -> WARN 19c6 Error reading from 172.18.0.9:39282: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:49.247 UTC [orderer.common.server] func1 -> DEBU 19c7 Closing Deliver stream" +"2019-07-20 02:40:49.247 UTC [comm.grpc.server] 1 -> INFO 19c8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39282 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3933ms +"2019-07-20 02:40:49.247 UTC [grpc] infof -> DEBU 19c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:49.395 UTC [orderer.common.server] Deliver -> DEBU 19ca Starting new Deliver handler" +"2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cb Starting new deliver loop for 172.18.0.9:39284" +"2019-07-20 02:40:49.396 UTC [common.deliver] Handle -> DEBU 19cc Attempting to read seek info message from 172.18.0.9:39284" +"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.397 UTC [policies] Evaluate -> DEBU 19d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.398 UTC [cauthdsl] func1 -> DEBU 19d2 0xc001108980 gate 1563590449398077800 evaluation starts" +"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d3 0xc001108980 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d4 0xc001108980 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.398 UTC [cauthdsl] func2 -> DEBU 19d5 0xc001108980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.399 UTC [cauthdsl] func2 -> DEBU 19d6 0xc001108980 principal evaluation fails" +"2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19d7 0xc001108980 gate 1563590449398077800 evaluation fails" +"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.399 UTC [policies] Evaluate -> DEBU 19da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.399 UTC [cauthdsl] func1 -> DEBU 19db 0xc0011091c0 gate 1563590449399961700 evaluation starts" +"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dc 0xc0011091c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19dd 0xc0011091c0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19de 0xc0011091c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.400 UTC [cauthdsl] func2 -> DEBU 19df 0xc0011091c0 principal evaluation fails" +"2019-07-20 02:40:49.401 UTC [cauthdsl] func1 -> DEBU 19e0 0xc0011091c0 gate 1563590449399961700 evaluation fails" +"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.401 UTC [policies] Evaluate -> DEBU 19e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.402 UTC [cauthdsl] func1 -> DEBU 19e4 0xc001109a00 gate 1563590449401966900 evaluation starts" +"2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e5 0xc001109a00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.402 UTC [cauthdsl] func2 -> DEBU 19e6 0xc001109a00 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e7 0xc001109a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.403 UTC [cauthdsl] func2 -> DEBU 19e8 0xc001109a00 principal evaluation fails" +"2019-07-20 02:40:49.403 UTC [cauthdsl] func1 -> DEBU 19e9 0xc001109a00 gate 1563590449401966900 evaluation fails" +"2019-07-20 02:40:49.403 UTC [policies] Evaluate -> DEBU 19ea Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.404 UTC [policies] func1 -> DEBU 19ec Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ed Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.404 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.405 UTC [policies] Evaluate -> DEBU 19f1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.405 UTC [cauthdsl] func1 -> DEBU 19f2 0xc000de86f0 gate 1563590449405439300 evaluation starts" +"2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f3 0xc000de86f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.405 UTC [cauthdsl] func2 -> DEBU 19f4 0xc000de86f0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.406 UTC [cauthdsl] func2 -> DEBU 19f5 0xc000de86f0 principal matched by identity 0" +"2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f6 Verify: digest = 00000000 8d ef c8 38 dd 25 ee e3 8f e1 10 8f 37 05 1b 07 |...8.%......7...| +00000010 3a 8c f0 8f a3 05 c2 78 05 48 e8 c1 65 36 9c 6a |:......x.H..e6.j|" +"2019-07-20 02:40:49.406 UTC [msp.identity] Verify -> DEBU 19f7 Verify: sig = 00000000 30 45 02 21 00 e1 d5 0c 44 50 2f 63 e1 b1 b8 2c |0E.!....DP/c...,| +00000010 03 a3 c2 a9 8f 29 b6 9d 8c 70 5f 06 42 0c ce 40 |.....)...p_.B..@| +00000020 66 94 91 e5 43 02 20 20 7f d5 e0 d1 c9 db f2 ef |f...C. ........| +00000030 28 3e ef a7 08 4a 58 9d cb 54 da bc 4f a7 5e bd |(>...JX..T..O.^.| +00000040 02 79 a1 1c e7 ca 73 |.y....s|" +"2019-07-20 02:40:49.407 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000de86f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.407 UTC [cauthdsl] func1 -> DEBU 19f9 0xc000de86f0 gate 1563590449405439300 evaluation succeeds" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.407 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.407 UTC [common.deliver] deliverBlocks -> DEBU 1a00 [channel: businesschannel] Received seekInfo (0xc000ce2f80) start: > stop: > from 172.18.0.9:39284" +"2019-07-20 02:40:49.408 UTC [fsblkstorage] Next -> DEBU 1a01 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.408 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a02 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23947]" +"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a03 Remaining bytes=[94840], Going to peek [8] bytes" +"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a04 Returning blockbytes - length=[23690], placementInfo={fileNum=[0], startOffset=[23947], bytesOffset=[23950]}" +"2019-07-20 02:40:49.408 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a05 blockbytes [23690] read from file [0]" +"2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a06 [channel: businesschannel] Delivering block for (0xc000ce2f80) for 172.18.0.9:39284" +"2019-07-20 02:40:49.409 UTC [common.deliver] deliverBlocks -> DEBU 1a07 [channel: businesschannel] Done delivering to 172.18.0.9:39284 for (0xc000ce2f80)" +"2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a08 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.409 UTC [fsblkstorage] waitForBlock -> DEBU 1a09 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.409 UTC [common.deliver] Handle -> DEBU 1a0a Waiting for new SeekInfo from 172.18.0.9:39284" +"2019-07-20 02:40:49.410 UTC [common.deliver] Handle -> DEBU 1a0b Attempting to read seek info message from 172.18.0.9:39284" +"2019-07-20 02:40:49.419 UTC [common.deliver] Handle -> WARN 1a0c Error reading from 172.18.0.9:39284: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:49.419 UTC [orderer.common.server] func1 -> DEBU 1a0e Closing Deliver stream" +"2019-07-20 02:40:49.419 UTC [grpc] infof -> DEBU 1a0d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:49.419 UTC [comm.grpc.server] 1 -> INFO 1a0f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39284 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9813ms +"2019-07-20 02:40:49.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a10 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:49.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a11 Sending msg of 28 bytes to 3 on channel testchainid took 82.9µs" +"2019-07-20 02:40:49.440 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a12 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.5µs " +"2019-07-20 02:40:49.651 UTC [orderer.common.server] Deliver -> DEBU 1a13 Starting new Deliver handler" +"2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a14 Starting new deliver loop for 172.18.0.9:39286" +"2019-07-20 02:40:49.651 UTC [common.deliver] Handle -> DEBU 1a15 Attempting to read seek info message from 172.18.0.9:39286" +"2019-07-20 02:40:49.652 UTC [policies] Evaluate -> DEBU 1a16 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a17 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.655 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.656 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.656 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc001146f40 gate 1563590449656634100 evaluation starts" +"2019-07-20 02:40:49.656 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc001146f40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc001146f40 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc001146f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.657 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc001146f40 principal evaluation fails" +"2019-07-20 02:40:49.658 UTC [cauthdsl] func1 -> DEBU 1a20 0xc001146f40 gate 1563590449656634100 evaluation fails" +"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.659 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.660 UTC [cauthdsl] func1 -> DEBU 1a24 0xc001147780 gate 1563590449660258300 evaluation starts" +"2019-07-20 02:40:49.660 UTC [cauthdsl] func2 -> DEBU 1a25 0xc001147780 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.661 UTC [cauthdsl] func2 -> DEBU 1a26 0xc001147780 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a27 0xc001147780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.662 UTC [cauthdsl] func2 -> DEBU 1a28 0xc001147780 principal evaluation fails" +"2019-07-20 02:40:49.663 UTC [cauthdsl] func1 -> DEBU 1a29 0xc001147780 gate 1563590449660258300 evaluation fails" +"2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.664 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.665 UTC [policies] Evaluate -> DEBU 1a2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.665 UTC [cauthdsl] func1 -> DEBU 1a2d 0xc001147fd0 gate 1563590449665747900 evaluation starts" +"2019-07-20 02:40:49.665 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc001147fd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc001147fd0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a30 0xc001147fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.666 UTC [cauthdsl] func2 -> DEBU 1a31 0xc001147fd0 principal evaluation fails" +"2019-07-20 02:40:49.667 UTC [cauthdsl] func1 -> DEBU 1a32 0xc001147fd0 gate 1563590449665747900 evaluation fails" +"2019-07-20 02:40:49.667 UTC [policies] Evaluate -> DEBU 1a33 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.668 UTC [policies] Evaluate -> DEBU 1a34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.668 UTC [policies] func1 -> DEBU 1a35 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:49.669 UTC [policies] Evaluate -> DEBU 1a36 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.670 UTC [policies] Evaluate -> DEBU 1a38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.671 UTC [policies] Evaluate -> DEBU 1a39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.672 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.673 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000ad15d0 gate 1563590449673204500 evaluation starts" +"2019-07-20 02:40:49.673 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000ad15d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.674 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000ad15d0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.675 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000ad15d0 principal matched by identity 0" +"2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a3f Verify: digest = 00000000 6d fd 64 01 29 73 26 c6 8d 78 12 e5 8a 88 92 c4 |m.d.)s&..x......| +00000010 38 2f 37 72 0e ec 09 0e 08 8a e7 4f be e3 3c e5 |8/7r.......O..<.|" +"2019-07-20 02:40:49.676 UTC [msp.identity] Verify -> DEBU 1a40 Verify: sig = 00000000 30 45 02 21 00 c4 23 85 66 3b 16 a3 d1 d7 66 d9 |0E.!..#.f;....f.| +00000010 55 74 3a 88 0a bc 26 58 b2 c5 82 ae 0e 1a 37 90 |Ut:...&X......7.| +00000020 4d f1 5f 36 66 02 20 2f 8d 67 0b 81 bf a2 1f 9d |M._6f. /.g......| +00000030 4c f3 4a 40 63 da db 0e 77 9e f5 c1 94 40 e6 f3 |L.J@c...w....@..| +00000040 64 14 8a e7 6f 9b 49 |d...o.I|" +"2019-07-20 02:40:49.676 UTC [cauthdsl] func2 -> DEBU 1a41 0xc000ad15d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.677 UTC [cauthdsl] func1 -> DEBU 1a42 0xc000ad15d0 gate 1563590449673204500 evaluation succeeds" +"2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a43 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.678 UTC [policies] Evaluate -> DEBU 1a44 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.679 UTC [policies] Evaluate -> DEBU 1a45 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.680 UTC [policies] Evaluate -> DEBU 1a46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.681 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.682 UTC [common.deliver] deliverBlocks -> DEBU 1a49 [channel: businesschannel] Received seekInfo (0xc000ce3680) start: > stop: > from 172.18.0.9:39286" +"2019-07-20 02:40:49.682 UTC [fsblkstorage] Next -> DEBU 1a4a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.682 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a4b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47640]" +"2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4c Remaining bytes=[71147], Going to peek [8] bytes" +"2019-07-20 02:40:49.683 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4d Returning blockbytes - length=[23747], placementInfo={fileNum=[0], startOffset=[47640], bytesOffset=[47643]}" +"2019-07-20 02:40:49.684 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a4e blockbytes [23747] read from file [0]" +"2019-07-20 02:40:49.684 UTC [common.deliver] deliverBlocks -> DEBU 1a4f [channel: businesschannel] Delivering block for (0xc000ce3680) for 172.18.0.9:39286" +"2019-07-20 02:40:49.690 UTC [common.deliver] deliverBlocks -> DEBU 1a50 [channel: businesschannel] Done delivering to 172.18.0.9:39286 for (0xc000ce3680)" +"2019-07-20 02:40:49.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a51 Sending msg of 28 bytes to 2 on channel businesschannel took 73.4µs" +"2019-07-20 02:40:49.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a54 Sending msg of 28 bytes to 3 on channel businesschannel took 84.1µs" +"2019-07-20 02:40:49.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.7µs " +"2019-07-20 02:40:49.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.8µs " +"2019-07-20 02:40:49.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a53 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:49.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a56 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a57 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.699 UTC [fsblkstorage] waitForBlock -> DEBU 1a58 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a59 Waiting for new SeekInfo from 172.18.0.9:39286" +"2019-07-20 02:40:49.700 UTC [common.deliver] Handle -> DEBU 1a5a Attempting to read seek info message from 172.18.0.9:39286" +"2019-07-20 02:40:49.709 UTC [common.deliver] Handle -> WARN 1a5b Error reading from 172.18.0.9:39286: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:49.710 UTC [orderer.common.server] func1 -> DEBU 1a5c Closing Deliver stream" +"2019-07-20 02:40:49.710 UTC [comm.grpc.server] 1 -> INFO 1a5d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39286 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=59.4656ms +"2019-07-20 02:40:49.712 UTC [grpc] infof -> DEBU 1a5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:49.887 UTC [orderer.common.server] Deliver -> DEBU 1a5f Starting new Deliver handler" +"2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a60 Starting new deliver loop for 172.18.0.9:39288" +"2019-07-20 02:40:49.888 UTC [common.deliver] Handle -> DEBU 1a61 Attempting to read seek info message from 172.18.0.9:39288" +"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.889 UTC [policies] Evaluate -> DEBU 1a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.890 UTC [policies] Evaluate -> DEBU 1a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.890 UTC [cauthdsl] func1 -> DEBU 1a67 0xc001089ef0 gate 1563590449890604200 evaluation starts" +"2019-07-20 02:40:49.890 UTC [cauthdsl] func2 -> DEBU 1a68 0xc001089ef0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a69 0xc001089ef0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6a 0xc001089ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:49.891 UTC [cauthdsl] func2 -> DEBU 1a6b 0xc001089ef0 principal evaluation fails" +"2019-07-20 02:40:49.891 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc001089ef0 gate 1563590449890604200 evaluation fails" +"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.892 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.892 UTC [cauthdsl] func1 -> DEBU 1a70 0xc000cd2730 gate 1563590449892826700 evaluation starts" +"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000cd2730 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a72 0xc000cd2730 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a73 0xc000cd2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:49.893 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000cd2730 principal evaluation fails" +"2019-07-20 02:40:49.893 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000cd2730 gate 1563590449892826700 evaluation fails" +"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.894 UTC [policies] Evaluate -> DEBU 1a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.894 UTC [cauthdsl] func1 -> DEBU 1a79 0xc000cd2f70 gate 1563590449894533500 evaluation starts" +"2019-07-20 02:40:49.894 UTC [cauthdsl] func2 -> DEBU 1a7a 0xc000cd2f70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc000cd2f70 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.895 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc000cd2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:49.896 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc000cd2f70 principal evaluation fails" +"2019-07-20 02:40:49.896 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000cd2f70 gate 1563590449894533500 evaluation fails" +"2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a7f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.896 UTC [policies] Evaluate -> DEBU 1a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.897 UTC [policies] func1 -> DEBU 1a81 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a82 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:49.897 UTC [policies] Evaluate -> DEBU 1a85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.898 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:49.898 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000cd3c60 gate 1563590449898398500 evaluation starts" +"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000cd3c60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000cd3c60 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:49.898 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000cd3c60 principal matched by identity 0" +"2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8b Verify: digest = 00000000 cc 24 52 2f d6 08 62 09 9d 80 87 87 59 45 d1 ee |.$R/..b.....YE..| +00000010 c3 65 25 c7 5d 0d 9d e3 54 97 82 53 a7 80 1c b7 |.e%.]...T..S....|" +"2019-07-20 02:40:49.899 UTC [msp.identity] Verify -> DEBU 1a8c Verify: sig = 00000000 30 44 02 20 2d 84 b8 36 d3 99 0b c7 07 a0 82 e8 |0D. -..6........| +00000010 0f ba f1 08 99 d4 29 b7 60 14 25 e1 d7 4e 44 fc |......).`.%..ND.| +00000020 df ca 36 b9 02 20 2b 9b 61 70 ea 2c 52 08 65 03 |..6.. +.ap.,R.e.| +00000030 03 5f 46 e8 ed 09 37 dd 46 cb 66 0d 43 62 9f 72 |._F...7.F.f.Cb.r| +00000040 cf dc 1d d9 9c 61 |.....a|" +"2019-07-20 02:40:49.900 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc000cd3c60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.900 UTC [cauthdsl] func1 -> DEBU 1a8e 0xc000cd3c60 gate 1563590449898398500 evaluation succeeds" +"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:49.900 UTC [policies] Evaluate -> DEBU 1a91 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a93 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:49.901 UTC [policies] Evaluate -> DEBU 1a94 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:49.901 UTC [common.deliver] deliverBlocks -> DEBU 1a95 [channel: businesschannel] Received seekInfo (0xc0011d4100) start: > stop: > from 172.18.0.9:39288" +"2019-07-20 02:40:49.901 UTC [fsblkstorage] Next -> DEBU 1a96 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:49.901 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a97 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71390]" +"2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a98 Remaining bytes=[47397], Going to peek [8] bytes" +"2019-07-20 02:40:49.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a99 Returning blockbytes - length=[4527], placementInfo={fileNum=[0], startOffset=[71390], bytesOffset=[71392]}" +"2019-07-20 02:40:49.902 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a9a blockbytes [4527] read from file [0]" +"2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9b [channel: businesschannel] Delivering block for (0xc0011d4100) for 172.18.0.9:39288" +"2019-07-20 02:40:49.902 UTC [common.deliver] deliverBlocks -> DEBU 1a9c [channel: businesschannel] Done delivering to 172.18.0.9:39288 for (0xc0011d4100)" +"2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9d Waiting for new SeekInfo from 172.18.0.9:39288" +"2019-07-20 02:40:49.902 UTC [common.deliver] Handle -> DEBU 1a9e Attempting to read seek info message from 172.18.0.9:39288" +"2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1a9f Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:49.903 UTC [fsblkstorage] waitForBlock -> DEBU 1aa0 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:49.911 UTC [common.deliver] Handle -> WARN 1aa1 Error reading from 172.18.0.9:39288: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:49.911 UTC [orderer.common.server] func1 -> DEBU 1aa2 Closing Deliver stream" +"2019-07-20 02:40:49.912 UTC [comm.grpc.server] 1 -> INFO 1aa3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39288 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.309ms +"2019-07-20 02:40:49.912 UTC [grpc] infof -> DEBU 1aa4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:49.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aa5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:49.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aa6 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-07-20 02:40:49.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +"2019-07-20 02:40:50.087 UTC [orderer.common.server] Deliver -> DEBU 1aa8 Starting new Deliver handler" +"2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aa9 Starting new deliver loop for 172.18.0.9:39290" +"2019-07-20 02:40:50.088 UTC [common.deliver] Handle -> DEBU 1aaa Attempting to read seek info message from 172.18.0.9:39290" +"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.089 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.090 UTC [policies] Evaluate -> DEBU 1aaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:50.090 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0012c81e0 gate 1563590450090542200 evaluation starts" +"2019-07-20 02:40:50.090 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0012c81e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0012c81e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.091 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0012c81e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:50.092 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0012c81e0 principal evaluation fails" +"2019-07-20 02:40:50.092 UTC [cauthdsl] func1 -> DEBU 1ab5 0xc0012c81e0 gate 1563590450090542200 evaluation fails" +"2019-07-20 02:40:50.092 UTC [policies] Evaluate -> DEBU 1ab6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.093 UTC [policies] Evaluate -> DEBU 1ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:50.093 UTC [cauthdsl] func1 -> DEBU 1ab9 0xc0012c8a20 gate 1563590450093382300 evaluation starts" +"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0012c8a20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0012c8a20 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.093 UTC [cauthdsl] func2 -> DEBU 1abc 0xc0012c8a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:50.094 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0012c8a20 principal evaluation fails" +"2019-07-20 02:40:50.094 UTC [cauthdsl] func1 -> DEBU 1abe 0xc0012c8a20 gate 1563590450093382300 evaluation fails" +"2019-07-20 02:40:50.094 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.095 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:50.095 UTC [cauthdsl] func1 -> DEBU 1ac2 0xc0012c9260 gate 1563590450095879300 evaluation starts" +"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac3 0xc0012c9260 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac4 0xc0012c9260 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.096 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0012c9260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:50.097 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0012c9260 principal evaluation fails" +"2019-07-20 02:40:50.097 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0012c9260 gate 1563590450095879300 evaluation fails" +"2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.097 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.098 UTC [policies] func1 -> DEBU 1aca Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acb Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:50.098 UTC [policies] Evaluate -> DEBU 1acc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1ace This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.099 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.099 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc0012c9f50 gate 1563590450099718300 evaluation starts" +"2019-07-20 02:40:50.099 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc0012c9f50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc0012c9f50 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.100 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc0012c9f50 principal matched by identity 0" +"2019-07-20 02:40:50.100 UTC [msp.identity] Verify -> DEBU 1ad4 Verify: digest = 00000000 32 b0 1f 4e 4f 77 71 8c 45 cf a1 1a db 81 73 9b |2..NOwq.E.....s.| +00000010 14 26 fa 8f a0 33 a0 d5 a4 aa 21 20 77 f3 cb fb |.&...3....! w...|" +"2019-07-20 02:40:50.101 UTC [msp.identity] Verify -> DEBU 1ad5 Verify: sig = 00000000 30 45 02 21 00 fe 90 97 76 f4 f4 19 51 c7 be 69 |0E.!....v...Q..i| +00000010 b1 0e ae c8 cc ba 84 29 c4 52 79 92 6c ff 4d d1 |.......).Ry.l.M.| +00000020 7c 21 72 25 8c 02 20 7f 29 7a 69 a3 f6 3e 0b ae ||!r%.. .)zi..>..| +00000030 8a 5d 38 a7 5b b5 46 02 ea ac 96 62 97 00 96 82 |.]8.[.F....b....| +00000040 4c 11 ff 0c 60 0d d4 |L...`..|" +"2019-07-20 02:40:50.102 UTC [cauthdsl] func2 -> DEBU 1ad6 0xc0012c9f50 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.102 UTC [cauthdsl] func1 -> DEBU 1ad7 0xc0012c9f50 gate 1563590450099718300 evaluation succeeds" +"2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.102 UTC [policies] Evaluate -> DEBU 1ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1ada Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1adc Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.103 UTC [policies] Evaluate -> DEBU 1add == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.103 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Received seekInfo (0xc0011d52c0) start: > stop: > from 172.18.0.9:39290" +"2019-07-20 02:40:50.104 UTC [fsblkstorage] Next -> DEBU 1adf Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:50.104 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ae0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[75919]" +"2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae1 Remaining bytes=[42868], Going to peek [8] bytes" +"2019-07-20 02:40:50.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae2 Returning blockbytes - length=[3992], placementInfo={fileNum=[0], startOffset=[75919], bytesOffset=[75921]}" +"2019-07-20 02:40:50.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ae3 blockbytes [3992] read from file [0]" +"2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae4 [channel: businesschannel] Delivering block for (0xc0011d52c0) for 172.18.0.9:39290" +"2019-07-20 02:40:50.105 UTC [common.deliver] deliverBlocks -> DEBU 1ae5 [channel: businesschannel] Done delivering to 172.18.0.9:39290 for (0xc0011d52c0)" +"2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae6 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:50.106 UTC [fsblkstorage] waitForBlock -> DEBU 1ae7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae8 Waiting for new SeekInfo from 172.18.0.9:39290" +"2019-07-20 02:40:50.106 UTC [common.deliver] Handle -> DEBU 1ae9 Attempting to read seek info message from 172.18.0.9:39290" +"2019-07-20 02:40:50.114 UTC [common.deliver] Handle -> WARN 1aea Error reading from 172.18.0.9:39290: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.114 UTC [orderer.common.server] func1 -> DEBU 1aeb Closing Deliver stream" +"2019-07-20 02:40:50.114 UTC [comm.grpc.server] 1 -> INFO 1aec streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39290 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1555ms +"2019-07-20 02:40:50.115 UTC [grpc] infof -> DEBU 1aed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aee Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2019-07-20 02:40:50.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aef Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-07-20 02:40:50.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " +"2019-07-20 02:40:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1af1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.8µs " +"2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:50.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:50.242 UTC [orderer.common.server] Deliver -> DEBU 1af4 Starting new Deliver handler" +"2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af5 Starting new deliver loop for 172.18.0.9:39292" +"2019-07-20 02:40:50.242 UTC [common.deliver] Handle -> DEBU 1af6 Attempting to read seek info message from 172.18.0.9:39292" +"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:50.244 UTC [policies] Evaluate -> DEBU 1afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.245 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:50.245 UTC [cauthdsl] func1 -> DEBU 1afc 0xc00116c710 gate 1563590450245746300 evaluation starts" +"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00116c710 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00116c710 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.246 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00116c710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:50.247 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00116c710 principal evaluation fails" +"2019-07-20 02:40:50.247 UTC [cauthdsl] func1 -> DEBU 1b01 0xc00116c710 gate 1563590450245746300 evaluation fails" +"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.248 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:50.249 UTC [cauthdsl] func1 -> DEBU 1b05 0xc00116cf50 gate 1563590450249209100 evaluation starts" +"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b06 0xc00116cf50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b07 0xc00116cf50 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.249 UTC [cauthdsl] func2 -> DEBU 1b08 0xc00116cf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:50.250 UTC [cauthdsl] func2 -> DEBU 1b09 0xc00116cf50 principal evaluation fails" +"2019-07-20 02:40:50.251 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc00116cf50 gate 1563590450249209100 evaluation fails" +"2019-07-20 02:40:50.251 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.252 UTC [policies] Evaluate -> DEBU 1b0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:50.252 UTC [cauthdsl] func1 -> DEBU 1b0e 0xc00116d790 gate 1563590450252617400 evaluation starts" +"2019-07-20 02:40:50.252 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc00116d790 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b10 0xc00116d790 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b11 0xc00116d790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:50.253 UTC [cauthdsl] func2 -> DEBU 1b12 0xc00116d790 principal evaluation fails" +"2019-07-20 02:40:50.253 UTC [cauthdsl] func1 -> DEBU 1b13 0xc00116d790 gate 1563590450252617400 evaluation fails" +"2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b14 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.254 UTC [policies] Evaluate -> DEBU 1b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.254 UTC [policies] func1 -> DEBU 1b16 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b17 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.255 UTC [policies] Evaluate -> DEBU 1b1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.256 UTC [policies] Evaluate -> DEBU 1b1b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.256 UTC [cauthdsl] func1 -> DEBU 1b1c 0xc00117c480 gate 1563590450256362000 evaluation starts" +"2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1d 0xc00117c480 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.256 UTC [cauthdsl] func2 -> DEBU 1b1e 0xc00117c480 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.257 UTC [cauthdsl] func2 -> DEBU 1b1f 0xc00117c480 principal matched by identity 0" +"2019-07-20 02:40:50.257 UTC [msp.identity] Verify -> DEBU 1b20 Verify: digest = 00000000 ad 6d 6e 6f fb 90 19 a4 92 1d 11 87 3f 22 bc a5 |.mno........?"..| +00000010 da cd cf 6c e4 3c 34 dc fa 7b 28 ce 6c 77 a0 49 |...l.<4..{(.lw.I|" +"2019-07-20 02:40:50.258 UTC [msp.identity] Verify -> DEBU 1b21 Verify: sig = 00000000 30 45 02 21 00 b1 59 d2 0e 97 76 c6 47 00 47 38 |0E.!..Y...v.G.G8| +00000010 0a d5 e3 9e 61 ef 45 09 c4 7a fb 0d 57 1e 04 84 |....a.E..z..W...| +00000020 32 7a 3f 5d 34 02 20 0f d3 a3 bd 1e a2 e6 0b 9b |2z?]4. .........| +00000030 65 ea 40 ae 08 d8 7c d5 0e b7 6c 7e 92 7b cb 08 |e.@...|...l~.{..| +00000040 fc 9e 2e 0b d2 ff fe |.......|" +"2019-07-20 02:40:50.258 UTC [cauthdsl] func2 -> DEBU 1b22 0xc00117c480 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.259 UTC [cauthdsl] func1 -> DEBU 1b23 0xc00117c480 gate 1563590450256362000 evaluation succeeds" +"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b24 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b25 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.259 UTC [policies] Evaluate -> DEBU 1b26 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b28 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.260 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.261 UTC [common.deliver] deliverBlocks -> DEBU 1b2a [channel: businesschannel] Received seekInfo (0xc0011d57c0) start: > stop: > from 172.18.0.9:39292" +"2019-07-20 02:40:50.261 UTC [fsblkstorage] Next -> DEBU 1b2b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:50.261 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b2c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[79913]" +"2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2d Remaining bytes=[38874], Going to peek [8] bytes" +"2019-07-20 02:40:50.261 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2e Returning blockbytes - length=[3989], placementInfo={fileNum=[0], startOffset=[79913], bytesOffset=[79915]}" +"2019-07-20 02:40:50.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b2f blockbytes [3989] read from file [0]" +"2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b30 [channel: businesschannel] Delivering block for (0xc0011d57c0) for 172.18.0.9:39292" +"2019-07-20 02:40:50.262 UTC [common.deliver] deliverBlocks -> DEBU 1b31 [channel: businesschannel] Done delivering to 172.18.0.9:39292 for (0xc0011d57c0)" +"2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b32 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:50.263 UTC [fsblkstorage] waitForBlock -> DEBU 1b33 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:50.263 UTC [common.deliver] Handle -> DEBU 1b34 Waiting for new SeekInfo from 172.18.0.9:39292" +"2019-07-20 02:40:50.264 UTC [common.deliver] Handle -> DEBU 1b35 Attempting to read seek info message from 172.18.0.9:39292" +"2019-07-20 02:40:50.268 UTC [common.deliver] Handle -> WARN 1b36 Error reading from 172.18.0.9:39292: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.269 UTC [orderer.common.server] func1 -> DEBU 1b37 Closing Deliver stream" +"2019-07-20 02:40:50.269 UTC [comm.grpc.server] 1 -> INFO 1b38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39292 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0425ms +"2019-07-20 02:40:50.270 UTC [grpc] infof -> DEBU 1b39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.424 UTC [orderer.common.server] Deliver -> DEBU 1b3a Starting new Deliver handler" +"2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3b Starting new deliver loop for 172.18.0.9:39294" +"2019-07-20 02:40:50.424 UTC [common.deliver] Handle -> DEBU 1b3c Attempting to read seek info message from 172.18.0.9:39294" +"2019-07-20 02:40:50.424 UTC [policies] Evaluate -> DEBU 1b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.425 UTC [policies] Evaluate -> DEBU 1b41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:50.425 UTC [cauthdsl] func1 -> DEBU 1b42 0xc000c8cf80 gate 1563590450425970900 evaluation starts" +"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b43 0xc000c8cf80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b44 0xc000c8cf80 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b45 0xc000c8cf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-07-20 02:40:50.426 UTC [cauthdsl] func2 -> DEBU 1b46 0xc000c8cf80 principal evaluation fails" +"2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b47 0xc000c8cf80 gate 1563590450425970900 evaluation fails" +"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:50.427 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:50.427 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc000c8d870 gate 1563590450427863700 evaluation starts" +"2019-07-20 02:40:50.428 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc000c8d870 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc000c8d870 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.429 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc000c8d870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-07-20 02:40:50.430 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc000c8d870 principal evaluation fails" +"2019-07-20 02:40:50.430 UTC [cauthdsl] func1 -> DEBU 1b50 0xc000c8d870 gate 1563590450427863700 evaluation fails" +"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:50.430 UTC [policies] Evaluate -> DEBU 1b53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:50.431 UTC [cauthdsl] func1 -> DEBU 1b54 0xc0002664e0 gate 1563590450431281500 evaluation starts" +"2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0002664e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.431 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0002664e0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b57 0xc0002664e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-07-20 02:40:50.432 UTC [cauthdsl] func2 -> DEBU 1b58 0xc0002664e0 principal evaluation fails" +"2019-07-20 02:40:50.432 UTC [cauthdsl] func1 -> DEBU 1b59 0xc0002664e0 gate 1563590450431281500 evaluation fails" +"2019-07-20 02:40:50.432 UTC [policies] Evaluate -> DEBU 1b5a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:50.433 UTC [policies] func1 -> DEBU 1b5c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5d Signature set did not satisfy policy /Channel/Application/Readers" +"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:50.433 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b60 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.434 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.436 UTC [cauthdsl] func1 -> DEBU 1b62 0xc000267480 gate 1563590450436160900 evaluation starts" +"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000267480 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b64 0xc000267480 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.436 UTC [cauthdsl] func2 -> DEBU 1b65 0xc000267480 principal matched by identity 0" +"2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b66 Verify: digest = 00000000 ba d9 a9 0b b2 e1 ef 9e e4 d8 a4 81 20 d2 5f 9a |............ ._.| +00000010 7a ec 35 c6 f3 41 58 f0 8f 89 6e c2 da 51 22 17 |z.5..AX...n..Q".|" +"2019-07-20 02:40:50.437 UTC [msp.identity] Verify -> DEBU 1b67 Verify: sig = 00000000 30 45 02 21 00 bd 6d c8 49 f3 f8 36 2d cd 65 b6 |0E.!..m.I..6-.e.| +00000010 f3 cf 80 28 9d a4 fb 93 4a d0 da 3c c8 18 c9 33 |...(....J..<...3| +00000020 7e c4 1c 3c 28 02 20 29 7b cc f8 2f f9 c8 e4 0d |~..<(. ){../....| +00000030 13 bd de 1c 1c c1 4d ea ad 83 a6 aa 2e 29 7d 6b |......M......)}k| +00000040 25 11 ec 4a 56 ff 9e |%..JV..|" +"2019-07-20 02:40:50.437 UTC [cauthdsl] func2 -> DEBU 1b68 0xc000267480 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.437 UTC [cauthdsl] func1 -> DEBU 1b69 0xc000267480 gate 1563590450436160900 evaluation succeeds" +"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.438 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6e Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.440 UTC [policies] Evaluate -> DEBU 1b6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.440 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Received seekInfo (0xc000b09180) start: > stop: > from 172.18.0.9:39294" +"2019-07-20 02:40:50.440 UTC [fsblkstorage] Next -> DEBU 1b71 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-07-20 02:40:50.440 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b72 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[83904]" +"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 Remaining bytes=[34883], Going to peek [8] bytes" +"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b74 Returning blockbytes - length=[34880], placementInfo={fileNum=[0], startOffset=[83904], bytesOffset=[83907]}" +"2019-07-20 02:40:50.441 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b75 blockbytes [34880] read from file [0]" +"2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b76 [channel: businesschannel] Delivering block for (0xc000b09180) for 172.18.0.9:39294" +"2019-07-20 02:40:50.441 UTC [common.deliver] deliverBlocks -> DEBU 1b77 [channel: businesschannel] Done delivering to 172.18.0.9:39294 for (0xc000b09180)" +"2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b78 Waiting for new SeekInfo from 172.18.0.9:39294" +"2019-07-20 02:40:50.442 UTC [common.deliver] Handle -> DEBU 1b79 Attempting to read seek info message from 172.18.0.9:39294" +"2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[6]" +"2019-07-20 02:40:50.442 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-07-20 02:40:50.443 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:50.443 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2019-07-20 02:40:50.444 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-07-20 02:40:50.450 UTC [grpc] infof -> DEBU 1b7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.452 UTC [common.deliver] Handle -> WARN 1b80 Error reading from 172.18.0.9:39294: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.453 UTC [orderer.common.server] func1 -> DEBU 1b81 Closing Deliver stream" +"2019-07-20 02:40:50.454 UTC [comm.grpc.server] 1 -> INFO 1b82 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39294 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.2687ms +"2019-07-20 02:40:50.598 UTC [orderer.common.server] Deliver -> DEBU 1b83 Starting new Deliver handler" +"2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b84 Starting new deliver loop for 172.18.0.9:39296" +"2019-07-20 02:40:50.599 UTC [common.deliver] Handle -> DEBU 1b85 Attempting to read seek info message from 172.18.0.9:39296" +"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.600 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.601 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.601 UTC [cauthdsl] func1 -> DEBU 1b8b 0xc000416ad0 gate 1563590450601392800 evaluation starts" +"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc000416ad0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc000416ad0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.601 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc000416ad0 principal matched by identity 0" +"2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b8f Verify: digest = 00000000 18 75 b6 fe 13 b8 0d a3 28 ca 3a 8e 58 a0 8f 5d |.u......(.:.X..]| +00000010 cf 0a a1 93 8d 44 2a 8d 85 57 7d c7 0b 3f 79 70 |.....D*..W}..?yp|" +"2019-07-20 02:40:50.602 UTC [msp.identity] Verify -> DEBU 1b90 Verify: sig = 00000000 30 44 02 20 5b 5f 71 aa fc cf 80 3b db ae e2 b2 |0D. [_q....;....| +00000010 68 8b a1 8c 4a 99 0a f9 48 80 d5 15 3e 2e 4f 84 |h...J...H...>.O.| +00000020 86 aa d1 a0 02 20 34 b6 2b ff 5f 55 74 08 13 e6 |..... 4.+._Ut...| +00000030 8d f1 eb a0 e8 83 e1 fe 7c 3f 35 02 ab 30 ef 55 |........|?5..0.U| +00000040 66 88 19 a7 b8 d9 |f.....|" +"2019-07-20 02:40:50.602 UTC [cauthdsl] func2 -> DEBU 1b91 0xc000416ad0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.603 UTC [cauthdsl] func1 -> DEBU 1b92 0xc000416ad0 gate 1563590450601392800 evaluation succeeds" +"2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.603 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b95 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b97 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.604 UTC [policies] Evaluate -> DEBU 1b98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.604 UTC [common.deliver] deliverBlocks -> DEBU 1b99 [channel: testchainid] Received seekInfo (0xc000986440) start: > stop: > from 172.18.0.9:39296" +"2019-07-20 02:40:50.605 UTC [fsblkstorage] Next -> DEBU 1b9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:50.605 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:50.605 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9c Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9d Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:50.606 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b9e blockbytes [25832] read from file [0]" +"2019-07-20 02:40:50.606 UTC [common.deliver] deliverBlocks -> DEBU 1b9f [channel: testchainid] Delivering block for (0xc000986440) for 172.18.0.9:39296" +"2019-07-20 02:40:50.607 UTC [common.deliver] deliverBlocks -> DEBU 1ba0 [channel: testchainid] Done delivering to 172.18.0.9:39296 for (0xc000986440)" +"2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba1 Waiting for new SeekInfo from 172.18.0.9:39296" +"2019-07-20 02:40:50.608 UTC [common.deliver] Handle -> DEBU 1ba2 Attempting to read seek info message from 172.18.0.9:39296" +"2019-07-20 02:40:50.612 UTC [grpc] warningf -> DEBU 1ba3 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.9:39296: read: connection reset by peer" +"2019-07-20 02:40:50.613 UTC [common.deliver] Handle -> WARN 1ba4 Error reading from 172.18.0.9:39296: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.613 UTC [orderer.common.server] func1 -> DEBU 1ba5 Closing Deliver stream" +"2019-07-20 02:40:50.613 UTC [comm.grpc.server] 1 -> INFO 1ba6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39296 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0914ms +"2019-07-20 02:40:50.614 UTC [grpc] infof -> DEBU 1ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-07-20 02:40:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba9 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +"2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1baa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.1µs " +"2019-07-20 02:40:50.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.5µs " +"2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bac Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:50.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bad Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:50.737 UTC [orderer.common.server] Deliver -> DEBU 1bae Starting new Deliver handler" +"2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1baf Starting new deliver loop for 172.18.0.9:39298" +"2019-07-20 02:40:50.737 UTC [common.deliver] Handle -> DEBU 1bb0 Attempting to read seek info message from 172.18.0.9:39298" +"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.738 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.739 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000c72da0 gate 1563590450739121400 evaluation starts" +"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000c72da0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000c72da0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.739 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000c72da0 principal matched by identity 0" +"2019-07-20 02:40:50.739 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 0a 85 05 b7 b3 00 17 04 99 c7 db af d2 c3 fa 54 |...............T| +00000010 fb e6 80 c8 ad 25 fd 29 1b 75 cd 1f 1a 28 6b 5c |.....%.).u...(k\|" +"2019-07-20 02:40:50.740 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 44 02 20 76 30 8c 8a 34 aa cc 19 da a5 39 84 |0D. v0..4.....9.| +00000010 6f b6 91 5d 30 19 1c e3 79 62 1d b3 c8 4f 17 fe |o..]0...yb...O..| +00000020 bd 35 7f a0 02 20 3e 11 e1 63 74 50 df e6 34 0a |.5... >..ctP..4.| +00000030 28 7f 32 7f ee 06 3b 84 5e 93 73 d7 11 bd da 30 |(.2...;.^.s....0| +00000040 2c 92 62 a0 ec bc |,.b...|" +"2019-07-20 02:40:50.740 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000c72da0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.740 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000c72da0 gate 1563590450739121400 evaluation succeeds" +"2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.740 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.741 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.742 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.742 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: testchainid] Received seekInfo (0xc000b09b40) start: > stop: > from 172.18.0.9:39298" +"2019-07-20 02:40:50.742 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:50.742 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:50.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [25832] read from file [0]" +"2019-07-20 02:40:50.743 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: testchainid] Delivering block for (0xc000b09b40) for 172.18.0.9:39298" +"2019-07-20 02:40:50.744 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000b09b40)" +"2019-07-20 02:40:50.744 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 172.18.0.9:39298" +"2019-07-20 02:40:50.745 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 172.18.0.9:39298" +"2019-07-20 02:40:50.747 UTC [policies] Evaluate -> DEBU 1bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.748 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.749 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc000bad5a0 gate 1563590450749082200 evaluation starts" +"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc000bad5a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc000bad5a0 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.749 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000bad5a0 principal matched by identity 0" +"2019-07-20 02:40:50.749 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 24 51 1f a6 fb 56 50 01 c8 df 3b 5d b8 cd bc 4a |$Q...VP...;]...J| +00000010 39 ed 4d b5 2d ef 5f 2f 5c 7f 3e 53 e0 d5 57 40 |9.M.-._/\.>S..W@|" +"2019-07-20 02:40:50.750 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 45 02 21 00 f6 d1 cd 4c cc bc 03 bc 7d 3b 55 |0E.!....L....};U| +00000010 04 a9 aa 70 45 43 74 f5 8a 5e af 01 fa 0e 60 4e |...pECt..^....`N| +00000020 d3 bc c0 90 c7 02 20 2d d3 23 31 73 65 16 d9 6d |...... -.#1se..m| +00000030 f6 da 22 90 64 ee d6 00 b2 bf 3b 9f 6b 12 59 73 |..".d.....;.k.Ys| +00000040 97 36 5e 6c 8e fb 12 |.6^l...|" +"2019-07-20 02:40:50.750 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000bad5a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.750 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000bad5a0 gate 1563590450749082200 evaluation succeeds" +"2019-07-20 02:40:50.750 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1bdf Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.751 UTC [policies] Evaluate -> DEBU 1be0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.752 UTC [common.deliver] deliverBlocks -> DEBU 1be1 [channel: testchainid] Received seekInfo (0xc000986b00) start: > stop: > from 172.18.0.9:39298" +"2019-07-20 02:40:50.752 UTC [fsblkstorage] Next -> DEBU 1be2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:50.752 UTC [fsblkstorage] newBlockfileStream -> DEBU 1be3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be4 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-07-20 02:40:50.752 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be5 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:50.753 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1be6 blockbytes [18416] read from file [0]" +"2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be7 [channel: testchainid] Delivering block for (0xc000986b00) for 172.18.0.9:39298" +"2019-07-20 02:40:50.754 UTC [common.deliver] deliverBlocks -> DEBU 1be8 [channel: testchainid] Done delivering to 172.18.0.9:39298 for (0xc000986b00)" +"2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1be9 Waiting for new SeekInfo from 172.18.0.9:39298" +"2019-07-20 02:40:50.754 UTC [common.deliver] Handle -> DEBU 1bea Attempting to read seek info message from 172.18.0.9:39298" +"2019-07-20 02:40:50.761 UTC [common.deliver] Handle -> WARN 1beb Error reading from 172.18.0.9:39298: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.761 UTC [orderer.common.server] func1 -> DEBU 1bec Closing Deliver stream" +"2019-07-20 02:40:50.761 UTC [comm.grpc.server] 1 -> INFO 1bed streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39298 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.7807ms +"2019-07-20 02:40:50.762 UTC [grpc] infof -> DEBU 1bee transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.852 UTC [orderer.common.server] Deliver -> DEBU 1bef Starting new Deliver handler" +"2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf0 Starting new deliver loop for 172.18.0.9:39300" +"2019-07-20 02:40:50.853 UTC [common.deliver] Handle -> DEBU 1bf1 Attempting to read seek info message from 172.18.0.9:39300" +"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.853 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:50.854 UTC [policies] Evaluate -> DEBU 1bf6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:50.854 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc0001c8150 gate 1563590450854258500 evaluation starts" +"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0001c8150 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0001c8150 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:50.854 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0001c8150 principal matched by identity 0" +"2019-07-20 02:40:50.854 UTC [msp.identity] Verify -> DEBU 1bfb Verify: digest = 00000000 5f 0c 1b 58 f8 c4 de 8f 3c ff 81 9e cb f7 02 e0 |_..X....<.......| +00000010 72 2e bd 2a 6e 32 fe 5a 5a 13 92 3c 69 3f 43 26 |r..*n2.ZZ.. DEBU 1bfc Verify: sig = 00000000 30 45 02 21 00 a4 ea 63 e2 8a c8 03 41 c9 75 59 |0E.!...c....A.uY| +00000010 dc 1c df 93 8b 21 60 2c f7 37 e1 df ae b8 e4 52 |.....!`,.7.....R| +00000020 8a f4 c7 ba 44 02 20 7a 7c 9d 5b 85 fa d6 86 57 |....D. z|.[....W| +00000030 0f 89 8e c0 86 35 4d 32 04 29 5d 28 3b 7c f4 06 |.....5M2.)](;|..| +00000040 71 52 90 03 1d 86 9b |qR.....|" +"2019-07-20 02:40:50.855 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0001c8150 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:50.855 UTC [cauthdsl] func1 -> DEBU 1bfe 0xc0001c8150 gate 1563590450854258500 evaluation succeeds" +"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:50.855 UTC [policies] Evaluate -> DEBU 1c03 Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:50.856 UTC [policies] Evaluate -> DEBU 1c04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:50.856 UTC [common.deliver] deliverBlocks -> DEBU 1c05 [channel: testchainid] Received seekInfo (0xc000ce2280) start: > stop: > from 172.18.0.9:39300" +"2019-07-20 02:40:50.856 UTC [fsblkstorage] Next -> DEBU 1c06 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:50.856 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 Remaining bytes=[44254], Going to peek [8] bytes" +"2019-07-20 02:40:50.856 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c09 Returning blockbytes - length=[18416], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-07-20 02:40:50.857 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c0a blockbytes [18416] read from file [0]" +"2019-07-20 02:40:50.857 UTC [common.deliver] deliverBlocks -> DEBU 1c0b [channel: testchainid] Delivering block for (0xc000ce2280) for 172.18.0.9:39300" +"2019-07-20 02:40:50.858 UTC [common.deliver] deliverBlocks -> DEBU 1c0c [channel: testchainid] Done delivering to 172.18.0.9:39300 for (0xc000ce2280)" +"2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.9:39300" +"2019-07-20 02:40:50.858 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.9:39300" +"2019-07-20 02:40:50.866 UTC [common.deliver] Handle -> WARN 1c0f Error reading from 172.18.0.9:39300: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:50.866 UTC [orderer.common.server] func1 -> DEBU 1c10 Closing Deliver stream" +"2019-07-20 02:40:50.866 UTC [comm.grpc.server] 1 -> INFO 1c11 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39300 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8498ms +"2019-07-20 02:40:50.867 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:50.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c13 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:50.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c14 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-07-20 02:40:50.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.4µs " +"2019-07-20 02:40:51.035 UTC [orderer.common.server] Deliver -> DEBU 1c16 Starting new Deliver handler" +"2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c17 Starting new deliver loop for 172.18.0.9:39302" +"2019-07-20 02:40:51.035 UTC [common.deliver] Handle -> DEBU 1c18 Attempting to read seek info message from 172.18.0.9:39302" +"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-07-20 02:40:51.036 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:51.037 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-07-20 02:40:51.037 UTC [cauthdsl] func1 -> DEBU 1c1e 0xc000373230 gate 1563590451037212400 evaluation starts" +"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc000373230 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c20 0xc000373230 processing identity 0 with bytes of fd0280" +"2019-07-20 02:40:51.037 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000373230 principal matched by identity 0" +"2019-07-20 02:40:51.037 UTC [msp.identity] Verify -> DEBU 1c22 Verify: digest = 00000000 ec 0b 12 ab db e7 5a c0 3b 3a 4e 1d 14 80 ee 96 |......Z.;:N.....| +00000010 ec c8 cd 83 92 dd 48 1f a3 8f f4 e2 62 c9 83 30 |......H.....b..0|" +"2019-07-20 02:40:51.038 UTC [msp.identity] Verify -> DEBU 1c23 Verify: sig = 00000000 30 45 02 21 00 cf ad e9 8e 60 13 07 9a cb 59 40 |0E.!.....`....Y@| +00000010 ce 5a 42 f8 df 96 f6 5f b3 a6 76 32 77 dd 56 db |.ZB...._..v2w.V.| +00000020 ac 94 17 4c 1b 02 20 1e 45 13 53 e0 a6 7e 1d 55 |...L.. .E.S..~.U| +00000030 65 3d 08 38 dd 63 ff b1 e8 a3 1a 7c 58 52 1a 25 |e=.8.c.....|XR.%| +00000040 14 16 ee 56 dc fd 44 |...V..D|" +"2019-07-20 02:40:51.038 UTC [cauthdsl] func2 -> DEBU 1c24 0xc000373230 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:51.038 UTC [cauthdsl] func1 -> DEBU 1c25 0xc000373230 gate 1563590451037212400 evaluation succeeds" +"2019-07-20 02:40:51.038 UTC [policies] Evaluate -> DEBU 1c26 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-07-20 02:40:51.039 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Readers" +"2019-07-20 02:40:51.040 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-07-20 02:40:51.040 UTC [common.deliver] deliverBlocks -> DEBU 1c2c [channel: testchainid] Received seekInfo (0xc000ce2c40) start: > stop: > from 172.18.0.9:39302" +"2019-07-20 02:40:51.041 UTC [fsblkstorage] Next -> DEBU 1c2d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-07-20 02:40:51.041 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c2e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18419]" +"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c2f Remaining bytes=[25835], Going to peek [8] bytes" +"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c30 Returning blockbytes - length=[25832], placementInfo={fileNum=[0], startOffset=[18419], bytesOffset=[18422]}" +"2019-07-20 02:40:51.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c31 blockbytes [25832] read from file [0]" +"2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c32 [channel: testchainid] Delivering block for (0xc000ce2c40) for 172.18.0.9:39302" +"2019-07-20 02:40:51.043 UTC [common.deliver] deliverBlocks -> DEBU 1c33 [channel: testchainid] Done delivering to 172.18.0.9:39302 for (0xc000ce2c40)" +"2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c34 Waiting for new SeekInfo from 172.18.0.9:39302" +"2019-07-20 02:40:51.044 UTC [common.deliver] Handle -> DEBU 1c35 Attempting to read seek info message from 172.18.0.9:39302" +"2019-07-20 02:40:51.050 UTC [common.deliver] Handle -> WARN 1c36 Error reading from 172.18.0.9:39302: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:51.050 UTC [orderer.common.server] func1 -> DEBU 1c37 Closing Deliver stream" +"2019-07-20 02:40:51.051 UTC [comm.grpc.server] 1 -> INFO 1c38 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39302 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9191ms +"2019-07-20 02:40:51.052 UTC [grpc] infof -> DEBU 1c39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3a Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-07-20 02:40:51.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c3b Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " +"2019-07-20 02:40:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " +"2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3e Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:51.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:51.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c40 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:51.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c41 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2019-07-20 02:40:51.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.1µs " +"2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c43 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2019-07-20 02:40:51.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +"2019-07-20 02:40:51.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.4µs " +"2019-07-20 02:40:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c47 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:51.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c48 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c49 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:51.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4a Sending msg of 28 bytes to 3 on channel testchainid took 10.6µs" +"2019-07-20 02:40:51.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +"2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4c Sending msg of 28 bytes to 2 on channel businesschannel took 36.4µs" +"2019-07-20 02:40:52.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4d Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-07-20 02:40:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 395.2µs " +"2019-07-20 02:40:52.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3487ms " +"2019-07-20 02:40:52.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c50 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:52.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c51 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:52.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:52.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c53 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-07-20 02:40:52.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.5µs " +"2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c55 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-07-20 02:40:52.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c56 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-07-20 02:40:52.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.8µs " +"2019-07-20 02:40:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.8µs " +"2019-07-20 02:40:52.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c59 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:52.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5a Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:52.937 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c5b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:52.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5c Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2019-07-20 02:40:52.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " +"2019-07-20 02:40:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5e Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2019-07-20 02:40:53.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c5f Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +"2019-07-20 02:40:53.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.4µs " +"2019-07-20 02:40:53.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c61 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:53.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.5291ms " +"2019-07-20 02:40:53.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c63 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:53.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c64 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:53.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c65 Sending msg of 28 bytes to 3 on channel testchainid took 740µs" +"2019-07-20 02:40:53.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.1µs " +"2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c67 Sending msg of 28 bytes to 2 on channel businesschannel took 37.2µs" +"2019-07-20 02:40:53.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c68 Sending msg of 28 bytes to 3 on channel businesschannel took 26.4µs" +"2019-07-20 02:40:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 225µs " +"2019-07-20 02:40:53.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.8µs " +"2019-07-20 02:40:53.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6b Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:53.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6c Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c6d Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:53.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c6e Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2019-07-20 02:40:53.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " +"2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c70 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +"2019-07-20 02:40:54.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c71 Sending msg of 28 bytes to 3 on channel businesschannel took 19.9µs" +"2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " +"2019-07-20 02:40:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.3µs " +"2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c74 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:54.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c75 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c76 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:54.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c77 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2019-07-20 02:40:54.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +"2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-07-20 02:40:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c7a Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-07-20 02:40:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 36.8µs " +"2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7d Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:54.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7e Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:54.935 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2019-07-20 02:40:54.935 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.5µs " +"2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c82 Sending msg of 28 bytes to 3 on channel businesschannel took 20.3µs" +"2019-07-20 02:40:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c83 Sending msg of 28 bytes to 2 on channel businesschannel took 10.9µs" +"2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " +"2019-07-20 02:40:55.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " +"2019-07-20 02:40:55.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c86 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:55.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c87 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c88 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:55.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c89 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-07-20 02:40:55.435 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +"2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8b Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-07-20 02:40:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c8c Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +"2019-07-20 02:40:55.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +"2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c8f Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:55.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c90 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:55.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c91 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:55.937 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c92 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2019-07-20 02:40:55.937 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " +"2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c94 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2019-07-20 02:40:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c95 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +"2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2019-07-20 02:40:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.7µs " +"2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c98 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:56.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c99 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:56.437 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9a Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:56.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.1µs " +"2019-07-20 02:40:56.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2019-07-20 02:40:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9d Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" +"2019-07-20 02:40:56.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9e Sending msg of 28 bytes to 3 on channel businesschannel took 47.3µs" +"2019-07-20 02:40:56.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 481.9µs " +"2019-07-20 02:40:56.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.7µs " +"2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:56.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:56.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca4 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2019-07-20 02:40:56.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.9µs " +"2019-07-20 02:40:57.197 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-07-20 02:40:57.198 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +"2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.3µs " +"2019-07-20 02:40:57.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.4µs " +"2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caa Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:57.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cab Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:57.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:57.437 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cad Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2019-07-20 02:40:57.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +"2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2019-07-20 02:40:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb0 Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.1µs " +"2019-07-20 02:40:57.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " +"2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb3 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:57.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:57.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb6 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2019-07-20 02:40:57.936 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.5µs " +"2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-07-20 02:40:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 61.8µs" +"2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +"2019-07-20 02:40:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192µs " +"2019-07-20 02:40:58.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbc Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:58.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:58.436 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:58.436 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbf Sending msg of 28 bytes to 3 on channel testchainid took 39.8µs" +"2019-07-20 02:40:58.437 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 347.1µs " +"2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +"2019-07-20 02:40:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 20.5µs" +"2019-07-20 02:40:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +"2019-07-20 02:40:58.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 535.4µs " +"2019-07-20 02:40:58.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc5 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:58.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc6 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:58.936 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:58.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc8 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-07-20 02:40:58.938 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3711ms " +"2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +"2019-07-20 02:40:59.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccb Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.2µs " +"2019-07-20 02:40:59.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +"2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cce Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:59.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ccf Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:59.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:59.435 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.6µs" +"2019-07-20 02:40:59.436 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +"2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-07-20 02:40:59.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd4 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +"2019-07-20 02:40:59.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.5µs " +"2019-07-20 02:40:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3069ms " +"2019-07-20 02:40:59.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:59.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd8 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:40:59.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:40:59.936 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cda Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2019-07-20 02:40:59.939 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0973ms " +"2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +"2019-07-20 02:41:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdd Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-07-20 02:41:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2019-07-20 02:41:00.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 43.5µs " +"2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce0 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:00.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce1 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:41:00.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce3 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2019-07-20 02:41:00.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +"2019-07-20 02:41:00.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 156.7µs" +"2019-07-20 02:41:00.660 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 279.6µs " +"2019-07-20 02:41:00.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce7 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:00.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.8µs " +"2019-07-20 02:41:00.662 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 3 on channel businesschannel took 769.5µs" +"2019-07-20 02:41:00.674 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cea Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:00.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:41:00.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cec Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-07-20 02:41:00.904 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.032ms " +"2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-07-20 02:41:01.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cef Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" +"2019-07-20 02:41:01.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +"2019-07-20 02:41:01.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.7µs " +"2019-07-20 02:41:01.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf2 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:01.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf3 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:01.401 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:41:01.402 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf5 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2019-07-20 02:41:01.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " +"2019-07-20 02:41:01.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +"2019-07-20 02:41:01.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf8 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " +"2019-07-20 02:41:01.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfb Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:01.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfc Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:01.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:41:01.902 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfe Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2019-07-20 02:41:01.902 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.1µs " +"2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d00 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-07-20 02:41:02.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel businesschannel took 7µs" +"2019-07-20 02:41:02.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66µs " +"2019-07-20 02:41:02.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.9µs " +"2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d04 Received message from orderer1.example.com(172.18.0.3:47792): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:02.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d05 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-07-20 02:41:02.403 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.4:54782): ConsensusRequest for channel testchainid with payload of size 28" +"2019-07-20 02:41:02.404 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d07 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2019-07-20 02:41:02.404 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.7µs " diff --git a/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log new file mode 100644 index 00000000..f56f9d99 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/raft/logs/dev_peer0.log @@ -0,0 +1,23269 @@ +"2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +"2019-07-20 02:39:31.745 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" +"2019-07-20 02:39:31.746 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-07-20 02:39:31.746 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +"2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" +"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" +"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +"2019-07-20 02:39:31.747 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +"2019-07-20 02:39:31.747 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" +"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Library setting to " +"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.748 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Label setting to " +"2019-07-20 02:39:31.748 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Pin setting to " +"2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Hash setting to " +"2019-07-20 02:39:31.749 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.749 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Security setting to " +"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +"2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +"2019-07-20 02:39:31.750 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-07-20 02:39:31.750 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" +"2019-07-20 02:39:31.750 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +"2019-07-20 02:39:31.770 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +"2019-07-20 02:39:31.770 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +"2019-07-20 02:39:31.770 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +"2019-07-20 02:39:31.784 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +"2019-07-20 02:39:31.791 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +"2019-07-20 02:39:31.807 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +"2019-07-20 02:39:31.811 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +"2019-07-20 02:39:31.815 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +"2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +"2019-07-20 02:39:31.819 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +"2019-07-20 02:39:31.819 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +"2019-07-20 02:39:31.823 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +"2019-07-20 02:39:31.826 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +"2019-07-20 02:39:31.828 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +"2019-07-20 02:39:31.828 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +"2019-07-20 02:39:31.830 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +"2019-07-20 02:39:31.834 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +"2019-07-20 02:39:31.840 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +"2019-07-20 02:39:31.841 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +"2019-07-20 02:39:31.841 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +"2019-07-20 02:39:31.841 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:31.841 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-07-20 02:39:31.845 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +"2019-07-20 02:39:31.850 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-07-20 02:39:31.850 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-07-20 02:39:31.850 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +"2019-07-20 02:39:31.850 UTC [nodeCmd] serve -> INFO 037 Starting peer: + Version: 1.4.2 + Commit SHA: development build + Go version: go1.12.7 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.15 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-07-20 02:39:31.851 UTC [msp] GetDefaultSigningIdentity -> DEBU 038 Obtaining default signing identity" +"2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 039 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-07-20 02:39:31.851 UTC [msp.identity] Sign -> DEBU 03a Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-07-20 02:39:31.852 UTC [ledgermgmt] initialize -> INFO 03b Initializing ledger mgmt" +"2019-07-20 02:39:31.852 UTC [kvledger] NewProvider -> INFO 03c Initializing ledger provider" +"2019-07-20 02:39:31.852 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03d CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +"2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03e Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +"2019-07-20 02:39:31.852 UTC [kvledger.util] logDirStatus -> DEBU 03f After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +"2019-07-20 02:39:31.889 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 040 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +"2019-07-20 02:39:31.889 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +"2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +"2019-07-20 02:39:31.889 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +"2019-07-20 02:39:31.921 UTC [kvledger.util] CreateDirIfMissing -> DEBU 044 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +"2019-07-20 02:39:31.922 UTC [kvledger.util] logDirStatus -> DEBU 045 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +"2019-07-20 02:39:31.923 UTC [kvledger.util] logDirStatus -> DEBU 046 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +"2019-07-20 02:39:31.983 UTC [kvledger] NewProvider -> INFO 047 ledger provider Initialized" +"2019-07-20 02:39:31.984 UTC [confighistory] newDBProvider -> DEBU 048 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +"2019-07-20 02:39:31.984 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +"2019-07-20 02:39:31.984 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +"2019-07-20 02:39:31.985 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +"2019-07-20 02:39:32.009 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +"2019-07-20 02:39:32.009 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +"2019-07-20 02:39:32.010 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +"2019-07-20 02:39:32.035 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +"2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +"2019-07-20 02:39:32.035 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +"2019-07-20 02:39:32.055 UTC [kvledger.util] CreateDirIfMissing -> DEBU 052 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +"2019-07-20 02:39:32.055 UTC [kvledger.util] logDirStatus -> DEBU 053 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +"2019-07-20 02:39:32.057 UTC [kvledger.util] logDirStatus -> DEBU 054 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +"2019-07-20 02:39:32.080 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 055 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +"2019-07-20 02:39:32.080 UTC [kvledger.util] CreateDirIfMissing -> DEBU 056 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +"2019-07-20 02:39:32.080 UTC [kvledger.util] logDirStatus -> DEBU 057 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +"2019-07-20 02:39:32.081 UTC [kvledger.util] logDirStatus -> DEBU 058 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +"2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 Recovering under construction ledger" +"2019-07-20 02:39:32.093 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 05a No under construction ledger found. Quitting recovery" +"2019-07-20 02:39:32.093 UTC [ledgermgmt] initialize -> INFO 05b ledger mgmt initialized" +"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05c Auto-detected peer address: 172.18.0.5:7051" +"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05d Returning peer0.org1.example.com:7051" +"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05e Auto-detected peer address: 172.18.0.5:7051" +"2019-07-20 02:39:32.094 UTC [peer] func1 -> INFO 05f Returning peer0.org1.example.com:7051" +"2019-07-20 02:39:32.117 UTC [nodeCmd] serve -> INFO 060 Starting peer with TLS enabled" +"2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 061 Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-07-20 02:39:32.175 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 062 Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-07-20 02:39:32.200 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: lscc-1.4.2" +"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 064 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: cscc-1.4.2" +"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 066 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-07-20 02:39:32.201 UTC [inproccontroller] Register -> DEBU 067 Registering chaincode instance: qscc-1.4.2" +"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 068 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-07-20 02:39:32.201 UTC [sccapi] registerSysCC -> INFO 069 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +"2019-07-20 02:39:32.201 UTC [nodeCmd] serve -> DEBU 06a Running peer" +"2019-07-20 02:39:32.202 UTC [msp] GetDefaultSigningIdentity -> DEBU 06b Obtaining default signing identity" +"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for peer.handlers" +"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06d Found map[string]interface{} value for peer.handlers.validators" +"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 06e Found map[string]interface{} value for peer.handlers.validators.vscc" +"2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-07-20 02:39:32.202 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +"2019-07-20 02:39:32.202 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for peer.handlers.validators.vscc.library setting to " +"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[string]interface{} value for peer.handlers.endorsers" +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[string]interface{} value for peer.handlers.endorsers.escc" +"2019-07-20 02:39:32.203 UTC [viperutil] unmarshalJSON -> DEBU 079 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-07-20 02:39:32.203 UTC [viperutil] getKeysRecursively -> DEBU 07a Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +"2019-07-20 02:39:32.204 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: " +"2019-07-20 02:39:32.204 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for peer.handlers.endorsers.escc.library setting to " +"2019-07-20 02:39:32.204 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07d map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +"2019-07-20 02:39:32.218 UTC [gossip.service] func1 -> INFO 07e Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-07-20 02:39:32.257 UTC [msp] DeserializeIdentity -> DEBU 07f Obtaining identity" +"2019-07-20 02:39:32.258 UTC [msp.identity] newIdentity -> DEBU 080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-07-20 02:39:32.258 UTC [msp] Validate -> DEBU 081 MSP Org1MSP validating identity" +"2019-07-20 02:39:32.259 UTC [gossip.gossip] NewGossipService -> INFO 082 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-07-20 02:39:32.259 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" +"2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:32.259 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +"2019-07-20 02:39:32.259 UTC [gossip.pull] Add -> DEBU 086 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +"2019-07-20 02:39:32.259 UTC [chaincode] LaunchConfig -> DEBU 087 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 088 start container: lscc:1.4.2" +"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 089 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-07-20 02:39:32.259 UTC [chaincode] Start -> DEBU 08a start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.2 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08b waiting for container(lscc-1.4.2) lock" +"2019-07-20 02:39:32.259 UTC [container] lockContainer -> DEBU 08c got container (lscc-1.4.2) lock" +"2019-07-20 02:39:32.259 UTC [inproccontroller] getInstance -> DEBU 08d chaincode instance created for lscc-1.4.2" +"2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 08e container lock deleted(lscc-1.4.2)" +"2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 08f waiting for container(lscc-1.4.2) lock" +"2019-07-20 02:39:32.260 UTC [container] lockContainer -> DEBU 090 got container (lscc-1.4.2) lock" +"2019-07-20 02:39:32.260 UTC [container] unlockContainer -> DEBU 091 container lock deleted(lscc-1.4.2)" +"2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU 092 Sleeping 5s" +"2019-07-20 02:39:32.260 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 093 Sleeping 25s" +"2019-07-20 02:39:32.260 UTC [gossip.gossip] start -> INFO 094 Gossip instance peer0.org1.example.com:7051 started" +"2019-07-20 02:39:32.260 UTC [gossip.discovery] Connect -> DEBU 095 Skipping connecting to myself" +"2019-07-20 02:39:32.260 UTC [inproccontroller] func2 -> DEBU 096 chaincode-support started for lscc-1.4.2" +"2019-07-20 02:39:32.260 UTC [gossip.gossip] syncDiscovery -> DEBU 097 Entering discovery sync with interval 4s" +"2019-07-20 02:39:32.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 098 Obtaining default signing identity" +"2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 099 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:32.260 UTC [msp.identity] Sign -> DEBU 09a Sign: digest: 7E3C77047CA93B8C7F731924D75623F5C661C7730339FC5CC4407511CEC80F44 " +"2019-07-20 02:39:32.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 09b Obtaining default signing identity" +"2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:32.261 UTC [msp.identity] Sign -> DEBU 09d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:32.261 UTC [inproccontroller] func1 -> DEBU 09e chaincode started for lscc-1.4.2" +"2019-07-20 02:39:32.261 UTC [chaincode] handleMessage -> DEBU 09f [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a0 Received REGISTER in state created" +"2019-07-20 02:39:32.264 UTC [chaincode] Register -> DEBU 0a1 registered handler complete for chaincode lscc:1.4.2" +"2019-07-20 02:39:32.264 UTC [chaincode] HandleRegister -> DEBU 0a2 Got REGISTER for chaincodeID = name:"lscc:1.4.2" , sending back REGISTERED" +"2019-07-20 02:39:32.265 UTC [chaincode] HandleRegister -> DEBU 0a3 Changed state to established for name:"lscc:1.4.2" " +"2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a4 sending READY for chaincode name:"lscc:1.4.2" " +"2019-07-20 02:39:32.265 UTC [chaincode] sendReady -> DEBU 0a5 Changed to state ready for chaincode name:"lscc:1.4.2" " +"2019-07-20 02:39:32.266 UTC [chaincode] Launch -> DEBU 0a6 launch complete" +"2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0a7 Entry" +"2019-07-20 02:39:32.266 UTC [chaincode] handleMessage -> DEBU 0a8 [dbe52f5c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:32.266 UTC [chaincode] Notify -> DEBU 0a9 [dbe52f5c] notifying Txid:dbe52f5c-537d-44e1-816c-4dfa64df5df7, channelID:" +"2019-07-20 02:39:32.266 UTC [chaincode] Execute -> DEBU 0aa Exit" +"2019-07-20 02:39:32.267 UTC [sccapi] deploySysCC -> INFO 0ab system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-07-20 02:39:32.268 UTC [chaincode] LaunchConfig -> DEBU 0ac launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ad start container: cscc:1.4.2" +"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0ae start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-07-20 02:39:32.268 UTC [chaincode] Start -> DEBU 0af start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.2 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b0 waiting for container(cscc-1.4.2) lock" +"2019-07-20 02:39:32.268 UTC [container] lockContainer -> DEBU 0b1 got container (cscc-1.4.2) lock" +"2019-07-20 02:39:32.269 UTC [inproccontroller] getInstance -> DEBU 0b2 chaincode instance created for cscc-1.4.2" +"2019-07-20 02:39:32.269 UTC [container] unlockContainer -> DEBU 0b3 container lock deleted(cscc-1.4.2)" +"2019-07-20 02:39:32.269 UTC [container] lockContainer -> DEBU 0b4 waiting for container(cscc-1.4.2) lock" +"2019-07-20 02:39:32.270 UTC [container] lockContainer -> DEBU 0b5 got container (cscc-1.4.2) lock" +"2019-07-20 02:39:32.270 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc-1.4.2)" +"2019-07-20 02:39:32.270 UTC [inproccontroller] func2 -> DEBU 0b7 chaincode-support started for cscc-1.4.2" +"2019-07-20 02:39:32.270 UTC [inproccontroller] func1 -> DEBU 0b8 chaincode started for cscc-1.4.2" +"2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0b9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0ba Received REGISTER in state created" +"2019-07-20 02:39:32.270 UTC [chaincode] Register -> DEBU 0bb registered handler complete for chaincode cscc:1.4.2" +"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bc Got REGISTER for chaincodeID = name:"cscc:1.4.2" , sending back REGISTERED" +"2019-07-20 02:39:32.270 UTC [chaincode] HandleRegister -> DEBU 0bd Changed state to established for name:"cscc:1.4.2" " +"2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0be sending READY for chaincode name:"cscc:1.4.2" " +"2019-07-20 02:39:32.270 UTC [chaincode] sendReady -> DEBU 0bf Changed to state ready for chaincode name:"cscc:1.4.2" " +"2019-07-20 02:39:32.270 UTC [chaincode] Launch -> DEBU 0c0 launch complete" +"2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c1 Entry" +"2019-07-20 02:39:32.270 UTC [cscc] Init -> INFO 0c2 Init CSCC" +"2019-07-20 02:39:32.270 UTC [chaincode] handleMessage -> DEBU 0c3 [dd4774bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:32.270 UTC [chaincode] Notify -> DEBU 0c4 [dd4774bb] notifying Txid:dd4774bb-4464-4743-9294-61e3823b8baa, channelID:" +"2019-07-20 02:39:32.270 UTC [chaincode] Execute -> DEBU 0c5 Exit" +"2019-07-20 02:39:32.271 UTC [sccapi] deploySysCC -> INFO 0c6 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-07-20 02:39:32.271 UTC [chaincode] LaunchConfig -> DEBU 0c7 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.2,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c8 start container: qscc:1.4.2" +"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0c9 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-07-20 02:39:32.271 UTC [chaincode] Start -> DEBU 0ca start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.2 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-07-20 02:39:32.271 UTC [container] lockContainer -> DEBU 0cb waiting for container(qscc-1.4.2) lock" +"2019-07-20 02:39:32.272 UTC [container] lockContainer -> DEBU 0cc got container (qscc-1.4.2) lock" +"2019-07-20 02:39:32.274 UTC [inproccontroller] getInstance -> DEBU 0cd chaincode instance created for qscc-1.4.2" +"2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0ce container lock deleted(qscc-1.4.2)" +"2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0cf waiting for container(qscc-1.4.2) lock" +"2019-07-20 02:39:32.274 UTC [container] lockContainer -> DEBU 0d0 got container (qscc-1.4.2) lock" +"2019-07-20 02:39:32.274 UTC [container] unlockContainer -> DEBU 0d1 container lock deleted(qscc-1.4.2)" +"2019-07-20 02:39:32.274 UTC [inproccontroller] func2 -> DEBU 0d2 chaincode-support started for qscc-1.4.2" +"2019-07-20 02:39:32.274 UTC [inproccontroller] func1 -> DEBU 0d3 chaincode started for qscc-1.4.2" +"2019-07-20 02:39:32.274 UTC [chaincode] handleMessage -> DEBU 0d4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-07-20 02:39:32.274 UTC [chaincode] HandleRegister -> DEBU 0d5 Received REGISTER in state created" +"2019-07-20 02:39:32.274 UTC [chaincode] Register -> DEBU 0d6 registered handler complete for chaincode qscc:1.4.2" +"2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d7 Got REGISTER for chaincodeID = name:"qscc:1.4.2" , sending back REGISTERED" +"2019-07-20 02:39:32.275 UTC [chaincode] HandleRegister -> DEBU 0d8 Changed state to established for name:"qscc:1.4.2" " +"2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0d9 sending READY for chaincode name:"qscc:1.4.2" " +"2019-07-20 02:39:32.275 UTC [chaincode] sendReady -> DEBU 0da Changed to state ready for chaincode name:"qscc:1.4.2" " +"2019-07-20 02:39:32.276 UTC [chaincode] Launch -> DEBU 0db launch complete" +"2019-07-20 02:39:32.276 UTC [chaincode] Execute -> DEBU 0dc Entry" +"2019-07-20 02:39:32.278 UTC [qscc] Init -> INFO 0dd Init QSCC" +"2019-07-20 02:39:32.280 UTC [chaincode] handleMessage -> DEBU 0de [e80edd21] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:32.282 UTC [chaincode] Notify -> DEBU 0df [e80edd21] notifying Txid:e80edd21-ca6d-4ff6-8876-1ec3a73be04a, channelID:" +"2019-07-20 02:39:32.282 UTC [chaincode] Execute -> DEBU 0e0 Exit" +"2019-07-20 02:39:32.282 UTC [sccapi] deploySysCC -> INFO 0e1 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-07-20 02:39:32.285 UTC [sccapi] deploySysCC -> INFO 0e2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-07-20 02:39:32.285 UTC [nodeCmd] serve -> INFO 0e3 Deployed system chaincodes" +"2019-07-20 02:39:32.285 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0e4 Returning []" +"2019-07-20 02:39:32.287 UTC [discovery] NewService -> INFO 0e5 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-07-20 02:39:32.288 UTC [nodeCmd] registerDiscoveryService -> INFO 0e6 Discovery service activated" +"2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e7 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-07-20 02:39:32.289 UTC [nodeCmd] serve -> INFO 0e8 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-07-20 02:39:32.297 UTC [kvledger] LoadPreResetHeight -> INFO 0e9 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +"2019-07-20 02:39:32.298 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ea Loading Pre-reset heights" +"2019-07-20 02:39:32.299 UTC [fsblkstorage] preRestHtFiles -> INFO 0eb Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +"2019-07-20 02:39:32.299 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0ec Pre-reset heights loaded" +"2019-07-20 02:39:32.402 UTC [comm.grpc.server] 1 -> INFO 0ed unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.398Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5235ms +"2019-07-20 02:39:32.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ee Obtaining default signing identity" +"2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0ef Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:32.409 UTC [msp.identity] Sign -> DEBU 0f0 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:32.411 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33926" +"2019-07-20 02:39:32.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f2 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33926" +"2019-07-20 02:39:32.413 UTC [msp] DeserializeIdentity -> DEBU 0f3 Obtaining identity" +"2019-07-20 02:39:32.414 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-07-20 02:39:32.416 UTC [msp] Validate -> DEBU 0f5 MSP Org1MSP validating identity" +"2019-07-20 02:39:32.419 UTC [msp.identity] Verify -> DEBU 0f6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:39:32.420 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 62 50 27 ef fd ff 99 f3 fa 9f fb 25 |0D. bP'........%| +00000010 a5 b6 dd 69 14 43 54 dd 2a 89 a8 f7 84 a5 5b 13 |...i.CT.*.....[.| +00000020 cf 71 2b e4 02 20 4f fc b5 89 f4 24 86 29 6b 28 |.q+.. O....$.)k(| +00000030 3a 35 21 ab 22 9e b5 b1 74 3d 09 a4 e6 f7 fc f5 |:5!."...t=......| +00000040 6f 49 7a 82 89 a8 |oIz...|" +"2019-07-20 02:39:32.421 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:33926" +"2019-07-20 02:39:32.422 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:33926" +"2019-07-20 02:39:32.430 UTC [grpc] infof -> DEBU 0fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:32.430 UTC [gossip.comm] readFromStream -> DEBU 0fb Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:32.431 UTC [gossip.comm] func2 -> DEBU 0fc Client 172.18.0.6:33926 disconnected" +"2019-07-20 02:39:32.431 UTC [comm.grpc.server] 1 -> INFO 0fd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:42.407Z grpc.peer_address=172.18.0.6:33926 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.192ms +"2019-07-20 02:39:32.431 UTC [gossip.comm] writeToStream -> DEBU 0fe Closing writing to stream" +"2019-07-20 02:39:32.454 UTC [comm.grpc.server] 1 -> INFO 0ff unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:34.454Z grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197.1µs +"2019-07-20 02:39:32.459 UTC [msp] GetDefaultSigningIdentity -> DEBU 100 Obtaining default signing identity" +"2019-07-20 02:39:32.459 UTC [msp.identity] Sign -> DEBU 101 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:32.460 UTC [msp.identity] Sign -> DEBU 102 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:32.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:33928" +"2019-07-20 02:39:32.461 UTC [gossip.comm] authenticateRemotePeer -> DEBU 104 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33928" +"2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 105 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:39:32.462 UTC [msp.identity] Verify -> DEBU 106 Verify: sig = 00000000 30 45 02 21 00 85 eb 32 2b fe ea 70 97 13 df 66 |0E.!...2+..p...f| +00000010 e9 5c c6 70 13 8f 58 3f 4f 20 49 5a e1 e0 e1 ee |.\.p..X?O IZ....| +00000020 a7 8f cf 97 9f 02 20 4f ba b9 6e f9 d5 5f 68 74 |...... O..n.._ht| +00000030 7e cb 7c 45 6e 42 34 68 ad c6 02 40 62 d9 26 fc |~.|EnB4h...@b.&.| +00000040 b6 09 5f 11 9d 76 7b |.._..v{|" +"2019-07-20 02:39:32.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU 107 Authenticated 172.18.0.6:33928" +"2019-07-20 02:39:32.462 UTC [gossip.comm] GossipStream -> DEBU 108 Servicing 172.18.0.6:33928" +"2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 109 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" +"2019-07-20 02:39:32.472 UTC [gossip.gossip] handleMessage -> DEBU 10a Exiting" +"2019-07-20 02:39:32.473 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b Got message: GossipMessage: nonce:3143746311377972350 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > > , Envelope: 1107 bytes, Signature: 0 bytes" +"2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10c Verify: digest = 00000000 36 0d 2b a0 4d e4 ea 95 4f ef f9 af c3 09 b0 27 |6.+.M...O......'| +00000010 b8 80 33 7f 2b 77 a6 c9 a2 75 9a f0 4e fc 58 d7 |..3.+w...u..N.X.|" +"2019-07-20 02:39:32.477 UTC [msp.identity] Verify -> DEBU 10d Verify: sig = 00000000 30 44 02 20 25 dd d1 a7 26 c2 43 34 f9 e9 31 43 |0D. %...&.C4..1C| +00000010 4f 3b eb 07 56 1b 0a 3f 54 e2 5c 23 68 4d 40 9c |O;..V..?T.\#hM@.| +00000020 41 1a 2d 55 02 20 37 4c b4 f5 a0 c2 d7 29 1f 75 |A.-U. 7L.....).u| +00000030 0c 56 24 ca a0 d1 b4 fe 97 3e 81 41 d5 c0 75 e5 |.V$......>.A..u.| +00000040 f7 38 75 74 19 67 |.8ut.g|" +"2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:32.482 UTC [msp.identity] Verify -> DEBU 10f Verify: sig = 00000000 30 44 02 20 34 36 e8 01 7a 14 85 df a0 47 d9 b9 |0D. 46..z....G..| +00000010 2e 59 03 c5 a1 0a 2c 4c b5 0f f1 1b ca 87 d9 8e |.Y....,L........| +00000020 79 0b c5 47 02 20 3c 8e 2d e4 2f 26 7c 34 f6 8a |y..G. <.-./&|4..| +00000030 0d f0 9e ca d7 64 cd cb f6 6e c3 e5 da df b4 6b |.....d...n.....k| +00000040 e2 10 6f b9 5e 1c |..o.^.|" +"2019-07-20 02:39:32.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 110 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" +"2019-07-20 02:39:32.489 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:32.491 UTC [gossip.discovery] learnNewMembers -> DEBU 113 Exiting" +"2019-07-20 02:39:32.491 UTC [gossip.discovery] handleAliveMessage -> DEBU 114 Exiting" +"2019-07-20 02:39:32.491 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:32.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 116 Exiting" +"2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 117 Obtaining default signing identity" +"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 118 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 119 Sign: digest: EEDAC9CD7ACBCFE46971DB564C2E5AA365F0897976382B04176023690F93A5FB " +"2019-07-20 02:39:32.491 UTC [msp] GetDefaultSigningIdentity -> DEBU 11a Obtaining default signing identity" +"2019-07-20 02:39:32.491 UTC [msp.identity] Sign -> DEBU 11b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:32.492 UTC [msp.identity] Sign -> DEBU 11c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:32.492 UTC [gossip.comm] Send -> DEBU 11d Entering, sending GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:32.492 UTC [gossip.discovery] sendMemResponse -> DEBU 11e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\003\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 %\335\321\247&\302C4\371\3511CO;\353\007V\033\n?T\342\\#hM@\234A\032-U\002 7L\264\365\240\302\327)\037u\014V$\312\240\321\264\376\227>\201A\325\300u\345\3678ut\031g" secret_envelope: > alive:>R\277\2201\255\033\r\002 \005D\200h\362\266?i\207\217q\025\313\330ZC\267\352kq\311\211\343\2617\235\025\000\344\226\210\\" > > " +"2019-07-20 02:39:32.492 UTC [gossip.comm] sendToEndpoint -> DEBU 11f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3143746311377972350, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" +"2019-07-20 02:39:32.493 UTC [gossip.comm] sendToEndpoint -> DEBU 120 Exiting" +"2019-07-20 02:39:36.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 121 Obtaining default signing identity" +"2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 123 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:36.263 UTC [msp.identity] Sign -> DEBU 124 Sign: digest: 211019455ECE33402BE8AD1B57D6700DECF3ACD4ED804612AC12B9E9313E91EB " +"2019-07-20 02:39:36.263 UTC [gossip.pull] Hello -> DEBU 122 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:36.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 125 Obtaining default signing identity" +"2019-07-20 02:39:36.266 UTC [gossip.comm] Send -> DEBU 126 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 127 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.266 UTC [gossip.comm] sendToEndpoint -> DEBU 128 Exiting" +"2019-07-20 02:39:36.267 UTC [msp.identity] Sign -> DEBU 129 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:36.268 UTC [msp.identity] Sign -> DEBU 12b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:36.268 UTC [gossip.gossip] handleMessage -> DEBU 12a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.269 UTC [gossip.pull] HandleMessage -> DEBU 12c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.269 UTC [gossip.gossip] handleMessage -> DEBU 12d Exiting" +"2019-07-20 02:39:36.269 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 12f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1093 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.270 UTC [gossip.comm] sendToEndpoint -> DEBU 130 Exiting" +"2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 131 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.273 UTC [gossip.gossip] handleMessage -> DEBU 132 Exiting" +"2019-07-20 02:39:36.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 133 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.274 UTC [msp.identity] Verify -> DEBU 134 Verify: digest = 00000000 21 10 19 45 5e ce 33 40 2b e8 ad 1b 57 d6 70 0d |!..E^.3@+...W.p.| +00000010 ec f3 ac d4 ed 80 46 12 ac 12 b9 e9 31 3e 91 eb |......F.....1>..|" +"2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 135 Verify: sig = 00000000 30 44 02 20 75 92 f8 13 f9 05 80 6b a6 5a dd 11 |0D. u......k.Z..| +00000010 04 4a 13 44 8c 31 b6 27 0b 7e 7e 52 24 27 16 30 |.J.D.1.'.~~R$'.0| +00000020 78 8c e4 f8 02 20 41 3a 4e a0 89 47 69 8e eb 59 |x.... A:N..Gi..Y| +00000030 02 fd 65 7e bd 0c bb f6 cc 94 6b cb 62 34 e3 66 |..e~......k.b4.f| +00000040 c5 49 92 a5 1b 52 |.I...R|" +"2019-07-20 02:39:36.275 UTC [msp.identity] Verify -> DEBU 136 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:36.276 UTC [msp.identity] Verify -> DEBU 137 Verify: sig = 00000000 30 44 02 20 6b bc 72 89 6c 1d 1d 1b 36 c1 15 b6 |0D. k.r.l...6...| +00000010 39 dd 83 03 86 77 d8 5a 85 54 25 1b ec c7 43 5d |9....w.Z.T%...C]| +00000020 4a 43 70 ae 02 20 68 98 18 0a 06 aa 57 4c 06 4e |JCp.. h.....WL.N| +00000030 f3 68 07 f4 17 45 97 ba 0b 05 b1 8e 1e 90 1b 32 |.h...E.........2| +00000040 d8 78 a6 6c 8a a2 |.x.l..|" +"2019-07-20 02:39:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 138 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:36.276 UTC [gossip.discovery] isSentByMe -> DEBU 139 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a Exiting" +"2019-07-20 02:39:36.277 UTC [msp.identity] Verify -> DEBU 13b Verify: digest = 00000000 4f 90 a0 9f b8 cf 4a 75 20 35 a7 40 01 2b f7 da |O.....Ju 5.@.+..| +00000010 51 a2 5b cf 01 b4 45 67 d4 ec 36 3b 03 e3 bd 45 |Q.[...Eg..6;...E|" +"2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13c Verify: sig = 00000000 30 44 02 20 1d 01 0c 87 a1 38 7c 87 13 7f fd 4b |0D. .....8|....K| +00000010 8c 72 9b 09 e7 23 ad b2 88 dc 88 6c fc 18 64 06 |.r...#.....l..d.| +00000020 af 43 39 ff 02 20 43 8a c1 20 ed 57 fc 47 32 d8 |.C9.. C.. .W.G2.| +00000030 a8 40 a5 66 3d 51 73 45 c6 08 be 29 fe 34 9b f6 |.@.f=QsE...).4..| +00000040 79 bb 9c 1a e1 1e |y.....|" +"2019-07-20 02:39:36.278 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:36.279 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 16 3c 72 12 9c 25 47 ad 46 87 84 11 |0D. . DEBU 13f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 140 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 141 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:36.280 UTC [gossip.discovery] learnExistingMembers -> DEBU 142 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 143 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:36.281 UTC [gossip.discovery] learnExistingMembers -> DEBU 144 Exiting" +"2019-07-20 02:39:36.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 145 Exiting" +"2019-07-20 02:39:36.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146 Exiting" +"2019-07-20 02:39:36.389 UTC [gossip.gossip] handleMessage -> DEBU 147 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.390 UTC [gossip.pull] HandleMessage -> DEBU 148 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.390 UTC [gossip.pull] SendDigest -> DEBU 149 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:36.390 UTC [gossip.gossip] handleMessage -> DEBU 14a Exiting" +"2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14b Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.391 UTC [gossip.gossip] handleMessage -> DEBU 14c Exiting" +"2019-07-20 02:39:36.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.392 UTC [msp.identity] Verify -> DEBU 14e Verify: digest = 00000000 d7 41 d0 00 0d a5 df 97 b5 63 d9 35 cc b1 55 f4 |.A.......c.5..U.| +00000010 50 2f ac 24 ca 99 16 8a 79 65 7c 17 76 7e 64 f6 |P/.$....ye|.v~d.|" +"2019-07-20 02:39:36.393 UTC [msp.identity] Verify -> DEBU 14f Verify: sig = 00000000 30 45 02 21 00 f7 66 84 2f 80 96 e4 11 e9 98 77 |0E.!..f./......w| +00000010 8e dc 64 69 e2 4b be 65 e2 0d 24 39 a7 5b 1d ec |..di.K.e..$9.[..| +00000020 04 5f aa df a0 02 20 6e 2d f4 71 eb e3 2a 02 f4 |._.... n-.q..*..| +00000030 7a 4f b8 24 68 12 75 49 20 31 26 67 e2 28 a8 d3 |zO.$h.uI 1&g.(..| +00000040 b8 d2 40 56 20 e4 8c |..@V ..|" +"2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 150 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:36.394 UTC [msp.identity] Verify -> DEBU 151 Verify: sig = 00000000 30 45 02 21 00 ff ee 1f 07 ad 2c d2 29 08 25 84 |0E.!......,.).%.| +00000010 6b f2 d5 03 e7 45 a6 c6 5a cb e9 ce c2 9d 9b ac |k....E..Z.......| +00000020 7d ef b8 ab 56 02 20 38 dc 65 7f 35 54 a9 03 6f |}...V. 8.e.5T..o| +00000030 e4 7c 93 22 6f a6 0d 11 70 db 3c f4 86 5a f0 18 |.|."o...p.<..Z..| +00000040 bd d4 8f 94 b4 c0 2e |.......|" +"2019-07-20 02:39:36.395 UTC [gossip.discovery] handleAliveMessage -> DEBU 152 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 153 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:39:36.395 UTC [gossip.discovery] learnExistingMembers -> DEBU 154 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 155 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:36.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 156 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:36.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 157 Exiting" +"2019-07-20 02:39:36.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 158 Exiting" +"2019-07-20 02:39:36.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159 Exiting" +"2019-07-20 02:39:36.397 UTC [gossip.discovery] sendMemResponse -> DEBU 15a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:36.398 UTC [msp] GetDefaultSigningIdentity -> DEBU 15b Obtaining default signing identity" +"2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:36.398 UTC [msp.identity] Sign -> DEBU 15d Sign: digest: 9E663365013BAC851079C3A861364AACC5702496BD7AFEF63FF43118C2632810 " +"2019-07-20 02:39:36.399 UTC [msp] GetDefaultSigningIdentity -> DEBU 15e Obtaining default signing identity" +"2019-07-20 02:39:36.399 UTC [msp.identity] Sign -> DEBU 15f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:36.400 UTC [msp.identity] Sign -> DEBU 160 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:36.400 UTC [gossip.comm] Send -> DEBU 161 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 162 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-07-20 02:39:36.400 UTC [gossip.comm] sendToEndpoint -> DEBU 163 Exiting" +"2019-07-20 02:39:36.400 UTC [gossip.discovery] sendMemResponse -> DEBU 164 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\005\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0E\002!\000\367f\204/\200\226\344\021\351\230w\216\334di\342K\276e\342\r$9\247[\035\354\004_\252\337\240\002 n-\364q\353\343*\002\364zO\270$h\022uI 1&g\342(\250\323\270\322@V \344\214" secret_envelope: > alive: > " +"2019-07-20 02:39:37.260 UTC [msp] GetDefaultSigningIdentity -> DEBU 165 Obtaining default signing identity" +"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: 6D019AA9062B5A0ABE1771EDAEB34763445AAA0B5583E7B6A2EE3FD1C6026BF9 " +"2019-07-20 02:39:37.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 168 Obtaining default signing identity" +"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 169 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:37.261 UTC [msp.identity] Sign -> DEBU 16a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:37.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 16b Sleeping 5s" +"2019-07-20 02:39:37.268 UTC [gossip.pull] SendReq -> DEBU 16c Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +"2019-07-20 02:39:37.268 UTC [gossip.comm] Send -> DEBU 16d Entering, sending GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:37.269 UTC [gossip.comm] sendToEndpoint -> DEBU 16f Exiting" +"2019-07-20 02:39:37.270 UTC [gossip.comm] Send -> DEBU 170 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:37.271 UTC [gossip.comm] sendToEndpoint -> DEBU 171 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:37.272 UTC [gossip.comm] sendToEndpoint -> DEBU 172 Exiting" +"2019-07-20 02:39:37.273 UTC [gossip.gossip] handleMessage -> DEBU 173 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" +"2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 174 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +"2019-07-20 02:39:37.274 UTC [msp.identity] Verify -> DEBU 175 Verify: sig = 00000000 30 45 02 21 00 88 ae 14 68 e2 c9 46 e7 0e 04 37 |0E.!....h..F...7| +00000010 7a cf 20 f4 48 de 51 c5 26 81 c9 7d bf d2 e1 22 |z. .H.Q.&..}..."| +00000020 92 5c db 53 bb 02 20 64 3b 35 98 f1 7a 45 c6 c3 |.\.S.. d;5..zE..| +00000030 6a 90 0c 7a 65 13 3a f8 b1 79 89 ea 5d 3f 80 01 |j..ze.:..y..]?..| +00000040 0f 10 7f 24 b3 f0 1a |...$...|" +"2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 176 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 10686706552849004474, Envelope: 962 bytes, Signature: 0 bytes" +"2019-07-20 02:39:37.275 UTC [gossip.gossip] func2 -> DEBU 177 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-07-20 02:39:37.275 UTC [gossip.pull] HandleMessage -> DEBU 178 Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +"2019-07-20 02:39:37.275 UTC [gossip.gossip] handleMessage -> DEBU 179 Exiting" +"2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17a Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:37.390 UTC [gossip.pull] HandleMessage -> DEBU 17b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:37.390 UTC [gossip.gossip] handleMessage -> DEBU 17c Exiting" +"2019-07-20 02:39:37.391 UTC [gossip.pull] SendRes -> DEBU 17d Sending 1 IDENTITY_MSG items to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 17e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:37.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:37.397 UTC [gossip.gossip] handleMessage -> DEBU 180 Exiting" +"2019-07-20 02:39:37.399 UTC [msp.identity] Verify -> DEBU 181 Verify: digest = 00000000 53 76 f4 8a 78 bb 68 76 6e e7 aa 10 ec 24 f1 3c |Sv..x.hvn....$.<| +00000010 9a dc fc 94 b2 ae 95 73 f5 89 48 e3 4f 0b 30 d5 |.......s..H.O.0.|" +"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 182 Verify: sig = 00000000 30 44 02 20 02 38 29 0a 50 83 ea 0f e0 ac 37 54 |0D. .8).P.....7T| +00000010 fd 34 dd e6 05 20 ca 03 23 b9 06 37 c1 3f 25 88 |.4... ..#..7.?%.| +00000020 f9 5b b2 99 02 20 70 f1 47 d7 b2 fa f0 27 e6 b9 |.[... p.G....'..| +00000030 81 12 b5 bf 5a 74 bd fa dc 25 d5 10 30 76 cd cc |....Zt...%..0v..| +00000040 3f 22 7e 41 c5 f8 |?"~A..|" +"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:37.400 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 6a f1 88 46 44 1b 12 fc ee 2d 8c d8 |0D. j..FD....-..| +00000010 a3 00 77 67 93 6e 30 31 a1 89 f5 af e4 d6 0e e5 |..wg.n01........| +00000020 45 95 d3 52 02 20 57 6b a7 19 b6 18 a7 0b 40 0a |E..R. Wk......@.| +00000030 b0 03 22 5f f8 a4 c1 06 1f 8b 7f 6b a9 2f 41 07 |.."_.......k./A.| +00000040 29 0d 5c c2 6c a9 |).\.l.|" +"2019-07-20 02:39:37.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 185 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:37.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 186 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 187 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 188 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 189 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:37.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 18a Exiting" +"2019-07-20 02:39:37.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 18b Exiting" +"2019-07-20 02:39:37.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c Exiting" +"2019-07-20 02:39:40.267 UTC [gossip.pull] Hello -> DEBU 18d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:40.267 UTC [gossip.comm] Send -> DEBU 18e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 18f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.268 UTC [gossip.comm] sendToEndpoint -> DEBU 190 Exiting" +"2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 191 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.274 UTC [gossip.pull] HandleMessage -> DEBU 192 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.274 UTC [gossip.gossip] handleMessage -> DEBU 193 Exiting" +"2019-07-20 02:39:40.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 194 Obtaining default signing identity" +"2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 195 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:39:40.293 UTC [msp.identity] Sign -> DEBU 196 Sign: digest: 52A61F90DF58B1B9C98008BF88E86A627536A127FBD4B46A3D7CECBA9D5FD2B8 " +"2019-07-20 02:39:40.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 197 Obtaining default signing identity" +"2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 198 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:40.294 UTC [msp.identity] Sign -> DEBU 199 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:40.294 UTC [gossip.comm] Send -> DEBU 19a Entering, sending GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\320j\220\032/\305\210\373\010\232\242\215\002 \026\307\303|\245\267\352\360\034\034\025\273\323\307\363\241\204\314\231\3143\230J2}[\001\341g\324GQ" secret_envelope: > > , Envelope: 1093 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.294 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" +"2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.297 UTC [gossip.gossip] handleMessage -> DEBU 19e Exiting" +"2019-07-20 02:39:40.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2185 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a0 Verify: digest = 00000000 52 a6 1f 90 df 58 b1 b9 c9 80 08 bf 88 e8 6a 62 |R....X........jb| +00000010 75 36 a1 27 fb d4 b4 6a 3d 7c ec ba 9d 5f d2 b8 |u6.'...j=|..._..|" +"2019-07-20 02:39:40.299 UTC [msp.identity] Verify -> DEBU 1a1 Verify: sig = 00000000 30 44 02 20 30 c0 15 87 82 16 43 c9 b5 fa 81 b1 |0D. 0.....C.....| +00000010 19 3f 83 60 62 19 16 3e d0 6a 90 1a 2f c5 88 fb |.?.`b..>.j../...| +00000020 08 9a a2 8d 02 20 16 c7 c3 7c a5 b7 ea f0 1c 1c |..... ...|......| +00000030 15 bb d3 c7 f3 a1 84 cc 99 cc 33 98 4a 32 7d 5b |..........3.J2}[| +00000040 01 e1 67 d4 47 51 |..g.GQ|" +"2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:40.300 UTC [msp.identity] Verify -> DEBU 1a3 Verify: sig = 00000000 30 44 02 20 37 37 ec 58 8e 0c a5 9c 84 6d 5c c4 |0D. 77.X.....m\.| +00000010 7b b6 6a 3b 20 7e b9 9d 6f 73 ec 59 d8 36 24 35 |{.j; ~..os.Y.6$5| +00000020 51 91 0a ec 02 20 33 e2 52 de 65 b2 82 95 4a f2 |Q.... 3.R.e...J.| +00000030 da 7d 1d 4d a4 17 07 53 17 83 06 a2 9e 0b 9c 46 |.}.M...S.......F| +00000040 3a 17 38 8b ae 47 |:.8..G|" +"2019-07-20 02:39:40.300 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns\nFrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6\n5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:40.301 UTC [gossip.discovery] isSentByMe -> DEBU 1a5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\nwhAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:40.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a6 Exiting" +"2019-07-20 02:39:40.301 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7 Exiting" +"2019-07-20 02:39:40.390 UTC [gossip.gossip] handleMessage -> DEBU 1a8 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.390 UTC [gossip.pull] HandleMessage -> DEBU 1a9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.391 UTC [gossip.pull] SendDigest -> DEBU 1aa Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ab Exiting" +"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ac Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.391 UTC [gossip.gossip] handleMessage -> DEBU 1ad Exiting" +"2019-07-20 02:39:40.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > > , Envelope: 1097 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1af Verify: digest = 00000000 fd 61 48 d7 45 b9 37 7f 14 de 1f 2a a3 e8 c0 99 |.aH.E.7....*....| +00000010 e1 3a 5f de 9a 96 10 77 5a af bf 56 25 69 d3 5b |.:_....wZ..V%i.[|" +"2019-07-20 02:39:40.392 UTC [msp.identity] Verify -> DEBU 1b0 Verify: sig = 00000000 30 44 02 20 0f af e6 c7 e6 cd 9b 2b 4c 67 0c 40 |0D. .......+Lg.@| +00000010 4b aa 62 2d 17 f9 28 58 19 d2 67 be 8d 86 76 36 |K.b-..(X..g...v6| +00000020 7d 97 ea 33 02 20 12 49 b2 6b 4e 2d a1 03 0b 37 |}..3. .I.kN-...7| +00000030 c7 79 b4 74 7a 52 ef 57 d3 73 de 34 9a d8 6d 1f |.y.tzR.W.s.4..m.| +00000040 df c9 93 62 15 d9 |...b..|" +"2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:40.393 UTC [msp.identity] Verify -> DEBU 1b2 Verify: sig = 00000000 30 44 02 20 09 83 c1 ba c8 24 75 c5 4e aa a0 a1 |0D. .....$u.N...| +00000010 7c ba 37 37 fe d4 ba a0 d9 3d 03 59 9e 65 a9 42 ||.77.....=.Y.e.B| +00000020 e0 13 d7 25 02 20 2a d8 d1 41 dc cc a7 61 ad 91 |...%. *..A...a..| +00000030 86 72 03 bf a1 5d 43 ef 2c 8e be 3c 6f d4 3d 08 |.r...]C.,.. DEBU 1b3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" " +"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 Exiting" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9 Exiting" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba Exiting" +"2019-07-20 02:39:40.393 UTC [gossip.discovery] sendMemResponse -> DEBU 1bb Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:40.394 UTC [gossip.comm] Send -> DEBU 1bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:40.394 UTC [gossip.discovery] sendMemResponse -> DEBU 1bd Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\007\"\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" signature:"0D\002 \017\257\346\307\346\315\233+Lg\014@K\252b-\027\371(X\031\322g\276\215\206v6}\227\3523\002 \022I\262kN-\241\003\0137\307y\264tzR\357W\323s\3364\232\330m\037\337\311\223b\025\331" secret_envelope: > alive: > " +"2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1be Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2186 bytes, Signature: 0 bytes" +"2019-07-20 02:39:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf Exiting" +"2019-07-20 02:39:40.708 UTC [endorser] ProcessProposal -> DEBU 1c0 Entering: request from 172.18.0.9:58248" +"2019-07-20 02:39:40.709 UTC [protoutils] ValidateProposalMessage -> DEBU 1c1 ValidateProposalMessage starts for signed proposal 0xc000597b30" +"2019-07-20 02:39:40.709 UTC [protoutils] validateChannelHeader -> DEBU 1c2 validateChannelHeader info: header type 1" +"2019-07-20 02:39:40.710 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c3 begin" +"2019-07-20 02:39:40.710 UTC [msp] DeserializeIdentity -> DEBU 1c4 Obtaining identity" +"2019-07-20 02:39:40.711 UTC [msp.identity] newIdentity -> DEBU 1c5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.711 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:39:40.712 UTC [msp] Validate -> DEBU 1c7 MSP Org1MSP validating identity" +"2019-07-20 02:39:40.712 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c8 creator is valid" +"2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1c9 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| +00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" +"2019-07-20 02:39:40.713 UTC [msp.identity] Verify -> DEBU 1ca Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| +00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| +00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| +00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| +00000040 5c a5 59 88 ad 64 |\.Y..d|" +"2019-07-20 02:39:40.714 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb exits successfully" +"2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cc validateChaincodeProposalMessage starts for proposal 0xc0007a8380, header 0xc0007aa460" +"2019-07-20 02:39:40.714 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cd validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-07-20 02:39:40.715 UTC [endorser] preProcess -> DEBU 1ce [][67d06ae1] processing txid: 67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7" +"2019-07-20 02:39:40.715 UTC [endorser] SimulateProposal -> DEBU 1cf [][67d06ae1] Entry chaincode: name:"cscc" " +"2019-07-20 02:39:40.715 UTC [endorser] callChaincode -> INFO 1d0 [][67d06ae1] Entry chaincode: name:"cscc" " +"2019-07-20 02:39:40.715 UTC [chaincode] Execute -> DEBU 1d1 Entry" +"2019-07-20 02:39:40.716 UTC [cscc] Invoke -> DEBU 1d2 Invoke function: JoinChain" +"2019-07-20 02:39:40.716 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1d3 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d4 Verify: digest = 00000000 86 39 0c 46 13 37 25 e5 80 45 6e 19 f6 61 a8 16 |.9.F.7%..En..a..| +00000010 49 32 fe 1e 99 80 e4 99 d3 b9 aa 2c f1 bb 78 8d |I2.........,..x.|" +"2019-07-20 02:39:40.717 UTC [msp.identity] Verify -> DEBU 1d5 Verify: sig = 00000000 30 44 02 20 5e 97 26 dc 2d a9 1b 1a fa 68 0d 81 |0D. ^.&.-....h..| +00000010 c4 6b ac d4 11 d8 84 58 c9 63 0c 35 e8 01 6d 0f |.k.....X.c.5..m.| +00000020 a8 83 f9 89 02 20 15 d6 c1 91 3c 1f 7f 98 f9 66 |..... ....<....f| +00000030 e0 db 43 d7 0b f4 e4 49 f1 34 75 7f b6 56 28 ec |..C....I.4u..V(.| +00000040 5c a5 59 88 ad 64 |\.Y..d|" +"2019-07-20 02:39:40.718 UTC [ledgermgmt] CreateLedger -> INFO 1d6 Creating ledger [businesschannel] with genesis block" +"2019-07-20 02:39:40.719 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1d7 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-07-20 02:39:40.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1d8 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +"2019-07-20 02:39:40.720 UTC [kvledger.util] logDirStatus -> DEBU 1d9 Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +"2019-07-20 02:39:40.721 UTC [kvledger.util] logDirStatus -> DEBU 1da After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +"2019-07-20 02:39:40.721 UTC [fsblkstorage] newBlockfileMgr -> INFO 1db Getting block information from block storage" +"2019-07-20 02:39:40.722 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1dc Retrieving checkpoint info from block files" +"2019-07-20 02:39:40.722 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1dd retrieveLastFileSuffix()" +"2019-07-20 02:39:40.723 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1de retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1df Last file number found = -1" +"2019-07-20 02:39:40.723 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1e0 No block file found" +"2019-07-20 02:39:40.723 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1e1 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0005efc40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-07-20 02:39:40.725 UTC [fsblkstorage] newBlockIndex -> DEBU 1e2 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +"2019-07-20 02:39:40.725 UTC [pvtdatastorage] OpenStore -> DEBU 1e3 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +"2019-07-20 02:39:40.725 UTC [leveldbhelper] GetIterator -> DEBU 1e4 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +"2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e5 Creating KVLedger ledgerID=businesschannel: " +"2019-07-20 02:39:40.725 UTC [kvledger] lastPersistedCommitHash -> DEBU 1e6 Chain is empty" +"2019-07-20 02:39:40.725 UTC [kvledger] newKVLedger -> DEBU 1e7 Register state db for chaincode lifecycle events: false" +"2019-07-20 02:39:40.725 UTC [kvledger] recoverDBs -> DEBU 1e8 Entering recoverDB()" +"2019-07-20 02:39:40.725 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1e9 Block storage is empty." +"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ea [businesschannel:] Filtering pvtData of invalidation transactions" +"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1eb [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ec Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ed lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +"2019-07-20 02:39:40.725 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1ee Constructing unique pvtData by removing duplicate entries" +"2019-07-20 02:39:40.725 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1ef [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +"2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f0 Starting to process collection eligibility events" +"2019-07-20 02:39:40.726 UTC [leveldbhelper] GetIterator -> DEBU 1f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +"2019-07-20 02:39:40.726 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1f2 Converted [0] inelligible mising data entries to elligible" +"2019-07-20 02:39:40.726 UTC [pvtdatastorage] func1 -> DEBU 1f3 Waiting for collection eligibility event" +"2019-07-20 02:39:40.726 UTC [kvledger] CommitWithPvtData -> DEBU 1f4 [businesschannel] Validating state for block [0]" +"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f6 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1f7 Validating new block with num trans = [1]" +"2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f8 ValidateAndPrepareBatch() for block number = [0]" +"2019-07-20 02:39:40.727 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1f9 preprocessing ProtoBlock..." +"2019-07-20 02:39:40.727 UTC [valimpl] preprocessProtoBlock -> DEBU 1fa txType=CONFIG" +"2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fb Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-07-20 02:39:40.727 UTC [valimpl] processNonEndorserTx -> DEBU 1fc Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1fd constructing new tx simulator" +"2019-07-20 02:39:40.727 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1fe constructing new tx simulator txid = []" +"2019-07-20 02:39:40.727 UTC [peer] GenerateSimulationResults -> DEBU 1ff Processing CONFIG" +"2019-07-20 02:39:40.728 UTC [peer] processChannelConfigTx -> DEBU 200 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 201 Simulation completed, getting simulation results" +"2019-07-20 02:39:40.728 UTC [lockbasedtxmgr] Done -> DEBU 202 Done with transaction simulation / query execution []" +"2019-07-20 02:39:40.728 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 203 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +"2019-07-20 02:39:40.728 UTC [valinternal] ApplyWriteSet -> DEBU 204 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc000695b00)}" +"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 205 validating rwset..." +"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 206 postprocessing ProtoBlock..." +"2019-07-20 02:39:40.728 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 207 ValidateAndPrepareBatch() complete" +"2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 208 [businesschannel] Adding CommitHash to the block [0]" +"2019-07-20 02:39:40.728 UTC [kvledger] CommitWithPvtData -> DEBU 209 [businesschannel] Committing block [0] to storage" +"2019-07-20 02:39:40.728 UTC [ledgerstorage] CommitWithPvtData -> DEBU 20a Writing block [0] to pvt block store" +"2019-07-20 02:39:40.729 UTC [pvtdatastorage] Prepare -> DEBU 20b Saved 0 private data write sets for block [0]" +"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20c Indexing block [blockNum=0, blockHash=[]byte{0xde, 0xde, 0xd4, 0x2c, 0x3f, 0xc9, 0xd0, 0x46, 0x4d, 0x6c, 0x3a, 0xf6, 0x16, 0x22, 0x29, 0x32, 0x3, 0x44, 0xef, 0x64, 0x10, 0x5f, 0x7f, 0xf6, 0x26, 0x25, 0xe8, 0x71, 0x7d, 0x72, 0x1c, 0xd4} txOffsets= +txId=12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898 locPointer=offset=39, bytesLength=23902 +]" +"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to txid-index" +"2019-07-20 02:39:40.731 UTC [fsblkstorage] indexBlock -> DEBU 20e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23902] for tx number:[0] ID: [12c2da3964d48f67c323034ec5fc2c49db4c746e1a6cebdf760bba6b423d8898] to blockNumTranNum index" +"2019-07-20 02:39:40.733 UTC [fsblkstorage] updateCheckpoint -> DEBU 20f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23948], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-07-20 02:39:40.733 UTC [pvtdatastorage] Commit -> DEBU 210 Committing private data for block [0]" +"2019-07-20 02:39:40.734 UTC [pvtdatastorage] Commit -> DEBU 211 Committed private data for block [0]" +"2019-07-20 02:39:40.734 UTC [kvledger] CommitWithPvtData -> DEBU 212 [businesschannel] Committing block [0] transactions to state database" +"2019-07-20 02:39:40.734 UTC [lockbasedtxmgr] Commit -> DEBU 213 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 214 Purger started: Purging expired private data till block number [0]" +"2019-07-20 02:39:40.734 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 215 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +"2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 216 Preparing potential purge list working-set for expiringAtBlk [0]" +"2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 217 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +"2019-07-20 02:39:40.734 UTC [pvtdatastorage] func1 -> DEBU 218 Purger finished" +"2019-07-20 02:39:40.734 UTC [leveldbhelper] GetIterator -> DEBU 219 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +"2019-07-20 02:39:40.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 21a No expiry entry found for expiringAtBlk [0]" +"2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21b Committing updates to state database" +"2019-07-20 02:39:40.735 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 21c Building the expiry schedules based on the update batch" +"2019-07-20 02:39:40.735 UTC [lockbasedtxmgr] Commit -> DEBU 21d Write lock acquired for committing updates to state database" +"2019-07-20 02:39:40.735 UTC [stateleveldb] ApplyUpdates -> DEBU 21e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] Commit -> DEBU 21f Updates committed to state database and the write lock is released" +"2019-07-20 02:39:40.736 UTC [lockbasedtxmgr] func1 -> DEBU 220 launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:39:40.736 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 221 Preparing potential purge list working-set for expiringAtBlk [1]" +"2019-07-20 02:39:40.736 UTC [leveldbhelper] GetIterator -> DEBU 222 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +"2019-07-20 02:39:40.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 223 No expiry entry found for expiringAtBlk [1]" +"2019-07-20 02:39:40.737 UTC [kvledger] CommitWithPvtData -> DEBU 224 [businesschannel] Committing block [0] transactions to history database" +"2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 225 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +"2019-07-20 02:39:40.737 UTC [historyleveldb] Commit -> DEBU 226 Skipping transaction [0] since it is not an endorsement transaction" +"2019-07-20 02:39:40.738 UTC [historyleveldb] Commit -> DEBU 227 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +"2019-07-20 02:39:40.738 UTC [kvledger] CommitWithPvtData -> INFO 228 [businesschannel] Committed block [0] with 1 transaction(s) in 11ms (state_validation=1ms block_and_pvtdata_commit=5ms state_commit=2ms) commitHash=[]" +"2019-07-20 02:39:40.740 UTC [ledgermgmt] CreateLedger -> INFO 229 Created ledger [businesschannel] with genesis block" +"2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22a constructing new query executor txid = [0bf7b741-2304-4dbf-9a53-198b20e85df5]" +"2019-07-20 02:39:40.740 UTC [stateleveldb] GetState -> DEBU 22b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +"2019-07-20 02:39:40.740 UTC [lockbasedtxmgr] Done -> DEBU 22c Done with transaction simulation / query execution [0bf7b741-2304-4dbf-9a53-198b20e85df5]" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 22d Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22e Processing field: HashingAlgorithm" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 22f Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 230 Processing field: OrdererAddresses" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 231 Processing field: Consortium" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 232 Processing field: Capabilities" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] NewStandardValues -> DEBU 233 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 234 Processing field: ConsensusType" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 235 Processing field: BatchSize" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 236 Processing field: BatchTimeout" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 237 Processing field: KafkaBrokers" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: ChannelRestrictions" +"2019-07-20 02:39:40.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: Capabilities" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23a Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Endpoints" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 23c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: MSP" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] validateMSP -> DEBU 23e Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:40.741 UTC [msp] newBccspMsp -> DEBU 23f Creating BCCSP-based MSP instance" +"2019-07-20 02:39:40.741 UTC [msp] New -> DEBU 240 Creating Cache-MSP instance" +"2019-07-20 02:39:40.741 UTC [msp] Setup -> DEBU 241 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 242 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.741 UTC [msp.identity] newIdentity -> DEBU 243 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.741 UTC [msp] Validate -> DEBU 244 MSP OrdererMSP validating identity" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] NewStandardValues -> DEBU 245 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:40.741 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ACLs" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: AnchorPeers" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" +"2019-07-20 02:39:40.742 UTC [common.channelconfig] Validate -> DEBU 24c Anchor peers for org Org1MSP are " +"2019-07-20 02:39:40.742 UTC [common.channelconfig] validateMSP -> DEBU 24d Setting up MSP for org Org1MSP" +"2019-07-20 02:39:40.742 UTC [msp] newBccspMsp -> DEBU 24e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:40.742 UTC [msp] New -> DEBU 24f Creating Cache-MSP instance" +"2019-07-20 02:39:40.742 UTC [msp] Setup -> DEBU 250 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.742 UTC [msp.identity] newIdentity -> DEBU 252 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.743 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 253 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:40.743 UTC [msp] Validate -> DEBU 254 MSP Org1MSP validating identity" +"2019-07-20 02:39:40.743 UTC [msp] getCertificationChain -> DEBU 255 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:40.744 UTC [msp] hasOURole -> DEBU 256 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:40.744 UTC [msp] getCertificationChain -> DEBU 257 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: AnchorPeers" +"2019-07-20 02:39:40.744 UTC [common.channelconfig] NewStandardValues -> DEBU 25a Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:40.744 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: MSP" +"2019-07-20 02:39:40.744 UTC [common.channelconfig] Validate -> DEBU 25c Anchor peers for org Org2MSP are " +"2019-07-20 02:39:40.744 UTC [common.channelconfig] validateMSP -> DEBU 25d Setting up MSP for org Org2MSP" +"2019-07-20 02:39:40.744 UTC [msp] newBccspMsp -> DEBU 25e Creating BCCSP-based MSP instance" +"2019-07-20 02:39:40.744 UTC [msp] New -> DEBU 25f Creating Cache-MSP instance" +"2019-07-20 02:39:40.744 UTC [msp] Setup -> DEBU 260 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 261 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.745 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:40.746 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 263 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:40.746 UTC [msp] Validate -> DEBU 264 MSP Org2MSP validating identity" +"2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 265 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:40.746 UTC [msp] hasOURole -> DEBU 266 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:40.746 UTC [msp] getCertificationChain -> DEBU 267 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:40.746 UTC [msp] Setup -> DEBU 268 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:40.747 UTC [msp] Setup -> DEBU 269 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:40.747 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Admins for Channel" +"2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Readers for Channel" +"2019-07-20 02:39:40.748 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Writers for Channel" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:40.748 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:40.749 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:40.750 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ad Application capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:40.750 UTC [common.capabilities] Supported -> DEBU 2ae Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2af As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:40.750 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:40.750 UTC [policies] Manager -> DEBU 2b1 Manager Channel looking up path [Application]" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b2 Manager Channel has managers Orderer" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Application" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b4 Manager Channel/Application looking up path []" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b5 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2b6 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b7 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b8 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b9 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2ba Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bb Manager Channel has managers Orderer" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bc Manager Channel has managers Application" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2bd Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:40.751 UTC [policies] Manager -> DEBU 2be Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2bf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c0 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c1 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:40.751 UTC [common.channelconfig] LogSanityChecks -> DEBU 2c2 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c3 Processing new config for channel businesschannel" +"2019-07-20 02:39:40.751 UTC [gossip.service] ProcessConfigUpdate -> DEBU 2c4 Calling out because config was updated for channel businesschannel" +"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c5 Org1MSP anchor peers: []" +"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c6 Org2MSP anchor peers: []" +"2019-07-20 02:39:40.751 UTC [gossip.service] updateAnchors -> DEBU 2c7 Creating state provider for chainID businesschannel" +"2019-07-20 02:39:40.751 UTC [gossip.gossip] JoinChan -> INFO 2c8 Joining gossip network of channel businesschannel with 2 organizations" +"2019-07-20 02:39:40.751 UTC [gossip.gossip] learnAnchorPeers -> INFO 2c9 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-07-20 02:39:40.752 UTC [gossip.gossip] learnAnchorPeers -> INFO 2ca No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-07-20 02:39:40.752 UTC [peer] updateTrustedRoots -> DEBU 2cb Updating trusted root authorities for channel businesschannel" +"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cc updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2cd adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:40.760 UTC [peer] buildTrustedRootsForChain -> DEBU 2ce adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:40.761 UTC [peer] buildTrustedRootsForChain -> DEBU 2cf adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:40.761 UTC [kvledger.util] CreateDirIfMissing -> DEBU 2d0 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +"2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d1 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +"2019-07-20 02:39:40.761 UTC [kvledger.util] logDirStatus -> DEBU 2d2 After creating dir - [/var/hyperledger/production/transientStore/] exists" +"2019-07-20 02:39:40.768 UTC [gossip.service] InitializeChannel -> DEBU 2d3 Creating state provider for chainID businesschannel" +"2019-07-20 02:39:40.769 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d4 Obtaining default signing identity" +"2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d5 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-07-20 02:39:40.769 UTC [msp.identity] Sign -> DEBU 2d6 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-07-20 02:39:40.770 UTC [gossip.privdata] NewReconciler -> DEBU 2d7 Private data reconciliation is enabled" +"2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> INFO 2d8 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-07-20 02:39:40.773 UTC [gossip.state] NewGossipStateProvider -> DEBU 2d9 Updating gossip ledger height to 1" +"2019-07-20 02:39:40.774 UTC [msp] GetDefaultSigningIdentity -> DEBU 2da Obtaining default signing identity" +"2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2db Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " +"2019-07-20 02:39:40.774 UTC [msp.identity] Sign -> DEBU 2dc Sign: digest: F551A65D8BC362FE114BAD8311222B06D4E2289434A7C37C986E7EEDF1FC6EE9 " +"2019-07-20 02:39:40.774 UTC [gossip.service] InitializeChannel -> DEBU 2dd Delivery uses dynamic leader election mechanism, channel businesschannel" +"2019-07-20 02:39:40.775 UTC [peer] InitChain -> DEBU 2de Initializing channel businesschannel" +"2019-07-20 02:39:40.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2df c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:40.775 UTC [gossip.election] handleMessages -> DEBU 2e0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:40.775 UTC [nodeCmd] func6 -> DEBU 2e1 Deploying system CC, for channel " +"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2 constructing new tx simulator" +"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e3 constructing new tx simulator txid = [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" +"2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e4 Entry" +"2019-07-20 02:39:40.775 UTC [chaincode] handleMessage -> DEBU 2e5 [abaa1667] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:40.775 UTC [chaincode] Notify -> DEBU 2e6 [abaa1667] notifying Txid:abaa1667-e7a4-43d3-835d-7b3659d3b26c, channelID:businesschannel" +"2019-07-20 02:39:40.775 UTC [chaincode] Execute -> DEBU 2e7 Exit" +"2019-07-20 02:39:40.775 UTC [sccapi] deploySysCC -> INFO 2e8 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] Done -> DEBU 2e9 Done with transaction simulation / query execution [abaa1667-e7a4-43d3-835d-7b3659d3b26c]" +"2019-07-20 02:39:40.775 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2ea constructing new tx simulator" +"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2eb constructing new tx simulator txid = [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" +"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2ec Entry" +"2019-07-20 02:39:40.776 UTC [cscc] Init -> INFO 2ed Init CSCC" +"2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2ee [d8dbf289] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2ef [d8dbf289] notifying Txid:d8dbf289-e043-4466-a93a-ddccfd1cdab0, channelID:businesschannel" +"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f0 Exit" +"2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2f1 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2f2 Done with transaction simulation / query execution [d8dbf289-e043-4466-a93a-ddccfd1cdab0]" +"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2f3 constructing new tx simulator" +"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2f4 constructing new tx simulator txid = [84e60c06-9d91-4b37-949a-5b212baac3e1]" +"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f5 Entry" +"2019-07-20 02:39:40.776 UTC [qscc] Init -> INFO 2f6 Init QSCC" +"2019-07-20 02:39:40.776 UTC [chaincode] handleMessage -> DEBU 2f7 [84e60c06] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:40.776 UTC [chaincode] Notify -> DEBU 2f8 [84e60c06] notifying Txid:84e60c06-9d91-4b37-949a-5b212baac3e1, channelID:businesschannel" +"2019-07-20 02:39:40.776 UTC [chaincode] Execute -> DEBU 2f9 Exit" +"2019-07-20 02:39:40.776 UTC [sccapi] deploySysCC -> INFO 2fa system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-07-20 02:39:40.776 UTC [lockbasedtxmgr] Done -> DEBU 2fb Done with transaction simulation / query execution [84e60c06-9d91-4b37-949a-5b212baac3e1]" +"2019-07-20 02:39:40.777 UTC [sccapi] deploySysCC -> INFO 2fc system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2fd constructing new query executor txid = [af545680-5b62-498c-8287-f67efc9651a5]" +"2019-07-20 02:39:40.777 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2fe Returning []" +"2019-07-20 02:39:40.777 UTC [lockbasedtxmgr] Done -> DEBU 2ff Done with transaction simulation / query execution [af545680-5b62-498c-8287-f67efc9651a5]" +"2019-07-20 02:39:40.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 300 Obtaining default signing identity" +"2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 301 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020801 " +"2019-07-20 02:39:40.777 UTC [msp.identity] Sign -> DEBU 302 Sign: digest: 3233FCE6D3C338F4FFECD94AEA4E2C6BC849ED2FC8E7A44AD209E1AC5F954AEE " +"2019-07-20 02:39:40.777 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 303 Listeners for channel businesschannel invoked" +"2019-07-20 02:39:40.777 UTC [chaincode] handleMessage -> DEBU 304 [67d06ae1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:40.777 UTC [chaincode] Notify -> DEBU 305 [67d06ae1] notifying Txid:67d06ae1fc1d7db4d5e0259c1748ab22cb470271d429d94645d1ca2a81fe1bb7, channelID:" +"2019-07-20 02:39:40.777 UTC [chaincode] Execute -> DEBU 306 Exit" +"2019-07-20 02:39:40.777 UTC [endorser] callChaincode -> INFO 307 [][67d06ae1] Exit chaincode: name:"cscc" (62ms)" +"2019-07-20 02:39:40.777 UTC [endorser] SimulateProposal -> DEBU 308 [][67d06ae1] Exit" +"2019-07-20 02:39:40.777 UTC [endorser] func1 -> DEBU 309 Exit: request from 172.18.0.9:58248" +"2019-07-20 02:39:40.777 UTC [comm.grpc.server] 1 -> INFO 30a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58248 grpc.code=OK grpc.call_duration=69.3708ms +"2019-07-20 02:39:40.783 UTC [grpc] infof -> DEBU 30b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:41.563 UTC [endorser] ProcessProposal -> DEBU 30c Entering: request from 172.18.0.9:58256" +"2019-07-20 02:39:41.563 UTC [protoutils] ValidateProposalMessage -> DEBU 30d ValidateProposalMessage starts for signed proposal 0xc00080fea0" +"2019-07-20 02:39:41.563 UTC [protoutils] validateChannelHeader -> DEBU 30e validateChannelHeader info: header type 3" +"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 30f begin" +"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 310 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:39:41.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 311 creator is valid" +"2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 312 Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| +00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" +"2019-07-20 02:39:41.565 UTC [msp.identity] Verify -> DEBU 313 Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| +00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| +00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| +00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| +00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" +"2019-07-20 02:39:41.565 UTC [protoutils] checkSignatureFromCreator -> DEBU 314 exits successfully" +"2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 315 validateChaincodeProposalMessage starts for proposal 0xc0007f5730, header 0xc002fdc2d0" +"2019-07-20 02:39:41.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 316 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-07-20 02:39:41.566 UTC [endorser] preProcess -> DEBU 317 [][9eb44deb] processing txid: 9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93" +"2019-07-20 02:39:41.566 UTC [endorser] SimulateProposal -> DEBU 318 [][9eb44deb] Entry chaincode: name:"cscc" " +"2019-07-20 02:39:41.567 UTC [endorser] callChaincode -> INFO 319 [][9eb44deb] Entry chaincode: name:"cscc" " +"2019-07-20 02:39:41.567 UTC [chaincode] Execute -> DEBU 31a Entry" +"2019-07-20 02:39:41.567 UTC [cscc] Invoke -> DEBU 31b Invoke function: GetChannels" +"2019-07-20 02:39:41.568 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 31c Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:41.568 UTC [msp] Validate -> DEBU 31d MSP Org1MSP validating identity" +"2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31e Verify: digest = 00000000 5a 8e 92 6a 06 30 e7 d7 67 57 c7 c2 b4 f7 5e 8d |Z..j.0..gW....^.| +00000010 56 2c a1 d1 a0 82 bd 6d e4 ad fe 47 74 a3 d6 f8 |V,.....m...Gt...|" +"2019-07-20 02:39:41.569 UTC [msp.identity] Verify -> DEBU 31f Verify: sig = 00000000 30 45 02 21 00 ef f9 f7 e0 6f 5b 7d 18 20 1b 65 |0E.!.....o[}. .e| +00000010 07 1c 95 8e 49 c0 84 12 e2 34 b1 e4 a0 a0 1a b2 |....I....4......| +00000020 4e 6f a3 d2 4c 02 20 40 73 ea cd 61 16 06 b5 66 |No..L. @s..a...f| +00000030 7b 7c 72 a3 7b de 72 ec 4a 2f 66 51 59 2e 2a 27 |{|r.{.r.J/fQY.*'| +00000040 24 e3 64 2a 1b 25 7a |$.d*.%z|" +"2019-07-20 02:39:41.569 UTC [chaincode] handleMessage -> DEBU 320 [9eb44deb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:41.570 UTC [chaincode] Notify -> DEBU 321 [9eb44deb] notifying Txid:9eb44debf4dbdeef1f516cd95779b3765395e4af9bee8f05601a789bd6c76e93, channelID:" +"2019-07-20 02:39:41.570 UTC [chaincode] Execute -> DEBU 322 Exit" +"2019-07-20 02:39:41.570 UTC [endorser] callChaincode -> INFO 323 [][9eb44deb] Exit chaincode: name:"cscc" (3ms)" +"2019-07-20 02:39:41.570 UTC [endorser] SimulateProposal -> DEBU 324 [][9eb44deb] Exit" +"2019-07-20 02:39:41.571 UTC [endorser] func1 -> DEBU 325 Exit: request from 172.18.0.9:58256" +"2019-07-20 02:39:41.571 UTC [comm.grpc.server] 1 -> INFO 326 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58256 grpc.code=OK grpc.call_duration=8.7801ms +"2019-07-20 02:39:41.574 UTC [grpc] warningf -> DEBU 327 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58256: read: connection reset by peer" +"2019-07-20 02:39:41.574 UTC [grpc] infof -> DEBU 328 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:41.775 UTC [gossip.election] waitForMembershipStabilization -> DEBU 329 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +"2019-07-20 02:39:41.775 UTC [gossip.election] leaderElection -> DEBU 32a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:41.776 UTC [gossip.election] propose -> DEBU 32b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:41.777 UTC [gossip.election] propose -> DEBU 32c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:39:41.777 UTC [msp] GetDefaultSigningIdentity -> DEBU 32d Obtaining default signing identity" +"2019-07-20 02:39:41.777 UTC [msp.identity] Sign -> DEBU 32e Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C08ECCFA2A2ACA5BFD9151001 " +"2019-07-20 02:39:41.778 UTC [msp.identity] Sign -> DEBU 32f Sign: digest: FFE9E552AE6C7A4F25D53AB3CEFBB19AA21287B4B9B72999460F48E10242ADC6 " +"2019-07-20 02:39:41.778 UTC [gossip.election] waitForInterrupt -> DEBU 330 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:42.252 UTC [endorser] ProcessProposal -> DEBU 331 Entering: request from 172.18.0.9:58264" +"2019-07-20 02:39:42.252 UTC [protoutils] ValidateProposalMessage -> DEBU 332 ValidateProposalMessage starts for signed proposal 0xc002fb4870" +"2019-07-20 02:39:42.252 UTC [protoutils] validateChannelHeader -> DEBU 333 validateChannelHeader info: header type 3" +"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 334 begin" +"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 335 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:39:42.253 UTC [protoutils] checkSignatureFromCreator -> DEBU 336 creator is valid" +"2019-07-20 02:39:42.253 UTC [msp.identity] Verify -> DEBU 337 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| +00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" +"2019-07-20 02:39:42.254 UTC [msp.identity] Verify -> DEBU 338 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| +00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| +00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| +00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| +00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" +"2019-07-20 02:39:42.254 UTC [protoutils] checkSignatureFromCreator -> DEBU 339 exits successfully" +"2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33a validateChaincodeProposalMessage starts for proposal 0xc002a5b9d0, header 0xc002fb4c80" +"2019-07-20 02:39:42.254 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33b validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-07-20 02:39:42.255 UTC [endorser] preProcess -> DEBU 33c [][56ee910c] processing txid: 56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885" +"2019-07-20 02:39:42.255 UTC [endorser] SimulateProposal -> DEBU 33d [][56ee910c] Entry chaincode: name:"qscc" " +"2019-07-20 02:39:42.255 UTC [endorser] callChaincode -> INFO 33e [][56ee910c] Entry chaincode: name:"qscc" " +"2019-07-20 02:39:42.256 UTC [chaincode] Execute -> DEBU 33f Entry" +"2019-07-20 02:39:42.256 UTC [qscc] Invoke -> DEBU 340 Invoke function: GetChainInfo on chain: businesschannel" +"2019-07-20 02:39:42.256 UTC [aclmgmt] CheckACL -> DEBU 341 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-07-20 02:39:42.257 UTC [aclmgmt] CheckACL -> DEBU 342 acl check(/Channel/Application/Readers)" +"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 343 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 344 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:42.257 UTC [policies] Evaluate -> DEBU 345 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:42.258 UTC [msp] DeserializeIdentity -> DEBU 346 Obtaining identity" +"2019-07-20 02:39:42.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 347 Obtaining default signing identity" +"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 348 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151008 " +"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 349 Sign: digest: B47A6DBF8403EA2183512FE112A860C1DDCAD57DAF43878D704F7766BFEE800D " +"2019-07-20 02:39:42.263 UTC [msp] GetDefaultSigningIdentity -> DEBU 34a Obtaining default signing identity" +"2019-07-20 02:39:42.263 UTC [msp.identity] Sign -> DEBU 34b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:42.264 UTC [msp.identity] Sign -> DEBU 34c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:42.264 UTC [gossip.discovery] periodicalSendAlive -> DEBU 34d Sleeping 5s" +"2019-07-20 02:39:42.264 UTC [msp.identity] newIdentity -> DEBU 34e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:42.265 UTC [cauthdsl] func1 -> DEBU 34f 0xc003023250 gate 1563590382265478300 evaluation starts" +"2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 350 0xc003023250 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:42.265 UTC [cauthdsl] func2 -> DEBU 351 0xc003023250 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 352 0xc003023250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:42.266 UTC [cauthdsl] func2 -> DEBU 353 0xc003023250 principal evaluation fails" +"2019-07-20 02:39:42.266 UTC [cauthdsl] func1 -> DEBU 355 0xc003023250 gate 1563590382265478300 evaluation fails" +"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 356 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 357 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:42.267 UTC [policies] Evaluate -> DEBU 358 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:42.266 UTC [gossip.comm] Send -> DEBU 354 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:42.268 UTC [cauthdsl] func1 -> DEBU 359 0xc00303e3d0 gate 1563590382267987800 evaluation starts" +"2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35a 0xc00303e3d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:42.268 UTC [cauthdsl] func2 -> DEBU 35b 0xc00303e3d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:42.268 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 35c Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:42.269 UTC [msp] Validate -> DEBU 35d MSP Org1MSP validating identity" +"2019-07-20 02:39:42.269 UTC [msp] getCertificationChain -> DEBU 35e MSP Org1MSP getting certification chain" +"2019-07-20 02:39:42.269 UTC [cauthdsl] func2 -> DEBU 35f 0xc00303e3d0 principal matched by identity 0" +"2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 360 Verify: digest = 00000000 9a 3d ec 0b 3e c4 0b 06 5e fa 35 50 17 74 3e 82 |.=..>...^.5P.t>.| +00000010 d3 c3 be d7 3e da 25 f6 3b 02 9b e8 84 33 7f 7b |....>.%.;....3.{|" +"2019-07-20 02:39:42.270 UTC [msp.identity] Verify -> DEBU 361 Verify: sig = 00000000 30 45 02 21 00 a9 61 f0 99 8a ce 43 14 e1 1c 16 |0E.!..a....C....| +00000010 26 07 5d cd 53 82 97 2d c1 68 cf 33 c8 5e cb 0e |&.].S..-.h.3.^..| +00000020 45 88 65 20 01 02 20 16 7f 13 06 df 6f 73 35 c7 |E.e .. .....os5.| +00000030 38 a8 a6 8b 1d bc 7f d7 6e 67 e6 a1 53 79 91 79 |8.......ng..Sy.y| +00000040 d2 8d 67 ea 7e f1 66 |..g.~.f|" +"2019-07-20 02:39:42.270 UTC [cauthdsl] func2 -> DEBU 362 0xc00303e3d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:42.270 UTC [cauthdsl] func1 -> DEBU 363 0xc00303e3d0 gate 1563590382267987800 evaluation succeeds" +"2019-07-20 02:39:42.270 UTC [policies] Evaluate -> DEBU 364 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 366 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:42.271 UTC [policies] Evaluate -> DEBU 367 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:42.272 UTC [chaincode] handleMessage -> DEBU 368 [56ee910c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:42.272 UTC [chaincode] Notify -> DEBU 369 [56ee910c] notifying Txid:56ee910cdf0a549f26997065466a013cf178582da294f11ebf068c1c75a1c885, channelID:" +"2019-07-20 02:39:42.272 UTC [chaincode] Execute -> DEBU 36a Exit" +"2019-07-20 02:39:42.272 UTC [endorser] callChaincode -> INFO 36b [][56ee910c] Exit chaincode: name:"qscc" (17ms)" +"2019-07-20 02:39:42.273 UTC [endorser] SimulateProposal -> DEBU 36c [][56ee910c] Exit" +"2019-07-20 02:39:42.273 UTC [endorser] func1 -> DEBU 36d Exit: request from 172.18.0.9:58264" +"2019-07-20 02:39:42.273 UTC [comm.grpc.server] 1 -> INFO 36e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58264 grpc.code=OK grpc.call_duration=21.8975ms +"2019-07-20 02:39:42.268 UTC [gossip.comm] sendToEndpoint -> DEBU 36f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:42.274 UTC [gossip.comm] sendToEndpoint -> DEBU 370 Exiting" +"2019-07-20 02:39:42.277 UTC [grpc] infof -> DEBU 371 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:42.394 UTC [gossip.gossip] handleMessage -> DEBU 372 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:42.395 UTC [gossip.gossip] handleMessage -> DEBU 373 Exiting" +"2019-07-20 02:39:42.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 374 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:42.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 375 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:42.397 UTC [msp.identity] Verify -> DEBU 376 Verify: digest = 00000000 a5 1b 09 b7 08 b7 9c 03 2f a6 f0 6b 53 c6 c5 9c |......../..kS...| +00000010 41 51 dd 5c e7 c0 ad 26 1c 06 3b 81 de 3d 0e a0 |AQ.\...&..;..=..|" +"2019-07-20 02:39:42.398 UTC [msp.identity] Verify -> DEBU 377 Verify: sig = 00000000 30 44 02 20 5d 74 cf 2c 50 bf 53 12 05 9d ee c8 |0D. ]t.,P.S.....| +00000010 ef 87 fd 42 b6 dc 2b 60 e1 5f 7e 88 57 7f c5 11 |...B..+`._~.W...| +00000020 9a b1 05 dd 02 20 23 59 85 7e e0 d1 cd 6a e1 0f |..... #Y.~...j..| +00000030 be 9a 3b 26 28 cc 60 b1 ec 74 3e ef ae 9b 1f 8e |..;&(.`..t>.....| +00000040 5b ba d6 c3 03 a6 |[.....|" +"2019-07-20 02:39:42.400 UTC [msp.identity] Verify -> DEBU 378 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:42.401 UTC [msp.identity] Verify -> DEBU 379 Verify: sig = 00000000 30 45 02 21 00 9e d3 4f 5e 97 be b4 1c 21 7f bc |0E.!...O^....!..| +00000010 f1 e3 02 81 c6 d8 12 53 79 d2 6f ae e8 19 b5 8b |.......Sy.o.....| +00000020 2c ce e9 54 0e 02 20 2e ff 04 83 19 c1 c8 2e c8 |,..T.. .........| +00000030 fd ea e6 14 09 64 bc 58 44 e4 e4 b1 28 69 a9 80 |.....d.XD...(i..| +00000040 83 24 e6 0b b6 c8 ce |.$.....|" +"2019-07-20 02:39:42.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:39:42.403 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:42.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 37e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:42.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 37f Exiting" +"2019-07-20 02:39:42.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 380 Exiting" +"2019-07-20 02:39:42.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381 Exiting" +"2019-07-20 02:39:44.269 UTC [gossip.pull] Hello -> DEBU 382 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:44.269 UTC [gossip.comm] Send -> DEBU 383 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:44.269 UTC [gossip.comm] sendToEndpoint -> DEBU 384 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.270 UTC [gossip.comm] sendToEndpoint -> DEBU 385 Exiting" +"2019-07-20 02:39:44.271 UTC [gossip.gossip] handleMessage -> DEBU 386 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.272 UTC [gossip.pull] HandleMessage -> DEBU 387 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 85 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.272 UTC [gossip.gossip] handleMessage -> DEBU 388 Exiting" +"2019-07-20 02:39:44.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 389 Obtaining default signing identity" +"2019-07-20 02:39:44.297 UTC [msp.identity] Sign -> DEBU 38a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151009 " +"2019-07-20 02:39:44.298 UTC [msp.identity] Sign -> DEBU 38b Sign: digest: 038845EEB47CE4E506D2E41DBA8A6D4A6F17B929678EF07AE731EBED65C98BB5 " +"2019-07-20 02:39:44.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 38c Obtaining default signing identity" +"2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:44.299 UTC [msp.identity] Sign -> DEBU 38e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:44.300 UTC [gossip.comm] Send -> DEBU 38f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 390 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.301 UTC [gossip.comm] sendToEndpoint -> DEBU 391 Exiting" +"2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 392 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.304 UTC [gossip.gossip] handleMessage -> DEBU 393 Exiting" +"2019-07-20 02:39:44.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 394 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 395 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 396 Verify: digest = 00000000 03 88 45 ee b4 7c e4 e5 06 d2 e4 1d ba 8a 6d 4a |..E..|........mJ| +00000010 6f 17 b9 29 67 8e f0 7a e7 31 eb ed 65 c9 8b b5 |o..)g..z.1..e...|" +"2019-07-20 02:39:44.304 UTC [msp.identity] Verify -> DEBU 397 Verify: sig = 00000000 30 44 02 20 2c 5e 12 39 e4 8a 65 db db 52 be 9a |0D. ,^.9..e..R..| +00000010 85 a7 f2 10 0c 0b 84 81 f7 70 a1 5a 46 1d 97 f5 |.........p.ZF...| +00000020 ba c0 06 eb 02 20 4b 56 d0 df 22 55 7b 8e ba ce |..... KV.."U{...| +00000030 05 41 7d 81 85 ac bf 95 33 a8 cd f7 1c 59 64 bc |.A}.....3....Yd.| +00000040 75 1b 07 a1 6b 5b |u...k[|" +"2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 398 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:44.305 UTC [msp.identity] Verify -> DEBU 399 Verify: sig = 00000000 30 45 02 21 00 a9 d3 a4 08 85 bc cb 81 46 84 81 |0E.!.........F..| +00000010 f2 19 50 05 7a 32 f2 b5 b1 e1 82 b4 73 ed b9 43 |..P.z2......s..C| +00000020 6f d3 06 17 d3 02 20 6f 74 bc e8 59 b2 6b f6 f5 |o..... ot..Y.k..| +00000030 ec a8 c5 7c 79 43 bc 3a 19 8a cf 87 77 ac 54 5d |...|yC.:....w.T]| +00000040 48 83 4d 89 38 91 45 |H.M.8.E|" +"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:44.305 UTC [gossip.discovery] isSentByMe -> DEBU 39b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c Exiting" +"2019-07-20 02:39:44.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39d Exiting" +"2019-07-20 02:39:44.391 UTC [gossip.gossip] handleMessage -> DEBU 39e Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.392 UTC [gossip.pull] HandleMessage -> DEBU 39f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.392 UTC [gossip.pull] SendDigest -> DEBU 3a0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:44.393 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" +"2019-07-20 02:39:44.394 UTC [gossip.gossip] handleMessage -> DEBU 3a2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.395 UTC [gossip.gossip] handleMessage -> DEBU 3a3 Exiting" +"2019-07-20 02:39:44.395 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.396 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:44.397 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 29 00 b3 ff 3d 83 b9 68 9c 7f 8a 4f 6b 81 ac ef |)...=..h...Ok...| +00000010 0b cf 38 fc 45 3f 6a e7 04 f6 75 cb 3a 55 56 ad |..8.E?j...u.:UV.|" +"2019-07-20 02:39:44.398 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 4d 2a 70 d2 c2 ad 05 12 2e 74 b9 a0 |0D. M*p......t..| +00000010 3c 86 a2 b5 e1 fa c9 69 23 de 37 cb 7e 2d ee 54 |<......i#.7.~-.T| +00000020 00 9b bd 8d 02 20 7f ae cb 63 88 97 ae 11 9d 19 |..... ...c......| +00000030 d6 9b cc 28 8c e5 35 00 e8 1b b1 81 4b 9e 22 e8 |...(..5.....K.".| +00000040 96 17 a6 dd bb e4 |......|" +"2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:44.399 UTC [msp.identity] Verify -> DEBU 3a9 Verify: sig = 00000000 30 45 02 21 00 bb 9f 6b 01 a7 03 0f 80 54 b5 50 |0E.!...k.....T.P| +00000010 b8 b3 2e 2b 38 36 7a 6b fa 0c b9 64 5c b6 47 78 |...+86zk...d\.Gx| +00000020 1a 84 a1 ce a3 02 20 36 e1 01 70 16 0f e5 3d 60 |...... 6..p...=`| +00000030 81 a2 55 df 4e 77 4c b1 a8 cc 73 72 b6 d1 22 6d |..U.NwL...sr.."m| +00000040 e6 25 93 37 29 c5 3d |.%.7).=|" +"2019-07-20 02:39:44.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:44.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 3af Exiting" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b0 Exiting" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b1 Exiting" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:44.402 UTC [gossip.comm] Send -> DEBU 3b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:44.402 UTC [gossip.discovery] sendMemResponse -> DEBU 3b4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\t" signature:"0D\002 M*p\322\302\255\005\022.t\271\240<\206\242\265\341\372\311i#\3367\313~-\356T\000\233\275\215\002 \177\256\313c\210\227\256\021\235\031\326\233\314(\214\3455\000\350\033\261\201K\236\"\350\226\027\246\335\273\344" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " +"2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.402 UTC [gossip.comm] sendToEndpoint -> DEBU 3b6 Exiting" +"2019-07-20 02:39:44.753 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.753 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" +"2019-07-20 02:39:44.755 UTC [gossip.comm] Send -> DEBU 3ba Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:44.755 UTC [gossip.comm] sendToEndpoint -> DEBU 3bc Exiting" +"2019-07-20 02:39:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3bd Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3be Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +"2019-07-20 02:39:44.757 UTC [msp.identity] Verify -> DEBU 3bf Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +"2019-07-20 02:39:44.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:44.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:44.763 UTC [policies] Evaluate -> DEBU 3c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:44.764 UTC [policies] Evaluate -> DEBU 3c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:44.764 UTC [msp] DeserializeIdentity -> DEBU 3c5 Obtaining identity" +"2019-07-20 02:39:44.765 UTC [msp.identity] newIdentity -> DEBU 3c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-07-20 02:39:44.766 UTC [cauthdsl] func1 -> DEBU 3c7 0xc003081da0 gate 1563590384766279600 evaluation starts" +"2019-07-20 02:39:44.766 UTC [cauthdsl] func2 -> DEBU 3c8 0xc003081da0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3c9 0xc003081da0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3ca 0xc003081da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:44.767 UTC [cauthdsl] func2 -> DEBU 3cb 0xc003081da0 principal evaluation fails" +"2019-07-20 02:39:44.768 UTC [cauthdsl] func1 -> DEBU 3cc 0xc003081da0 gate 1563590384766279600 evaluation fails" +"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:44.769 UTC [policies] Evaluate -> DEBU 3cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:44.770 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0030c2f20 gate 1563590384770142000 evaluation starts" +"2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d1 0xc0030c2f20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:44.770 UTC [cauthdsl] func2 -> DEBU 3d2 0xc0030c2f20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:44.771 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:44.771 UTC [msp] Validate -> DEBU 3d4 MSP Org1MSP validating identity" +"2019-07-20 02:39:44.771 UTC [msp] getCertificationChain -> DEBU 3d5 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:44.772 UTC [cauthdsl] func2 -> DEBU 3d6 0xc0030c2f20 principal matched by identity 0" +"2019-07-20 02:39:44.772 UTC [msp.identity] Verify -> DEBU 3d7 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +"2019-07-20 02:39:44.773 UTC [msp.identity] Verify -> DEBU 3d8 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +"2019-07-20 02:39:44.773 UTC [cauthdsl] func2 -> DEBU 3d9 0xc0030c2f20 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:44.773 UTC [cauthdsl] func1 -> DEBU 3da 0xc0030c2f20 gate 1563590384770142000 evaluation succeeds" +"2019-07-20 02:39:44.773 UTC [policies] Evaluate -> DEBU 3db Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3dd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:44.774 UTC [policies] Evaluate -> DEBU 3de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:44.775 UTC [gossip.gossip] handleMessage -> DEBU 3df Exiting" +"2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e0 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.913 UTC [gossip.gossip] handleMessage -> DEBU 3e1 Exiting" +"2019-07-20 02:39:44.914 UTC [gossip.gossip] handleMessage -> DEBU 3e2 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.914 UTC [gossip.pull] HandleMessage -> DEBU 3e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:39:44.915 UTC [gossip.gossip] handleMessage -> DEBU 3e4 Exiting" +"2019-07-20 02:39:44.916 UTC [gossip.gossip] handleMessage -> DEBU 3e5 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e6 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +"2019-07-20 02:39:44.916 UTC [msp.identity] Verify -> DEBU 3e7 Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +"2019-07-20 02:39:44.917 UTC [gossip.gossip] handleMessage -> DEBU 3e8 Exiting" +"2019-07-20 02:39:45.756 UTC [gossip.channel] reportMembershipChanges -> INFO 3e9 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-07-20 02:39:46.780 UTC [gossip.election] waitForInterrupt -> DEBU 3ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:39:46.781 UTC [gossip.election] beLeader -> INFO 3eb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-07-20 02:39:46.781 UTC [gossip.service] func1 -> INFO 3ec Elected as a leader, starting delivery service for channel businesschannel" +"2019-07-20 02:39:46.782 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3ed This peer will pass blocks from orderer service to other peers for channel businesschannel" +"2019-07-20 02:39:46.782 UTC [gossip.election] leaderElection -> DEBU 3ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:39:46.782 UTC [gossip.election] IsLeader -> DEBU 3ef c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:39:46.782 UTC [ConnProducer] NewConnection -> DEBU 3f0 Creating a new connection" +"2019-07-20 02:39:46.782 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" +"2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510021801 " +"2019-07-20 02:39:46.783 UTC [msp.identity] Sign -> DEBU 3f3 Sign: digest: 1432909845E8D004A1C68176560DDCFBA5B49F384912BA88B279E39B18E3C1AA " +"2019-07-20 02:39:46.783 UTC [gossip.election] waitForInterrupt -> DEBU 3f4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f5 parsed scheme: """ +"2019-07-20 02:39:46.784 UTC [grpc] DialContext -> DEBU 3f6 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:46.785 UTC [grpc] watcher -> DEBU 3f7 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-07-20 02:39:46.785 UTC [grpc] switchBalancer -> DEBU 3f8 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:46.785 UTC [grpc] HandleSubConnStateChange -> DEBU 3f9 pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, CONNECTING" +"2019-07-20 02:39:46.786 UTC [gossip.comm] Send -> DEBU 3fa Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:39:46.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc Exiting" +"2019-07-20 02:39:46.793 UTC [grpc] HandleSubConnStateChange -> DEBU 3fd pickfirstBalancer: HandleSubConnStateChange: 0xc003124010, READY" +"2019-07-20 02:39:46.793 UTC [ConnProducer] NewConnection -> DEBU 3fe Connected to {orderer2.example.com:7050 [OrdererMSP]}" +"2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 3ff Connected to orderer2.example.com:7050" +"2019-07-20 02:39:46.794 UTC [deliveryClient] connect -> DEBU 400 Establishing gRPC stream with orderer2.example.com:7050 ..." +"2019-07-20 02:39:46.795 UTC [deliveryClient] afterConnect -> DEBU 401 Entering" +"2019-07-20 02:39:46.795 UTC [deliveryClient] RequestBlocks -> DEBU 402 Starting deliver with block [1] for channel businesschannel" +"2019-07-20 02:39:46.795 UTC [msp] GetDefaultSigningIdentity -> DEBU 403 Obtaining default signing identity" +"2019-07-20 02:39:46.796 UTC [msp] GetDefaultSigningIdentity -> DEBU 404 Obtaining default signing identity" +"2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 405 Sign: plaintext: 0A91070A3D08051A0608F2FDC9E90522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +"2019-07-20 02:39:46.796 UTC [msp.identity] Sign -> DEBU 406 Sign: digest: 953E55B39D6C84B1B8FAB1F76B5216C49716B7C4798A7B67FEFC0A262BE8C43D " +"2019-07-20 02:39:46.797 UTC [deliveryClient] afterConnect -> DEBU 407 Exiting" +"2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 408 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 409 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:46.799 UTC [policies] Evaluate -> DEBU 40c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:46.799 UTC [msp] DeserializeIdentity -> DEBU 40d Obtaining identity" +"2019-07-20 02:39:46.800 UTC [msp.identity] newIdentity -> DEBU 40e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS +hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg +rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC +dg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.801 UTC [cauthdsl] func1 -> DEBU 40f 0xc0031ba1c0 gate 1563590386800569000 evaluation starts" +"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 410 0xc0031ba1c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 411 0xc0031ba1c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 412 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:39:46.801 UTC [msp] Validate -> DEBU 413 MSP OrdererMSP validating identity" +"2019-07-20 02:39:46.801 UTC [cauthdsl] func2 -> DEBU 414 0xc0031ba1c0 principal matched by identity 0" +"2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 415 Verify: digest = 00000000 2a 51 2b 81 9b 58 5f 83 5d 96 56 e0 0c 32 21 62 |*Q+..X_.].V..2!b| +00000010 51 5a 0e 98 23 59 6f 1b 20 3f 1e 94 dd bf e4 00 |QZ..#Yo. ?......|" +"2019-07-20 02:39:46.802 UTC [msp.identity] Verify -> DEBU 416 Verify: sig = 00000000 30 45 02 21 00 d6 1f 11 02 a7 d0 fb c5 bd 4f 88 |0E.!..........O.| +00000010 bd ba 48 48 a1 d7 47 1e c2 f0 aa b8 2b b7 60 6b |..HH..G.....+.`k| +00000020 4f 91 ce 17 f8 02 20 03 5d 63 03 23 45 9d dd f2 |O..... .]c.#E...| +00000030 bc 8e ca bd 37 2f 00 73 99 d4 41 bd f1 dd ac 4d |....7/.s..A....M| +00000040 73 6a 36 c3 77 b4 7e |sj6.w.~|" +"2019-07-20 02:39:46.802 UTC [cauthdsl] func2 -> DEBU 417 0xc0031ba1c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:46.802 UTC [cauthdsl] func1 -> DEBU 418 0xc0031ba1c0 gate 1563590386800569000 evaluation succeeds" +"2019-07-20 02:39:46.802 UTC [policies] Evaluate -> DEBU 419 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41b Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:46.803 UTC [policies] Evaluate -> DEBU 41c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:46.804 UTC [blocksProvider] DeliverBlocks -> DEBU 41d [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 41e [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 41f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +"2019-07-20 02:39:46.804 UTC [gossip.state] deliverPayloads -> DEBU 420 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +"2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> INFO 421 [businesschannel] Received block [1] from buffer" +"2019-07-20 02:39:46.804 UTC [gossip.privdata] StoreBlock -> DEBU 422 [businesschannel] Validating block [1]" +"2019-07-20 02:39:46.804 UTC [committer.txvalidator] Validate -> DEBU 423 [businesschannel] START Block Validation for block [1]" +"2019-07-20 02:39:46.805 UTC [committer.txvalidator] Validate -> DEBU 424 expecting 1 block validation responses" +"2019-07-20 02:39:46.805 UTC [committer.txvalidator] validateTx -> DEBU 425 [businesschannel] validateTx starts for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" +"2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 426 ValidateTransactionEnvelope starts for envelope 0xc0030ee6e0" +"2019-07-20 02:39:46.805 UTC [protoutils] ValidateTransaction -> DEBU 427 Header is channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " +"2019-07-20 02:39:46.806 UTC [protoutils] validateChannelHeader -> DEBU 428 validateChannelHeader info: header type 1" +"2019-07-20 02:39:46.806 UTC [protoutils] checkSignatureFromCreator -> DEBU 429 begin" +"2019-07-20 02:39:46.806 UTC [msp] GetManagerForChain -> DEBU 42a Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:39:46.806 UTC [msp] DeserializeIdentity -> DEBU 42b Obtaining identity" +"2019-07-20 02:39:46.806 UTC [msp.identity] newIdentity -> DEBU 42c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42d creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-07-20 02:39:46.807 UTC [msp] Validate -> DEBU 42e MSP OrdererMSP validating identity" +"2019-07-20 02:39:46.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 42f creator is valid" +"2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 430 Verify: digest = 00000000 25 35 ec 33 45 77 c7 37 be bb 38 55 c9 64 6e df |%5.3Ew.7..8U.dn.| +00000010 0b 2d 1f d1 fc fc dd 1e 86 21 54 a6 54 c9 a8 da |.-.......!T.T...|" +"2019-07-20 02:39:46.807 UTC [msp.identity] Verify -> DEBU 431 Verify: sig = 00000000 30 44 02 20 3b b3 0e 3c 0b b2 75 13 96 13 37 4c |0D. ;..<..u...7L| +00000010 0c d1 15 d4 40 ff 19 4a 13 ea 8f bd 76 a7 c0 b5 |....@..J....v...| +00000020 aa c5 7c 6a 02 20 62 6a 7d 0c 2b df ed 05 f1 26 |..|j. bj}.+....&| +00000030 6f af 79 9f 81 51 a7 54 83 81 b0 f1 ee 43 39 b1 |o.y..Q.T.....C9.| +00000040 dd aa 68 72 78 34 |..hrx4|" +"2019-07-20 02:39:46.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 432 exits successfully" +"2019-07-20 02:39:46.808 UTC [protoutils] validateConfigTransaction -> DEBU 433 validateConfigTransaction starts for data 0xc0031de000, header channel_header:"\010\001\032\006\010\357\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\260\250\350f)\323l\022\2223\341\343\230\3354p\225\t9t\013\330h\271" " +"2019-07-20 02:39:46.808 UTC [committer.txvalidator] validateTx -> DEBU 434 Transaction is for channel businesschannel" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:46.809 UTC [common.configtx] addToMap -> DEBU 43d Adding to config map: [Group] /Channel" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43e Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 43f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 440 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 441 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 442 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 443 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 444 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:46.810 UTC [common.configtx] addToMap -> DEBU 445 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:46.811 UTC [common.configtx] verifyDeltaSet -> DEBU 446 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:46.811 UTC [common.configtx] policyForItem -> DEBU 447 Getting policy for item Org1MSP with mod_policy Admins" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 448 Manager Channel looking up path [Application]" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 449 Manager Channel has managers Orderer" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44a Manager Channel has managers Application" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44b Manager Channel/Application looking up path []" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44c Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44d Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44e Manager Channel/Application looking up path [Org1MSP]" +"2019-07-20 02:39:46.811 UTC [policies] Manager -> DEBU 44f Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 450 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:46.812 UTC [policies] Manager -> DEBU 451 Manager Channel/Application/Org1MSP looking up path []" +"2019-07-20 02:39:46.812 UTC [policies] Evaluate -> DEBU 452 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:39:46.812 UTC [cauthdsl] func1 -> DEBU 453 0xc00320f870 gate 1563590386812191300 evaluation starts" +"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 454 0xc00320f870 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 455 0xc00320f870 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.812 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 456 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:46.812 UTC [cauthdsl] func2 -> DEBU 457 0xc00320f870 principal matched by identity 0" +"2019-07-20 02:39:46.812 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 d0 8c f8 33 3a 53 08 b2 25 e3 c1 57 24 6c 7f 7e |...3:S..%..W$l.~| +00000010 fc e0 43 13 1d 6d 47 61 88 d7 3e 5e 27 6e a4 61 |..C..mGa..>^'n.a|" +"2019-07-20 02:39:46.813 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 8b 15 1b 61 c3 0a 11 a9 73 73 0e |0E.!....a....ss.| +00000010 c5 d5 8d 9e 58 19 b7 34 ff 01 d1 56 e3 c0 c8 41 |....X..4...V...A| +00000020 cd c4 5e 27 bf 02 20 20 dd 92 70 12 89 15 aa 71 |..^'.. ..p....q| +00000030 b0 48 23 49 ea 94 34 55 77 4d 3e 37 c8 89 72 29 |.H#I..4UwM>7..r)| +00000040 b4 14 85 f1 cd 6f 15 |.....o.|" +"2019-07-20 02:39:46.813 UTC [cauthdsl] func2 -> DEBU 45a 0xc00320f870 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:46.813 UTC [cauthdsl] func1 -> DEBU 45b 0xc00320f870 gate 1563590386812191300 evaluation succeeds" +"2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:46.813 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:46.813 UTC [common.configtx] verifyDeltaSet -> DEBU 45e Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.804 UTC [gossip.state] addPayload -> DEBU 465 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:39:46.814 UTC [blocksProvider] DeliverBlocks -> DEBU 466 [businesschannel] Gossiping block [1], peers number [1]" +"2019-07-20 02:39:46.815 UTC [gossip.channel] AddToMsgStore -> DEBU 467 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:39:46.815 UTC [gossip.pull] Add -> DEBU 468 Added 1, total items: 1" +"2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 469 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.816 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 46a Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.816 UTC [policies] Evaluate -> DEBU 46b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:46.817 UTC [policies] Evaluate -> DEBU 46d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:39:46.817 UTC [cauthdsl] func1 -> DEBU 46e 0xc003223060 gate 1563590386817258300 evaluation starts" +"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 46f 0xc003223060 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 470 0xc003223060 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.817 UTC [cauthdsl] func2 -> DEBU 471 0xc003223060 principal matched by identity 0" +"2019-07-20 02:39:46.814 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.817 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Readers to " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Writers to " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Endorsement to " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.818 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.819 UTC [common.channelconfig] NewStandardValues -> DEBU 483 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:46.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: HashingAlgorithm" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: OrdererAddresses" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: Consortium" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: ACLs" +"2019-07-20 02:39:46.817 UTC [msp.identity] Verify -> DEBU 48b Verify: digest = 00000000 ec 21 1e f7 b6 5d f6 9d 41 b5 b2 a5 30 d2 80 0c |.!...]..A...0...| +00000010 19 82 c6 dc a3 34 8b 5b ca 65 18 81 5a 92 65 b6 |.....4.[.e..Z.e.|" +"2019-07-20 02:39:46.820 UTC [msp.identity] Verify -> DEBU 48c Verify: sig = 00000000 30 44 02 20 68 ec 42 5d 5b 55 ae b4 32 48 79 cd |0D. h.B][U..2Hy.| +00000010 90 85 a8 26 03 4b d1 24 88 ba a3 5a 56 1c bb d5 |...&.K.$...ZV...| +00000020 bc ec 81 46 02 20 35 65 1b 5e 90 17 74 6e 3d 5e |...F. 5e.^..tn=^| +00000030 14 9b c7 91 dd b6 7f 47 59 b9 98 de 50 3a 29 32 |.......GY...P:)2| +00000040 1d bc 73 d9 73 c0 |..s.s.|" +"2019-07-20 02:39:46.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48d Processing field: Capabilities" +"2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:46.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 490 Processing field: AnchorPeers" +"2019-07-20 02:39:46.821 UTC [cauthdsl] func2 -> DEBU 48f 0xc003223060 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:46.821 UTC [cauthdsl] func1 -> DEBU 491 0xc003223060 gate 1563590386817258300 evaluation succeeds" +"2019-07-20 02:39:46.821 UTC [common.channelconfig] NewStandardValues -> DEBU 492 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.821 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:46.822 UTC [common.channelconfig] initializeProtosStruct -> DEBU 493 Processing field: MSP" +"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:46.822 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:46.822 UTC [blocksProvider] DeliverBlocks -> DEBU 498 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49a [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-07-20 02:39:46.822 UTC [common.channelconfig] Validate -> DEBU 499 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:46.823 UTC [common.channelconfig] validateMSP -> DEBU 49b Setting up MSP for org Org1MSP" +"2019-07-20 02:39:46.823 UTC [gossip.state] addPayload -> DEBU 49c Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:39:46.823 UTC [msp] newBccspMsp -> DEBU 49d Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.824 UTC [msp] New -> DEBU 49e Creating Cache-MSP instance" +"2019-07-20 02:39:46.823 UTC [blocksProvider] DeliverBlocks -> DEBU 49f [businesschannel] Gossiping block [2], peers number [1]" +"2019-07-20 02:39:46.824 UTC [gossip.channel] AddToMsgStore -> DEBU 4a0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:39:46.824 UTC [gossip.pull] Add -> DEBU 4a1 Added 2, total items: 2" +"2019-07-20 02:39:46.824 UTC [msp] Setup -> DEBU 4a2 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.825 UTC [msp.identity] newIdentity -> DEBU 4a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a5 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:46.826 UTC [gossip.comm] Send -> DEBU 4a6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23762 bytes, seq: 2}, Envelope: 23795 bytes, Signature: 0 bytes" +"2019-07-20 02:39:46.826 UTC [gossip.comm] sendToEndpoint -> DEBU 4a8 Exiting" +"2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23707 bytes, seq: 1}, Envelope: 23740 bytes, Signature: 0 bytes" +"2019-07-20 02:39:46.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4aa Exiting" +"2019-07-20 02:39:46.828 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4ab Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:46.828 UTC [msp] Validate -> DEBU 4ac MSP Org1MSP validating identity" +"2019-07-20 02:39:46.828 UTC [msp] getCertificationChain -> DEBU 4ad MSP Org1MSP getting certification chain" +"2019-07-20 02:39:46.830 UTC [msp] hasOURole -> DEBU 4ae MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:46.830 UTC [msp] getCertificationChain -> DEBU 4af MSP Org1MSP getting certification chain" +"2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b1 Processing field: AnchorPeers" +"2019-07-20 02:39:46.830 UTC [common.channelconfig] NewStandardValues -> DEBU 4b2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b3 Processing field: MSP" +"2019-07-20 02:39:46.830 UTC [common.channelconfig] Validate -> DEBU 4b4 Anchor peers for org Org2MSP are " +"2019-07-20 02:39:46.830 UTC [common.channelconfig] validateMSP -> DEBU 4b5 Setting up MSP for org Org2MSP" +"2019-07-20 02:39:46.830 UTC [msp] newBccspMsp -> DEBU 4b6 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.830 UTC [msp] New -> DEBU 4b7 Creating Cache-MSP instance" +"2019-07-20 02:39:46.830 UTC [msp] Setup -> DEBU 4b8 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4b9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.831 UTC [msp.identity] newIdentity -> DEBU 4ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.831 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4bb Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:46.831 UTC [msp] Validate -> DEBU 4bc MSP Org2MSP validating identity" +"2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bd MSP Org2MSP getting certification chain" +"2019-07-20 02:39:46.831 UTC [msp] hasOURole -> DEBU 4be MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:46.831 UTC [msp] getCertificationChain -> DEBU 4bf MSP Org2MSP getting certification chain" +"2019-07-20 02:39:46.831 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" +"2019-07-20 02:39:46.831 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" +"2019-07-20 02:39:46.832 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:46.832 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.832 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" +"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.832 UTC [msp.identity] newIdentity -> DEBU 4d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.832 UTC [msp] Validate -> DEBU 4d1 MSP OrdererMSP validating identity" +"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d2 Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:46.832 UTC [msp] Setup -> DEBU 4d3 MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:46.832 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e4 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e6 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e8 Proposed new policy Admins for Channel" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4e9 Proposed new policy Readers for Channel" +"2019-07-20 02:39:46.833 UTC [policies] NewManagerImpl -> DEBU 4ea Proposed new policy Writers for Channel" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Group] /Channel" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:46.833 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:46.834 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:46.844 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:46.846 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:46.847 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:46.848 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:46.849 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:46.850 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:46.851 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:46.852 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:46.853 UTC [comm.grpc.server] 1 -> INFO 50b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.848Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=186.8µs +"2019-07-20 02:39:46.853 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:46.854 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:46.856 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:46.857 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:46.857 UTC [msp] GetDefaultSigningIdentity -> DEBU 512 Obtaining default signing identity" +"2019-07-20 02:39:46.858 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:46.859 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:46.859 UTC [msp.identity] Sign -> DEBU 515 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:46.860 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:46.861 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51c As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:46.861 UTC [msp.identity] Sign -> DEBU 51a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:46.861 UTC [common.channelconfig] LogSanityChecks -> DEBU 51d As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:46.862 UTC [policies] Manager -> DEBU 51f Manager Channel looking up path [Application]" +"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 520 Manager Channel has managers Orderer" +"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 521 Manager Channel has managers Application" +"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 522 Manager Channel/Application looking up path []" +"2019-07-20 02:39:46.863 UTC [policies] Manager -> DEBU 523 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 524 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 525 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 526 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:46.864 UTC [common.channelconfig] LogSanityChecks -> DEBU 527 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 528 Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 529 Manager Channel has managers Application" +"2019-07-20 02:39:46.864 UTC [policies] Manager -> DEBU 52a Manager Channel has managers Orderer" +"2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52b Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:46.865 UTC [policies] Manager -> DEBU 52c Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52e As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:46.865 UTC [common.channelconfig] LogSanityChecks -> DEBU 52f As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:46.866 UTC [common.channelconfig] LogSanityChecks -> DEBU 530 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 531 Application capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:46.866 UTC [common.capabilities] Supported -> DEBU 532 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 533 Processing new config for channel businesschannel" +"2019-07-20 02:39:46.866 UTC [gossip.service] ProcessConfigUpdate -> DEBU 534 Calling out because config was updated for channel businesschannel" +"2019-07-20 02:39:46.866 UTC [gossip.service] updateAnchors -> DEBU 535 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-07-20 02:39:46.862 UTC [gossip.comm] authenticateRemotePeer -> DEBU 51e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33978" +"2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 536 Org2MSP anchor peers: []" +"2019-07-20 02:39:46.867 UTC [gossip.service] updateAnchors -> DEBU 537 Creating state provider for chainID businesschannel" +"2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 538 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.867 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 539 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:46.867 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53b Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33978" +"2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53d Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:39:46.869 UTC [msp.identity] Verify -> DEBU 53e Verify: sig = 00000000 30 45 02 21 00 e6 68 9d c5 63 b9 1c b9 e7 c5 c3 |0E.!..h..c......| +00000010 94 54 c8 7b 93 fd a5 57 66 d8 c1 b1 b3 4b 3a 64 |.T.{...Wf....K:d| +00000020 f8 81 bf 34 ff 02 20 0d 6a 26 1f c2 fd 8e 9d 27 |...4.. .j&.....'| +00000030 40 36 ac 2e f4 f5 49 b5 cd 2d 36 14 10 59 89 2a |@6....I..-6..Y.*| +00000040 a4 d4 d7 37 c6 5a 5b |...7.Z[|" +"2019-07-20 02:39:46.867 UTC [policies] Evaluate -> DEBU 53c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:46.870 UTC [gossip.comm] authenticateRemotePeer -> DEBU 53f Authenticated 172.18.0.6:33978" +"2019-07-20 02:39:46.870 UTC [gossip.comm] GossipStream -> DEBU 542 Servicing 172.18.0.6:33978" +"2019-07-20 02:39:46.870 UTC [grpc] infof -> DEBU 543 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:46.870 UTC [policies] Evaluate -> DEBU 540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:46.870 UTC [cauthdsl] func1 -> DEBU 544 0xc00333efd0 gate 1563590386870913500 evaluation starts" +"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 545 0xc00333efd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 547 0xc00333efd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 548 0xc00333efd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:39:46.871 UTC [cauthdsl] func2 -> DEBU 549 0xc00333efd0 principal evaluation fails" +"2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 54a 0xc00333efd0 gate 1563590386870913500 evaluation fails" +"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:46.871 UTC [policies] Evaluate -> DEBU 54d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:46.871 UTC [gossip.comm] func2 -> DEBU 54f Client 172.18.0.6:33978 disconnected" +"2019-07-20 02:39:46.870 UTC [gossip.comm] writeToStream -> DEBU 546 Closing writing to stream" +"2019-07-20 02:39:46.872 UTC [gossip.comm] serviceConnection -> DEBU 552 Closing reading from stream" +"2019-07-20 02:39:46.872 UTC [gossip.comm] writeToStream -> DEBU 553 Closing writing to stream" +"2019-07-20 02:39:46.871 UTC [gossip.comm] readFromStream -> DEBU 54e Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:46.872 UTC [gossip.comm] func2 -> DEBU 554 Client 172.18.0.6:33928 disconnected" +"2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 555 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:33928 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=14.4132261s +"2019-07-20 02:39:46.871 UTC [cauthdsl] func1 -> DEBU 550 0xc00333f810 gate 1563590386871972100 evaluation starts" +"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 556 0xc00333f810 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 557 0xc00333f810 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.873 UTC [cauthdsl] func2 -> DEBU 558 0xc00333f810 principal matched by identity 0" +"2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 559 Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +"2019-07-20 02:39:46.873 UTC [msp.identity] Verify -> DEBU 55a Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +"2019-07-20 02:39:46.873 UTC [gossip.comm] readFromStream -> DEBU 55b a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-07-20 02:39:46.874 UTC [cauthdsl] func2 -> DEBU 55c 0xc00333f810 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:46.870 UTC [gossip.gossip] handleMessage -> DEBU 541 Entering, 172.18.0.6:33928 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-07-20 02:39:46.872 UTC [comm.grpc.server] 1 -> INFO 551 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.856Z grpc.peer_address=172.18.0.6:33978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.9128ms +"2019-07-20 02:39:46.874 UTC [cauthdsl] func1 -> DEBU 55d 0xc00333f810 gate 1563590386871972100 evaluation succeeds" +"2019-07-20 02:39:46.876 UTC [gossip.gossip] handleMessage -> DEBU 55e Exiting" +"2019-07-20 02:39:46.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 55f Got message: GossipMessage: nonce:580165058965807529 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-07-20 02:39:46.877 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 561 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 562 Verify: digest = 00000000 cd 84 f2 4d a0 ca 90 19 dc e8 13 7f f3 2a 14 d1 |...M.........*..| +00000010 fa d8 d3 a2 37 42 49 99 12 d5 bb 16 8a ad 9a f7 |....7BI.........|" +"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 563 Verify: sig = 00000000 30 45 02 21 00 d0 bf f2 10 6b bf 25 cb 17 78 34 |0E.!.....k.%..x4| +00000010 82 53 3b 90 a3 64 b3 cb be e8 25 7e 7d c5 f6 3e |.S;..d....%~}..>| +00000020 75 1d 94 93 59 02 20 7a 61 9e af a7 1d 69 e2 9d |u...Y. za....i..| +00000030 00 8b ae 7b 47 4b 06 83 4b a4 d4 f5 6d be f6 75 |...{GK..K...m..u| +00000040 fd b2 62 23 5d 5b 7f |..b#][.|" +"2019-07-20 02:39:46.877 UTC [msp.identity] Verify -> DEBU 564 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:46.878 UTC [msp.identity] Verify -> DEBU 565 Verify: sig = 00000000 30 44 02 20 04 d5 f4 aa 80 23 d0 2f e4 aa 11 08 |0D. .....#./....| +00000010 50 26 5d 31 5d c6 30 c8 f6 db 9a 50 4e ea a0 10 |P&]1].0....PN...| +00000020 b3 7d d2 0d 02 20 37 3c 15 1c fd 43 09 0d d5 b3 |.}... 7<...C....| +00000030 a7 17 a0 16 69 42 38 04 8c 72 96 9a f8 68 34 89 |....iB8..r...h4.| +00000040 19 01 83 a1 fa 15 |......|" +"2019-07-20 02:39:46.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 566 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 567 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:46.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 568 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 569 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 56b Exiting" +"2019-07-20 02:39:46.876 UTC [policies] Evaluate -> DEBU 560 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:46.881 UTC [policies] Evaluate -> DEBU 56c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:46.882 UTC [policies] Evaluate -> DEBU 56e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:46.885 UTC [gossip.gossip] JoinChan -> INFO 56f Joining gossip network of channel businesschannel with 2 organizations" +"2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 570 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-07-20 02:39:46.885 UTC [gossip.gossip] learnAnchorPeers -> INFO 571 Anchor peer with same endpoint, skipping connecting to myself" +"2019-07-20 02:39:46.887 UTC [gossip.gossip] learnAnchorPeers -> INFO 572 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-07-20 02:39:46.887 UTC [gossip.service] updateEndpoints -> DEBU 573 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-07-20 02:39:46.891 UTC [peer] updateTrustedRoots -> DEBU 574 Updating trusted root authorities for channel businesschannel" +"2019-07-20 02:39:46.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 575 Exiting" +"2019-07-20 02:39:46.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 576 Exiting" +"2019-07-20 02:39:46.892 UTC [gossip.discovery] sendMemResponse -> DEBU 577 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:46.896 UTC [gossip.comm] Send -> DEBU 578 Entering, sending GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:46.898 UTC [gossip.discovery] sendMemResponse -> DEBU 579 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\014" signature:"0E\002!\000\320\277\362\020k\277%\313\027x4\202S;\220\243d\263\313\276\350%~}\305\366>u\035\224\223Y\002 za\236\257\247\035i\342\235\000\213\256{GK\006\203K\244\324\365m\276\366u\375\262b#][\177" secret_envelope: > alive:\316\367\016A]\027\374i\355.\302v\372\204\340\306D\320\211Z\305\223\232\002 rH]\370\312\310\322\022\010\323\244<\000;\003\362\030\302O\017g\030\252.WV\320pr0\343\203" > > " +"2019-07-20 02:39:46.898 UTC [gossip.comm] sendToEndpoint -> DEBU 57a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 580165058965807529, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes" +"2019-07-20 02:39:46.898 UTC [gossip.comm] createConnection -> DEBU 57b Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57c parsed scheme: """ +"2019-07-20 02:39:46.908 UTC [grpc] DialContext -> DEBU 57d scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:46.908 UTC [grpc] watcher -> DEBU 57e ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-07-20 02:39:46.908 UTC [grpc] switchBalancer -> DEBU 57f ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:46.908 UTC [grpc] HandleSubConnStateChange -> DEBU 580 pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, CONNECTING" +"2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 581 updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:46.923 UTC [peer] buildTrustedRootsForChain -> DEBU 582 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:46.924 UTC [peer] buildTrustedRootsForChain -> DEBU 583 adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:46.925 UTC [peer] buildTrustedRootsForChain -> DEBU 584 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:46.927 UTC [committer.txvalidator] validateTx -> DEBU 585 config transaction received for chain businesschannel" +"2019-07-20 02:39:46.928 UTC [committer.txvalidator] validateTx -> DEBU 586 [businesschannel] validateTx completes for block 0xc0030867c0 env 0xc0030ee6e0 txn 0" +"2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> DEBU 587 got result for idx 0, code 0" +"2019-07-20 02:39:46.928 UTC [committer.txvalidator] Validate -> INFO 588 [businesschannel] Validated block [1] in 123ms" +"2019-07-20 02:39:46.929 UTC [gossip.privdata] listMissingPrivateData -> DEBU 589 Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:39:46.929 UTC [gossip.privdata] StoreBlock -> DEBU 58a [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:39:46.929 UTC [committer] preCommit -> DEBU 58b Received configuration update, calling CSCC ConfigUpdate" +"2019-07-20 02:39:46.930 UTC [kvledger] CommitWithPvtData -> DEBU 58c [businesschannel] Validating state for block [1]" +"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58e lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:39:46.930 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 58f Validating new block with num trans = [1]" +"2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 590 ValidateAndPrepareBatch() for block number = [1]" +"2019-07-20 02:39:46.930 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 591 preprocessing ProtoBlock..." +"2019-07-20 02:39:46.930 UTC [valimpl] preprocessProtoBlock -> DEBU 592 txType=CONFIG" +"2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 593 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-07-20 02:39:46.935 UTC [valimpl] processNonEndorserTx -> DEBU 594 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 595 constructing new tx simulator" +"2019-07-20 02:39:46.935 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 596 constructing new tx simulator txid = []" +"2019-07-20 02:39:46.935 UTC [peer] GenerateSimulationResults -> DEBU 597 Processing CONFIG" +"2019-07-20 02:39:46.936 UTC [peer] processChannelConfigTx -> DEBU 598 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-07-20 02:39:46.936 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 599 Simulation completed, getting simulation results" +"2019-07-20 02:39:46.937 UTC [lockbasedtxmgr] Done -> DEBU 59a Done with transaction simulation / query execution []" +"2019-07-20 02:39:46.937 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 59b Block [1] Transaction index [0] TxId [] marked as valid by state validator" +"2019-07-20 02:39:46.937 UTC [valinternal] ApplyWriteSet -> DEBU 59c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034a4340)}" +"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59d validating rwset..." +"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59e postprocessing ProtoBlock..." +"2019-07-20 02:39:46.937 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 59f ValidateAndPrepareBatch() complete" +"2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a0 [businesschannel] Adding CommitHash to the block [1]" +"2019-07-20 02:39:46.938 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Committing block [1] to storage" +"2019-07-20 02:39:46.938 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5a2 Writing block [1] to pvt block store" +"2019-07-20 02:39:46.940 UTC [pvtdatastorage] Prepare -> DEBU 5a3 Saved 0 private data write sets for block [1]" +"2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a4 Indexing block [blockNum=1, blockHash=[]byte{0xad, 0x6d, 0x1e, 0xa9, 0x18, 0xba, 0xbc, 0xca, 0xf6, 0xcf, 0x8e, 0xc0, 0x90, 0xeb, 0x4b, 0xfb, 0x6e, 0x2f, 0xc6, 0x7d, 0xf5, 0x4e, 0x4d, 0x7d, 0x6, 0xa6, 0xef, 0x4f, 0x93, 0x80, 0x1f, 0xd9} txOffsets= +txId=4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94 locPointer=offset=71, bytesLength=22685 +]" +"2019-07-20 02:39:46.941 UTC [fsblkstorage] indexBlock -> DEBU 5a5 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to txid-index" +"2019-07-20 02:39:46.942 UTC [fsblkstorage] indexBlock -> DEBU 5a6 Adding txLoc [fileSuffixNum=0, offset=24019, bytesLength=22685] for tx number:[0] ID: [4cd1245e1db08b1f0d0d6bddb4c4396d159541a8ef1b52b4f709df5e717f1b94] to blockNumTranNum index" +"2019-07-20 02:39:46.943 UTC [comm.grpc.server] 1 -> INFO 5a7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:48.941Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=633.9µs +"2019-07-20 02:39:46.943 UTC [fsblkstorage] updateCheckpoint -> DEBU 5a8 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47677], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-07-20 02:39:46.944 UTC [pvtdatastorage] Commit -> DEBU 5a9 Committing private data for block [1]" +"2019-07-20 02:39:46.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 5aa Obtaining default signing identity" +"2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:46.945 UTC [msp.identity] Sign -> DEBU 5ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:33980" +"2019-07-20 02:39:46.946 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ae Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:33980" +"2019-07-20 02:39:46.947 UTC [pvtdatastorage] Commit -> DEBU 5af Committed private data for block [1]" +"2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:39:46.947 UTC [msp.identity] Verify -> DEBU 5b1 Verify: sig = 00000000 30 45 02 21 00 c6 00 24 ca 9b 7c 79 5f aa f1 d8 |0E.!...$..|y_...| +00000010 49 b1 94 84 23 ca b1 74 68 be 9a 8a f2 af 9e 5b |I...#..th......[| +00000020 44 d8 d5 60 94 02 20 56 85 55 3c fc 1d e8 72 06 |D..`.. V.U<...r.| +00000030 3e a0 b9 ee 08 40 46 4e 05 6d 49 59 75 e1 2e 9d |>....@FN.mIYu...| +00000040 b2 2f ad 1b ae af 10 |./.....|" +"2019-07-20 02:39:46.947 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b2 Authenticated 172.18.0.6:33980" +"2019-07-20 02:39:46.947 UTC [gossip.comm] GossipStream -> DEBU 5b3 Servicing 172.18.0.6:33980" +"2019-07-20 02:39:46.948 UTC [kvledger] CommitWithPvtData -> DEBU 5b4 [businesschannel] Committing block [1] transactions to state database" +"2019-07-20 02:39:46.948 UTC [lockbasedtxmgr] Commit -> DEBU 5b5 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b6 Committing updates to state database" +"2019-07-20 02:39:46.950 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5b7 Building the expiry schedules based on the update batch" +"2019-07-20 02:39:46.950 UTC [lockbasedtxmgr] Commit -> DEBU 5b8 Write lock acquired for committing updates to state database" +"2019-07-20 02:39:46.951 UTC [stateleveldb] ApplyUpdates -> DEBU 5b9 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-07-20 02:39:46.952 UTC [grpc] HandleSubConnStateChange -> DEBU 5ba pickfirstBalancer: HandleSubConnStateChange: 0xc0033ff750, READY" +"2019-07-20 02:39:46.954 UTC [lockbasedtxmgr] Commit -> DEBU 5bb Updates committed to state database and the write lock is released" +"2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5bc Preparing potential purge list working-set for expiringAtBlk [2]" +"2019-07-20 02:39:46.954 UTC [leveldbhelper] GetIterator -> DEBU 5bd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +"2019-07-20 02:39:46.954 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5be No expiry entry found for expiringAtBlk [2]" +"2019-07-20 02:39:46.955 UTC [lockbasedtxmgr] func1 -> DEBU 5bf launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:46.955 UTC [kvledger] CommitWithPvtData -> DEBU 5c1 [businesschannel] Committing block [1] transactions to history database" +"2019-07-20 02:39:46.955 UTC [historyleveldb] Commit -> DEBU 5c3 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +"2019-07-20 02:39:46.956 UTC [historyleveldb] Commit -> DEBU 5c6 Skipping transaction [0] since it is not an endorsement transaction" +"2019-07-20 02:39:46.955 UTC [gossip.comm] func2 -> DEBU 5c4 Client 172.18.0.6:33980 disconnected" +"2019-07-20 02:39:46.955 UTC [grpc] infof -> DEBU 5c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:46.955 UTC [gossip.comm] readFromStream -> DEBU 5c2 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:46.957 UTC [msp] GetDefaultSigningIdentity -> DEBU 5c7 Obtaining default signing identity" +"2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5ca Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:46.957 UTC [msp.identity] Sign -> DEBU 5cb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:46.957 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +"2019-07-20 02:39:46.957 UTC [comm.grpc.server] 1 -> INFO 5c8 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:56.945Z grpc.peer_address=172.18.0.6:33980 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6697ms +"2019-07-20 02:39:46.957 UTC [gossip.comm] writeToStream -> DEBU 5c9 Closing writing to stream" +"2019-07-20 02:39:46.958 UTC [historyleveldb] Commit -> DEBU 5cd Channel [businesschannel]: Updates committed to history database for blockNo [1]" +"2019-07-20 02:39:46.958 UTC [kvledger] CommitWithPvtData -> INFO 5ce [businesschannel] Committed block [1] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=9ms state_commit=7ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +"2019-07-20 02:39:46.959 UTC [msp] GetDefaultSigningIdentity -> DEBU 5cf Obtaining default signing identity" +"2019-07-20 02:39:46.960 UTC [msp.identity] Sign -> DEBU 5d0 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020802 " +"2019-07-20 02:39:46.961 UTC [msp.identity] Sign -> DEBU 5d2 Sign: digest: 50DAFA02918444C69E8D5B3E6A35836CE1EA25019336CA398AFA5A43E6AE0493 " +"2019-07-20 02:39:46.961 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d1 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:7051" +"2019-07-20 02:39:46.962 UTC [gossip.state] commitBlock -> DEBU 5d3 [businesschannel] Committed block [1] with 1 transaction(s)" +"2019-07-20 02:39:46.962 UTC [gossip.state] deliverPayloads -> DEBU 5d4 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +"2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> INFO 5d5 [businesschannel] Received block [2] from buffer" +"2019-07-20 02:39:46.962 UTC [msp.identity] Verify -> DEBU 5d6 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:39:46.963 UTC [msp.identity] Verify -> DEBU 5d8 Verify: sig = 00000000 30 44 02 20 0b f1 7c cc 6c b4 48 eb 91 f2 f1 19 |0D. ..|.l.H.....| +00000010 fc 62 08 0d 35 3f 49 b2 86 ae c9 a7 9c 71 8e 4c |.b..5?I......q.L| +00000020 96 eb 7a fc 02 20 55 90 38 56 a4 36 e3 ea 32 53 |..z.. U.8V.6..2S| +00000030 77 ab 19 e2 95 fa 1f b2 c3 d4 90 4d 74 5b 9b b5 |w..........Mt[..| +00000040 65 a8 15 be f4 15 |e.....|" +"2019-07-20 02:39:46.962 UTC [gossip.privdata] StoreBlock -> DEBU 5d7 [businesschannel] Validating block [2]" +"2019-07-20 02:39:46.963 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5d9 Authenticated 172.18.0.6:7051" +"2019-07-20 02:39:46.963 UTC [gossip.comm] createConnection -> DEBU 5da Exiting" +"2019-07-20 02:39:46.963 UTC [gossip.comm] sendToEndpoint -> DEBU 5db Exiting" +"2019-07-20 02:39:46.963 UTC [committer.txvalidator] Validate -> DEBU 5dc [businesschannel] START Block Validation for block [2]" +"2019-07-20 02:39:46.964 UTC [committer.txvalidator] Validate -> DEBU 5dd expecting 1 block validation responses" +"2019-07-20 02:39:46.964 UTC [committer.txvalidator] validateTx -> DEBU 5de [businesschannel] validateTx starts for block 0xc003516200 env 0xc00353d860 txn 0" +"2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5df ValidateTransactionEnvelope starts for envelope 0xc00353d860" +"2019-07-20 02:39:46.965 UTC [protoutils] ValidateTransaction -> DEBU 5e0 Header is channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " +"2019-07-20 02:39:46.965 UTC [protoutils] validateChannelHeader -> DEBU 5e1 validateChannelHeader info: header type 1" +"2019-07-20 02:39:46.965 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e2 begin" +"2019-07-20 02:39:46.966 UTC [msp] GetManagerForChain -> DEBU 5e3 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:39:46.966 UTC [msp] DeserializeIdentity -> DEBU 5e4 Obtaining identity" +"2019-07-20 02:39:46.967 UTC [msp.identity] newIdentity -> DEBU 5e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.967 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e6 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-07-20 02:39:46.967 UTC [msp] Validate -> DEBU 5e7 MSP OrdererMSP validating identity" +"2019-07-20 02:39:46.968 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 creator is valid" +"2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5e9 Verify: digest = 00000000 9f 6d 09 25 ee 9c 09 29 72 4a 00 54 a3 e7 6f d2 |.m.%...)rJ.T..o.| +00000010 9f 74 37 d2 0d 76 84 7e df a0 07 54 ac b3 e3 a9 |.t7..v.~...T....|" +"2019-07-20 02:39:46.968 UTC [msp.identity] Verify -> DEBU 5ea Verify: sig = 00000000 30 44 02 20 43 91 94 43 2a 23 d1 f0 c2 88 cb 7d |0D. C..C*#.....}| +00000010 79 5b 76 27 65 24 8c 15 89 2e 1f 51 c1 4e e9 6a |y[v'e$.....Q.N.j| +00000020 ba 07 4f ab 02 20 44 33 10 d9 f7 5c e3 28 87 66 |..O.. D3...\.(.f| +00000030 42 a7 ee f2 26 00 13 eb e7 18 7d a2 30 c1 25 a0 |B...&.....}.0.%.| +00000040 cb 1b 9e a8 cb 43 |.....C|" +"2019-07-20 02:39:46.969 UTC [protoutils] checkSignatureFromCreator -> DEBU 5eb exits successfully" +"2019-07-20 02:39:46.969 UTC [protoutils] validateConfigTransaction -> DEBU 5ec validateConfigTransaction starts for data 0xc0035d2000, header channel_header:"\010\001\032\006\010\361\375\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\325\335\034\246UK\017C\017\277\223\305\031\025\215\353\232\0222[\305wxl" " +"2019-07-20 02:39:46.969 UTC [committer.txvalidator] validateTx -> DEBU 5ed Transaction is for channel businesschannel" +"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Group] /Channel" +"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:46.970 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:46.971 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:46.972 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:46.973 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:46.973 UTC [common.configtx] verifyDeltaSet -> DEBU 5ff Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:46.973 UTC [common.configtx] policyForItem -> DEBU 600 Getting policy for item Org2MSP with mod_policy Admins" +"2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 601 Manager Channel looking up path [Application]" +"2019-07-20 02:39:46.973 UTC [policies] Manager -> DEBU 602 Manager Channel has managers Application" +"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 603 Manager Channel has managers Orderer" +"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 604 Manager Channel/Application looking up path []" +"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 605 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 606 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:46.974 UTC [policies] Manager -> DEBU 607 Manager Channel/Application looking up path [Org2MSP]" +"2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 608 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:46.975 UTC [policies] Manager -> DEBU 609 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:46.976 UTC [policies] Manager -> DEBU 60a Manager Channel/Application/Org2MSP looking up path []" +"2019-07-20 02:39:46.976 UTC [policies] Evaluate -> DEBU 60b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:39:46.976 UTC [msp] DeserializeIdentity -> DEBU 60c Obtaining identity" +"2019-07-20 02:39:46.976 UTC [msp.identity] newIdentity -> DEBU 60d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.977 UTC [cauthdsl] func1 -> DEBU 60e 0xc003603870 gate 1563590386977559500 evaluation starts" +"2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 60f 0xc003603870 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:46.977 UTC [cauthdsl] func2 -> DEBU 610 0xc003603870 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:46.978 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 611 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-07-20 02:39:46.978 UTC [cauthdsl] func2 -> DEBU 612 0xc003603870 principal matched by identity 0" +"2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 613 Verify: digest = 00000000 83 a0 03 90 a3 62 0e b0 41 72 f8 8c 5d ed 96 65 |.....b..Ar..]..e| +00000010 a1 10 61 76 ce 1a 9f 3b c1 14 e7 31 e1 0b 28 8c |..av...;...1..(.|" +"2019-07-20 02:39:46.978 UTC [msp.identity] Verify -> DEBU 614 Verify: sig = 00000000 30 44 02 20 1d dc 8f 2a 10 dd e1 b3 c2 1e 67 c8 |0D. ...*......g.| +00000010 d0 83 14 4a 8a 4f 0b 44 a9 84 14 8e 4e 4e 81 fa |...J.O.D....NN..| +00000020 2a bf 60 dd 02 20 13 77 6a d9 13 c1 b8 16 94 c2 |*.`.. .wj.......| +00000030 76 94 9e 55 51 8f 83 ea 63 67 05 f9 6a a4 ae 46 |v..UQ...cg..j..F| +00000040 e9 49 62 bf 87 8d |.Ib...|" +"2019-07-20 02:39:46.979 UTC [cauthdsl] func2 -> DEBU 615 0xc003603870 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:46.979 UTC [cauthdsl] func1 -> DEBU 616 0xc003603870 gate 1563590386977559500 evaluation succeeds" +"2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 617 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:46.979 UTC [policies] Evaluate -> DEBU 618 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:46.979 UTC [common.configtx] verifyDeltaSet -> DEBU 619 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.980 UTC [common.configtx] recurseConfigMap -> DEBU 61e Setting policy for key Admins to " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 61f Setting policy for key Endorsement to " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 620 Setting policy for key Readers to " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.981 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.982 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.983 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.984 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:39:46.984 UTC [common.channelconfig] NewStandardValues -> DEBU 631 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:39:46.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 632 Processing field: HashingAlgorithm" +"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 633 Processing field: BlockDataHashingStructure" +"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 634 Processing field: OrdererAddresses" +"2019-07-20 02:39:46.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 635 Processing field: Consortium" +"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 636 Processing field: Capabilities" +"2019-07-20 02:39:46.986 UTC [common.channelconfig] NewStandardValues -> DEBU 637 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 638 Processing field: ACLs" +"2019-07-20 02:39:46.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: Capabilities" +"2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: AnchorPeers" +"2019-07-20 02:39:46.987 UTC [common.channelconfig] NewStandardValues -> DEBU 63c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: MSP" +"2019-07-20 02:39:46.987 UTC [common.channelconfig] Validate -> DEBU 63e Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:39:46.988 UTC [common.channelconfig] validateMSP -> DEBU 63f Setting up MSP for org Org1MSP" +"2019-07-20 02:39:46.988 UTC [msp] newBccspMsp -> DEBU 640 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.988 UTC [msp] New -> DEBU 641 Creating Cache-MSP instance" +"2019-07-20 02:39:46.988 UTC [msp] Setup -> DEBU 642 Setting up MSP instance Org1MSP" +"2019-07-20 02:39:46.988 UTC [msp.identity] newIdentity -> DEBU 643 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.989 UTC [msp.identity] newIdentity -> DEBU 644 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 645 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:39:46.990 UTC [msp] Validate -> DEBU 646 MSP Org1MSP validating identity" +"2019-07-20 02:39:46.990 UTC [msp] getCertificationChain -> DEBU 647 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:46.991 UTC [msp] hasOURole -> DEBU 648 MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:39:46.991 UTC [msp] getCertificationChain -> DEBU 649 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64a Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:39:46.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64b Processing field: AnchorPeers" +"2019-07-20 02:39:46.991 UTC [common.channelconfig] NewStandardValues -> DEBU 64c Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.992 UTC [common.channelconfig] initializeProtosStruct -> DEBU 64d Processing field: MSP" +"2019-07-20 02:39:46.992 UTC [common.channelconfig] Validate -> DEBU 64e Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:39:46.992 UTC [common.channelconfig] validateMSP -> DEBU 64f Setting up MSP for org Org2MSP" +"2019-07-20 02:39:46.992 UTC [msp] newBccspMsp -> DEBU 650 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.993 UTC [msp] New -> DEBU 651 Creating Cache-MSP instance" +"2019-07-20 02:39:46.993 UTC [msp] Setup -> DEBU 652 Setting up MSP instance Org2MSP" +"2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 653 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.994 UTC [msp.identity] newIdentity -> DEBU 654 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:46.995 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 655 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:39:46.995 UTC [msp] Validate -> DEBU 656 MSP Org2MSP validating identity" +"2019-07-20 02:39:46.996 UTC [msp] getCertificationChain -> DEBU 657 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:46.996 UTC [msp] hasOURole -> DEBU 658 MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:39:46.997 UTC [msp] getCertificationChain -> DEBU 659 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:46.997 UTC [common.channelconfig] NewStandardValues -> DEBU 65a Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65b Processing field: ConsensusType" +"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65c Processing field: BatchSize" +"2019-07-20 02:39:46.997 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65d Processing field: BatchTimeout" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65e Processing field: KafkaBrokers" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 65f Processing field: ChannelRestrictions" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 660 Processing field: Capabilities" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 661 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 662 Processing field: Endpoints" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:39:46.998 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: MSP" +"2019-07-20 02:39:46.999 UTC [common.channelconfig] validateMSP -> DEBU 665 Setting up MSP for org OrdererOrg" +"2019-07-20 02:39:46.999 UTC [msp] newBccspMsp -> DEBU 666 Creating BCCSP-based MSP instance" +"2019-07-20 02:39:46.999 UTC [msp] New -> DEBU 667 Creating Cache-MSP instance" +"2019-07-20 02:39:46.999 UTC [msp] Setup -> DEBU 668 Setting up MSP instance OrdererMSP" +"2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 669 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.000 UTC [msp.identity] newIdentity -> DEBU 66a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.001 UTC [msp] Validate -> DEBU 66b MSP OrdererMSP validating identity" +"2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66c Setting up the MSP manager (3 msps)" +"2019-07-20 02:39:47.002 UTC [msp] Setup -> DEBU 66d MSP manager setup complete, setup 3 msps" +"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66e Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 66f Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:39:47.002 UTC [policies] NewManagerImpl -> DEBU 670 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 671 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 672 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 673 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:39:47.003 UTC [policies] NewManagerImpl -> DEBU 674 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:39:47.004 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:39:47.006 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Readers for Channel/Application" +"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Writers for Channel/Application" +"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application" +"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:39:47.007 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:39:47.008 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:39:47.009 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Admins for Channel" +"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Readers for Channel" +"2019-07-20 02:39:47.010 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Writers for Channel" +"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 685 Adding to config map: [Group] /Channel" +"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 686 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:39:47.011 UTC [common.configtx] addToMap -> DEBU 687 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 688 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 689 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:39:47.012 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:39:47.013 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:39:47.014 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:39:47.015 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:39:47.016 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:39:47.017 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:39:47.018 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:39:47.019 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:39:47.020 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b3 As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6b4 As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b5 Manager Channel looking up path [Application]" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b6 Manager Channel has managers Application" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b7 Manager Channel has managers Orderer" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application looking up path []" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bc As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bd As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6be Manager Channel looking up path [Orderer]" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6bf Manager Channel has managers Application" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c0 Manager Channel has managers Orderer" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Orderer looking up path []" +"2019-07-20 02:39:47.020 UTC [policies] Manager -> DEBU 6c2 Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:39:47.020 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c5 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:39:47.022 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c6 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c7 Application capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:47.022 UTC [common.capabilities] Supported -> DEBU 6c8 Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6c9 Processing new config for channel businesschannel" +"2019-07-20 02:39:47.023 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ca Calling out because config was updated for channel businesschannel" +"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cb Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cc Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-07-20 02:39:47.023 UTC [gossip.service] updateAnchors -> DEBU 6cd Creating state provider for chainID businesschannel" +"2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6ce Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6cf Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.023 UTC [policies] Evaluate -> DEBU 6d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.024 UTC [msp] DeserializeIdentity -> DEBU 6d3 Obtaining identity" +"2019-07-20 02:39:47.024 UTC [msp.identity] newIdentity -> DEBU 6d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6d5 0xc0036eb490 gate 1563590387025007200 evaluation starts" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d6 0xc0036eb490 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6d7 0xc0036eb490 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.025 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6d8 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:47.025 UTC [msp] Validate -> DEBU 6d9 MSP Org1MSP validating identity" +"2019-07-20 02:39:47.025 UTC [msp] getCertificationChain -> DEBU 6da MSP Org1MSP getting certification chain" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6db 0xc0036eb490 principal matched by identity 0" +"2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dc Verify: digest = 00000000 b8 2f 45 19 ec 8c 7c 2e 70 fc 53 72 72 54 6b 35 |./E...|.p.SrrTk5| +00000010 de d2 73 63 9a 06 70 fb a7 b4 2f 2b 31 63 25 7d |..sc..p.../+1c%}|" +"2019-07-20 02:39:47.025 UTC [msp.identity] Verify -> DEBU 6dd Verify: sig = 00000000 30 45 02 21 00 e0 c4 c7 6e 3f ef fd 5c 20 8a 31 |0E.!....n?..\ .1| +00000010 9f 39 84 d2 a3 90 ad d3 c5 69 8b ec ec f5 01 c0 |.9.......i......| +00000020 f1 f2 6d 52 f5 02 20 0d 23 27 93 cc fe 01 e1 5d |..mR.. .#'.....]| +00000030 09 f5 da 22 2c 60 ca 86 01 18 9e 80 c7 b6 a9 81 |...",`..........| +00000040 4a 76 92 4a e2 6f 12 |Jv.J.o.|" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func2 -> DEBU 6de 0xc0036eb490 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.025 UTC [cauthdsl] func1 -> DEBU 6df 0xc0036eb490 gate 1563590387025007200 evaluation succeeds" +"2019-07-20 02:39:47.025 UTC [policies] Evaluate -> DEBU 6e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.026 UTC [policies] Evaluate -> DEBU 6e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.026 UTC [gossip.gossip] JoinChan -> INFO 6e4 Joining gossip network of channel businesschannel with 2 organizations" +"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e5 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e6 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-07-20 02:39:47.026 UTC [gossip.discovery] Connect -> DEBU 6e7 Exiting" +"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e8 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-07-20 02:39:47.026 UTC [gossip.gossip] learnAnchorPeers -> INFO 6e9 Anchor peer with same endpoint, skipping connecting to myself" +"2019-07-20 02:39:47.026 UTC [gossip.service] updateEndpoints -> DEBU 6ea Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-07-20 02:39:47.026 UTC [peer] updateTrustedRoots -> DEBU 6eb Updating trusted root authorities for channel businesschannel" +"2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ec parsed scheme: """ +"2019-07-20 02:39:47.027 UTC [grpc] DialContext -> DEBU 6ed scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.027 UTC [grpc] watcher -> DEBU 6ee ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.027 UTC [grpc] switchBalancer -> DEBU 6ef ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.027 UTC [grpc] HandleSubConnStateChange -> DEBU 6f0 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, CONNECTING" +"2019-07-20 02:39:47.039 UTC [grpc] HandleSubConnStateChange -> DEBU 6f1 pickfirstBalancer: HandleSubConnStateChange: 0xc0037381a0, READY" +"2019-07-20 02:39:47.041 UTC [msp] GetDefaultSigningIdentity -> DEBU 6f2 Obtaining default signing identity" +"2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f3 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.041 UTC [msp.identity] Sign -> DEBU 6f4 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.041 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f5 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +"2019-07-20 02:39:47.043 UTC [gossip.comm] authenticateRemotePeer -> DEBU 6f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f7 Obtaining identity" +"2019-07-20 02:39:47.043 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" +"2019-07-20 02:39:47.043 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.044 UTC [msp] Validate -> DEBU 6fa MSP Org2MSP validating identity" +"2019-07-20 02:39:47.044 UTC [msp] getCertificationChain -> DEBU 6fb MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6fd Obtaining identity" +"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 6fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 6ff Obtaining identity" +"2019-07-20 02:39:47.045 UTC [msp] DeserializeIdentity -> DEBU 700 Obtaining identity" +"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 701 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 702 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 703 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 704 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 705 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.046 UTC [policies] Evaluate -> DEBU 706 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.046 UTC [cauthdsl] func1 -> DEBU 707 0xc00377bc70 gate 1563590387046596900 evaluation starts" +"2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 708 0xc00377bc70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.046 UTC [cauthdsl] func2 -> DEBU 709 0xc00377bc70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70a 0xc00377bc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 70b 0xc00377bc70 principal evaluation fails" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 70c 0xc00377bc70 gate 1563590387046596900 evaluation fails" +"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.047 UTC [policies] Evaluate -> DEBU 70f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func1 -> DEBU 710 0xc0037984d0 gate 1563590387047829100 evaluation starts" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 711 0xc0037984d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.047 UTC [cauthdsl] func2 -> DEBU 712 0xc0037984d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.047 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 713 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:47.048 UTC [msp] Validate -> DEBU 714 MSP Org2MSP validating identity" +"2019-07-20 02:39:47.048 UTC [msp] getCertificationChain -> DEBU 715 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 716 0xc0037984d0 principal matched by identity 0" +"2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 717 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.048 UTC [msp.identity] Verify -> DEBU 718 Verify: sig = 00000000 30 45 02 21 00 c5 42 26 31 9b 5f 88 e8 ff 3c af |0E.!..B&1._...<.| +00000010 89 aa 06 67 e2 b6 11 2d 5c 3c 46 9f e7 66 a8 fd |...g...-\..| +00000030 a7 5f c2 d5 fb df 79 1f 8d 4b 32 8f b7 a0 3b de |._....y..K2...;.| +00000040 6d eb ba 3e c2 98 e3 |m..>...|" +"2019-07-20 02:39:47.048 UTC [cauthdsl] func2 -> DEBU 719 0xc0037984d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.048 UTC [cauthdsl] func1 -> DEBU 71a 0xc0037984d0 gate 1563590387047829100 evaluation succeeds" +"2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.048 UTC [policies] Evaluate -> DEBU 71c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.049 UTC [policies] Evaluate -> DEBU 71e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.049 UTC [gossip.comm] authenticateRemotePeer -> DEBU 71f Authenticated 172.18.0.8:7051" +"2019-07-20 02:39:47.049 UTC [msp] DeserializeIdentity -> DEBU 720 Obtaining identity" +"2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 721 Obtaining default signing identity" +"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 722 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915100F " +"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 723 Sign: digest: FD5AEC2A368260611D522F195C3901A89781740BD1E3F90CA9C8FB49E2302DCC " +"2019-07-20 02:39:47.049 UTC [msp] GetDefaultSigningIdentity -> DEBU 724 Obtaining default signing identity" +"2019-07-20 02:39:47.049 UTC [msp.identity] Sign -> DEBU 725 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:47.050 UTC [msp.identity] Sign -> DEBU 726 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:47.050 UTC [msp] DeserializeIdentity -> DEBU 727 Obtaining identity" +"2019-07-20 02:39:47.050 UTC [gossip.comm] Send -> DEBU 728 Entering, sending GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:47.050 UTC [gossip.comm] sendToEndpoint -> DEBU 729 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16868747491599105266 tag:EMPTY mem_req:\335\362\227_4\222\230\364ar\204=\330\272?2G\364\221\002 !\320\326\223\255\030\233\221\006%\336??V\331\020\r\244\273l\226\375i.b\r\210\2039\356\232\001" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.050 UTC [gossip.comm] createConnection -> DEBU 72a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:47.055 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72c parsed scheme: """ +"2019-07-20 02:39:47.055 UTC [grpc] DialContext -> DEBU 72d scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.055 UTC [grpc] watcher -> DEBU 72e ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.055 UTC [grpc] switchBalancer -> DEBU 72f ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.056 UTC [grpc] HandleSubConnStateChange -> DEBU 730 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, CONNECTING" +"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 731 updating root CAs for channel [businesschannel]" +"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 732 adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:39:47.058 UTC [peer] buildTrustedRootsForChain -> DEBU 733 adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:39:47.059 UTC [peer] buildTrustedRootsForChain -> DEBU 734 adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 735 config transaction received for chain businesschannel" +"2019-07-20 02:39:47.059 UTC [committer.txvalidator] validateTx -> DEBU 736 [businesschannel] validateTx completes for block 0xc003516200 env 0xc00353d860 txn 0" +"2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> DEBU 737 got result for idx 0, code 0" +"2019-07-20 02:39:47.060 UTC [committer.txvalidator] Validate -> INFO 738 [businesschannel] Validated block [2] in 97ms" +"2019-07-20 02:39:47.061 UTC [gossip.privdata] listMissingPrivateData -> DEBU 739 Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:39:47.061 UTC [gossip.privdata] StoreBlock -> DEBU 73a [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:39:47.061 UTC [committer] preCommit -> DEBU 73b Received configuration update, calling CSCC ConfigUpdate" +"2019-07-20 02:39:47.061 UTC [kvledger] CommitWithPvtData -> DEBU 73c [businesschannel] Validating state for block [2]" +"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73e lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:39:47.062 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 73f Validating new block with num trans = [1]" +"2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 740 ValidateAndPrepareBatch() for block number = [2]" +"2019-07-20 02:39:47.062 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 741 preprocessing ProtoBlock..." +"2019-07-20 02:39:47.063 UTC [valimpl] preprocessProtoBlock -> DEBU 742 txType=CONFIG" +"2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 743 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-07-20 02:39:47.063 UTC [valimpl] processNonEndorserTx -> DEBU 744 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-07-20 02:39:47.063 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 745 constructing new tx simulator" +"2019-07-20 02:39:47.064 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 747 constructing new tx simulator txid = []" +"2019-07-20 02:39:47.064 UTC [peer] GenerateSimulationResults -> DEBU 748 Processing CONFIG" +"2019-07-20 02:39:47.063 UTC [grpc] HandleSubConnStateChange -> DEBU 746 pickfirstBalancer: HandleSubConnStateChange: 0xc0037b9700, READY" +"2019-07-20 02:39:47.065 UTC [peer] processChannelConfigTx -> DEBU 749 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74a Simulation completed, getting simulation results" +"2019-07-20 02:39:47.066 UTC [lockbasedtxmgr] Done -> DEBU 74b Done with transaction simulation / query execution []" +"2019-07-20 02:39:47.066 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74c Block [2] Transaction index [0] TxId [] marked as valid by state validator" +"2019-07-20 02:39:47.067 UTC [valinternal] ApplyWriteSet -> DEBU 74d txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003862b80)}" +"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74e validating rwset..." +"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 74f postprocessing ProtoBlock..." +"2019-07-20 02:39:47.067 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 ValidateAndPrepareBatch() complete" +"2019-07-20 02:39:47.067 UTC [kvledger] CommitWithPvtData -> DEBU 751 [businesschannel] Adding CommitHash to the block [2]" +"2019-07-20 02:39:47.068 UTC [kvledger] CommitWithPvtData -> DEBU 752 [businesschannel] Committing block [2] to storage" +"2019-07-20 02:39:47.068 UTC [ledgerstorage] CommitWithPvtData -> DEBU 753 Writing block [2] to pvt block store" +"2019-07-20 02:39:47.069 UTC [msp] GetDefaultSigningIdentity -> DEBU 754 Obtaining default signing identity" +"2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 755 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.069 UTC [msp.identity] Sign -> DEBU 756 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.069 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +"2019-07-20 02:39:47.070 UTC [gossip.comm] authenticateRemotePeer -> DEBU 758 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 759 Obtaining identity" +"2019-07-20 02:39:47.071 UTC [msp] DeserializeIdentity -> DEBU 75a Obtaining identity" +"2019-07-20 02:39:47.071 UTC [msp.identity] newIdentity -> DEBU 75b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.072 UTC [pvtdatastorage] Prepare -> DEBU 75c Saved 0 private data write sets for block [2]" +"2019-07-20 02:39:47.072 UTC [msp] Validate -> DEBU 75d MSP Org2MSP validating identity" +"2019-07-20 02:39:47.073 UTC [msp] getCertificationChain -> DEBU 75e MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 75f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.073 UTC [msp] DeserializeIdentity -> DEBU 760 Obtaining identity" +"2019-07-20 02:39:47.073 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.074 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" +"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 763 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 764 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.074 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 765 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 766 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 767 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.074 UTC [policies] Evaluate -> DEBU 768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.074 UTC [cauthdsl] func1 -> DEBU 769 0xc0038cd0c0 gate 1563590387074883400 evaluation starts" +"2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76a 0xc0038cd0c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.074 UTC [cauthdsl] func2 -> DEBU 76b 0xc0038cd0c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76c 0xc0038cd0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.075 UTC [cauthdsl] func2 -> DEBU 76d 0xc0038cd0c0 principal evaluation fails" +"2019-07-20 02:39:47.075 UTC [cauthdsl] func1 -> DEBU 76e 0xc0038cd0c0 gate 1563590387074883400 evaluation fails" +"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 76f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.076 UTC [policies] Evaluate -> DEBU 771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.076 UTC [cauthdsl] func1 -> DEBU 772 0xc0038cd920 gate 1563590387076484600 evaluation starts" +"2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 773 0xc0038cd920 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.076 UTC [cauthdsl] func2 -> DEBU 774 0xc0038cd920 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.076 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 775 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:47.076 UTC [msp] Validate -> DEBU 776 MSP Org2MSP validating identity" +"2019-07-20 02:39:47.077 UTC [msp] getCertificationChain -> DEBU 777 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 778 Indexing block [blockNum=2, blockHash=[]byte{0xb0, 0xfa, 0x63, 0xe5, 0xe8, 0x64, 0xcd, 0x16, 0x11, 0x80, 0x50, 0x35, 0x2d, 0xad, 0x86, 0x3a, 0xc1, 0x73, 0xcd, 0x98, 0x4c, 0x4b, 0x68, 0x4e, 0x68, 0x76, 0xba, 0xe2, 0x63, 0x2f, 0x8b, 0x3} txOffsets= +txId=43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f locPointer=offset=71, bytesLength=22741 +]" +"2019-07-20 02:39:47.077 UTC [fsblkstorage] indexBlock -> DEBU 77a Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to txid-index" +"2019-07-20 02:39:47.078 UTC [fsblkstorage] indexBlock -> DEBU 77b Adding txLoc [fileSuffixNum=0, offset=47748, bytesLength=22741] for tx number:[0] ID: [43cafe39f7f1ab6d35d78e1d93d477cc03b06d0eab2fade4bceb066aac8b592f] to blockNumTranNum index" +"2019-07-20 02:39:47.077 UTC [cauthdsl] func2 -> DEBU 779 0xc0038cd920 principal matched by identity 0" +"2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.078 UTC [msp.identity] Verify -> DEBU 77d Verify: sig = 00000000 30 45 02 21 00 b5 08 ec a2 9a f2 02 e8 0d 9f fa |0E.!............| +00000010 be 56 91 95 23 4b 8b fe 8a 0e 32 22 e3 92 90 4c |.V..#K....2"...L| +00000020 9d 28 c3 af c4 02 20 50 74 94 85 0a 43 01 c4 6a |.(.... Pt...C..j| +00000030 16 31 5b dd c4 61 b7 01 a2 1c 97 0c 6f 4b b4 1c |.1[..a......oK..| +00000040 fc 29 ea 1b be 73 4d |.)...sM|" +"2019-07-20 02:39:47.078 UTC [cauthdsl] func2 -> DEBU 77e 0xc0038cd920 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.079 UTC [cauthdsl] func1 -> DEBU 77f 0xc0038cd920 gate 1563590387076484600 evaluation succeeds" +"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.079 UTC [policies] Evaluate -> DEBU 782 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.079 UTC [fsblkstorage] updateCheckpoint -> DEBU 783 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71461], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-07-20 02:39:47.080 UTC [pvtdatastorage] Commit -> DEBU 785 Committing private data for block [2]" +"2019-07-20 02:39:47.080 UTC [policies] Evaluate -> DEBU 784 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.080 UTC [gossip.comm] authenticateRemotePeer -> DEBU 786 Authenticated 172.18.0.8:7051" +"2019-07-20 02:39:47.081 UTC [gossip.comm] createConnection -> DEBU 787 Exiting" +"2019-07-20 02:39:47.081 UTC [gossip.comm] sendToEndpoint -> DEBU 788 Exiting" +"2019-07-20 02:39:47.082 UTC [pvtdatastorage] Commit -> DEBU 789 Committed private data for block [2]" +"2019-07-20 02:39:47.083 UTC [gossip.comm] func1 -> DEBU 78a Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.083 UTC [gossip.gossip] handleMessage -> DEBU 78b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.084 UTC [gossip.gossip] handleMessage -> DEBU 78c Exiting" +"2019-07-20 02:39:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 78d Got message: GossipMessage: Channel: , nonce: 16868747491599105266, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:47.085 UTC [kvledger] CommitWithPvtData -> DEBU 78f [businesschannel] Committing block [2] transactions to state database" +"2019-07-20 02:39:47.085 UTC [lockbasedtxmgr] Commit -> DEBU 790 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:39:47.086 UTC [lockbasedtxmgr] Commit -> DEBU 791 Committing updates to state database" +"2019-07-20 02:39:47.086 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 793 Building the expiry schedules based on the update batch" +"2019-07-20 02:39:47.087 UTC [lockbasedtxmgr] Commit -> DEBU 794 Write lock acquired for committing updates to state database" +"2019-07-20 02:39:47.088 UTC [stateleveldb] ApplyUpdates -> DEBU 795 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-07-20 02:39:47.086 UTC [msp.identity] Verify -> DEBU 792 Verify: digest = 00000000 fd 5a ec 2a 36 82 60 61 1d 52 2f 19 5c 39 01 a8 |.Z.*6.`a.R/.\9..| +00000010 97 81 74 0b d1 e3 f9 0c a9 c8 fb 49 e2 30 2d cc |..t........I.0-.|" +"2019-07-20 02:39:47.088 UTC [msp.identity] Verify -> DEBU 796 Verify: sig = 00000000 30 44 02 20 67 38 97 b4 58 0a 45 87 30 6f 98 3c |0D. g8..X.E.0o.<| +00000010 3e dd f2 97 5f 34 92 98 f4 61 72 84 3d d8 ba 3f |>..._4...ar.=..?| +00000020 32 47 f4 91 02 20 21 d0 d6 93 ad 18 9b 91 06 25 |2G... !........%| +00000030 de 3f 3f 56 d9 10 0d a4 bb 6c 96 fd 69 2e 62 0d |.??V.....l..i.b.| +00000040 88 83 39 ee 9a 01 |..9...|" +"2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.089 UTC [gossip.discovery] isSentByMe -> DEBU 798 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 799 Exiting" +"2019-07-20 02:39:47.089 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 79a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79b Verify: digest = 00000000 33 e9 f7 b7 64 80 eb 44 9f b9 1a 0c c0 54 da b1 |3...d..D.....T..| +00000010 12 a2 7b 21 b9 aa 26 4c 17 09 9a 62 90 51 13 03 |..{!..&L...b.Q..|" +"2019-07-20 02:39:47.089 UTC [msp.identity] Verify -> DEBU 79c Verify: sig = 00000000 30 44 02 20 57 e9 01 f9 79 01 99 25 40 d2 89 c4 |0D. W...y..%@...| +00000010 39 8d a1 8c 1a f0 a9 da 2a f9 c6 2d 89 88 05 ce |9.......*..-....| +00000020 c5 a5 65 61 02 20 42 ad ad 4a 55 ae d8 0c 59 25 |..ea. B..JU...Y%| +00000030 b0 4b 69 80 7c 07 75 16 89 34 f8 38 ff 79 2a ed |.Ki.|.u..4.8.y*.| +00000040 27 e8 69 10 53 bf |'.i.S.|" +"2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] Commit -> DEBU 79d Updates committed to state database and the write lock is released" +"2019-07-20 02:39:47.090 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 79e Preparing potential purge list working-set for expiringAtBlk [3]" +"2019-07-20 02:39:47.090 UTC [leveldbhelper] GetIterator -> DEBU 79f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +"2019-07-20 02:39:47.091 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 7a2 No expiry entry found for expiringAtBlk [3]" +"2019-07-20 02:39:47.090 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 7a7 Exiting" +"2019-07-20 02:39:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a8 Exiting" +"2019-07-20 02:39:47.090 UTC [lockbasedtxmgr] func1 -> DEBU 7a1 launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:39:47.092 UTC [kvledger] CommitWithPvtData -> DEBU 7aa [businesschannel] Committing block [2] transactions to history database" +"2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ab Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +"2019-07-20 02:39:47.092 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:47.093 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" +"2019-07-20 02:39:47.093 UTC [historyleveldb] Commit -> DEBU 7ad Skipping transaction [0] since it is not an endorsement transaction" +"2019-07-20 02:39:47.095 UTC [historyleveldb] Commit -> DEBU 7ae Channel [businesschannel]: Updates committed to history database for blockNo [2]" +"2019-07-20 02:39:47.095 UTC [kvledger] CommitWithPvtData -> INFO 7af [businesschannel] Committed block [2] with 1 transaction(s) in 33ms (state_validation=5ms block_and_pvtdata_commit=17ms state_commit=7ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +"2019-07-20 02:39:47.096 UTC [msp] GetDefaultSigningIdentity -> DEBU 7b0 Obtaining default signing identity" +"2019-07-20 02:39:47.096 UTC [msp.identity] Sign -> DEBU 7b1 Sign: plaintext: 18057A5E121408F8E6BA97ACA5BFD915...624D0F542C442AB5FE8C65C22A020803 " +"2019-07-20 02:39:47.097 UTC [msp.identity] Sign -> DEBU 7b2 Sign: digest: 6120CB6F8FAA033DDE98258E327315924BF1BBCF6DB355D5B4AE64BDA214C726 " +"2019-07-20 02:39:47.097 UTC [gossip.state] commitBlock -> DEBU 7b3 [businesschannel] Committed block [2] with 1 transaction(s)" +"2019-07-20 02:39:47.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.100 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.101 UTC [policies] Evaluate -> DEBU 7b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.104 UTC [policies] Evaluate -> DEBU 7b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.105 UTC [cauthdsl] func1 -> DEBU 7ba 0xc00390d680 gate 1563590387105027200 evaluation starts" +"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bb 0xc00390d680 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bc 0xc00390d680 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7bd 0xc00390d680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.105 UTC [cauthdsl] func2 -> DEBU 7be 0xc00390d680 principal evaluation fails" +"2019-07-20 02:39:47.107 UTC [cauthdsl] func1 -> DEBU 7bf 0xc00390d680 gate 1563590387105027200 evaluation fails" +"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.108 UTC [policies] Evaluate -> DEBU 7c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.110 UTC [cauthdsl] func1 -> DEBU 7c3 0xc00390dec0 gate 1563590387110615100 evaluation starts" +"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c4 0xc00390dec0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c5 0xc00390dec0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.110 UTC [cauthdsl] func2 -> DEBU 7c6 0xc00390dec0 principal matched by identity 0" +"2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c7 Verify: digest = 00000000 37 29 4f 27 ee 89 d6 8e 32 ef 91 79 4f e2 d1 74 |7)O'....2..yO..t| +00000010 e1 30 0d d1 0e 6b 5d 2b cc 5a 4f 26 a8 22 b3 9a |.0...k]+.ZO&."..|" +"2019-07-20 02:39:47.111 UTC [msp.identity] Verify -> DEBU 7c8 Verify: sig = 00000000 30 44 02 20 5b d2 0a 4b b5 fe f2 39 00 65 ef 04 |0D. [..K...9.e..| +00000010 21 a8 70 d5 76 9b b1 b2 df 47 3a 43 7b bc 9b f4 |!.p.v....G:C{...| +00000020 31 35 67 a6 02 20 26 8b da dd f0 b4 9b b5 3e 5f |15g.. &.......>_| +00000030 3f 9a 30 db b8 50 7f bb 51 e2 59 78 e7 cb 9f 73 |?.0..P..Q.Yx...s| +00000040 3c 08 e5 df 73 bf |<...s.|" +"2019-07-20 02:39:47.112 UTC [cauthdsl] func2 -> DEBU 7c9 0xc00390dec0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.112 UTC [cauthdsl] func1 -> DEBU 7ca 0xc00390dec0 gate 1563590387110615100 evaluation succeeds" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7cd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.112 UTC [policies] Evaluate -> DEBU 7ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.113 UTC [gossip.discovery] handleAliveMessage -> DEBU 7cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.113 UTC [gossip.discovery] learnNewMembers -> DEBU 7d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d1 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.114 UTC [gossip.discovery] learnNewMembers -> DEBU 7d2 Exiting" +"2019-07-20 02:39:47.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d3 Exiting" +"2019-07-20 02:39:47.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7d4 Exiting" +"2019-07-20 02:39:47.144 UTC [comm.grpc.server] 1 -> INFO 7d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.143Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=346.9µs +"2019-07-20 02:39:47.146 UTC [msp] GetDefaultSigningIdentity -> DEBU 7d6 Obtaining default signing identity" +"2019-07-20 02:39:47.146 UTC [msp.identity] Sign -> DEBU 7d7 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.147 UTC [msp.identity] Sign -> DEBU 7d8 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d9 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60306" +"2019-07-20 02:39:47.148 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7da Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60306" +"2019-07-20 02:39:47.149 UTC [msp] DeserializeIdentity -> DEBU 7db Obtaining identity" +"2019-07-20 02:39:47.149 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.150 UTC [msp] DeserializeIdentity -> DEBU 7dd Obtaining identity" +"2019-07-20 02:39:47.150 UTC [grpc] infof -> DEBU 7de transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.151 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.151 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.152 UTC [gossip.gossip] handleMessage -> DEBU 7e1 Exiting" +"2019-07-20 02:39:47.152 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e2 Got message: GossipMessage: nonce:12908362155311551576 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.152 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e3 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:47.152 UTC [msp] DeserializeIdentity -> DEBU 7e4 Obtaining identity" +"2019-07-20 02:39:47.153 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.154 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7e7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.155 UTC [policies] Evaluate -> DEBU 7e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.156 UTC [policies] Evaluate -> DEBU 7ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.156 UTC [cauthdsl] func1 -> DEBU 7eb 0xc003988d40 gate 1563590387156212600 evaluation starts" +"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ec 0xc003988d40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ed 0xc003988d40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ee 0xc003988d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.156 UTC [cauthdsl] func2 -> DEBU 7ef 0xc003988d40 principal evaluation fails" +"2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f0 0xc003988d40 gate 1563590387156212600 evaluation fails" +"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.157 UTC [policies] Evaluate -> DEBU 7f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.157 UTC [cauthdsl] func1 -> DEBU 7f4 0xc003989580 gate 1563590387157637200 evaluation starts" +"2019-07-20 02:39:47.157 UTC [cauthdsl] func2 -> DEBU 7f5 0xc003989580 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.158 UTC [cauthdsl] func2 -> DEBU 7f7 0xc003989580 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7f8 0xc003989580 principal matched by identity 0" +"2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7f9 Verify: digest = 00000000 8d 96 0a e7 f4 d6 9c 6a 41 dd 56 bd 54 37 68 f8 |.......jA.V.T7h.| +00000010 86 5d 33 ca d9 e3 62 54 84 3c 10 d3 48 0d 9f 26 |.]3...bT.<..H..&|" +"2019-07-20 02:39:47.159 UTC [msp.identity] Verify -> DEBU 7fa Verify: sig = 00000000 30 45 02 21 00 ba ca 3b 2a 08 32 48 44 89 bb cd |0E.!...;*.2HD...| +00000010 e8 fe d1 bd 03 49 28 e4 c6 9f 33 a6 2f 6e 6a 7f |.....I(...3./nj.| +00000020 33 26 20 63 9b 02 20 36 43 a1 44 d4 f4 33 ff b3 |3& c.. 6C.D..3..| +00000030 a7 62 eb 2f b3 0e 53 6c f0 8e 83 8c ad 34 32 f1 |.b./..Sl.....42.| +00000040 92 8b 10 c6 aa a3 47 |......G|" +"2019-07-20 02:39:47.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.159 UTC [cauthdsl] func2 -> DEBU 7fb 0xc003989580 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.159 UTC [cauthdsl] func1 -> DEBU 7fc 0xc003989580 gate 1563590387157637200 evaluation succeeds" +"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 7ff Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.160 UTC [policies] Evaluate -> DEBU 800 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.160 UTC [msp] DeserializeIdentity -> DEBU 801 Obtaining identity" +"2019-07-20 02:39:47.160 UTC [gossip.discovery] handleAliveMessage -> DEBU 802 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 803 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:47.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 804 updating membership: timestamp: " +"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 805 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 806 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:47.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 807 Exiting" +"2019-07-20 02:39:47.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 808 Exiting" +"2019-07-20 02:39:47.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 809 Exiting" +"2019-07-20 02:39:47.162 UTC [gossip.discovery] sendMemResponse -> DEBU 80a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80b Obtaining identity" +"2019-07-20 02:39:47.163 UTC [msp] DeserializeIdentity -> DEBU 80c Obtaining identity" +"2019-07-20 02:39:47.163 UTC [gossip.comm] Send -> DEBU 80d Entering, sending GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:47.163 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 80e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 80f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.164 UTC [gossip.discovery] sendMemResponse -> DEBU 810 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: " +"2019-07-20 02:39:47.164 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 811 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 812 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.164 UTC [policies] Evaluate -> DEBU 813 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.165 UTC [policies] Evaluate -> DEBU 814 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.165 UTC [cauthdsl] func1 -> DEBU 815 0xc0039a7050 gate 1563590387165054700 evaluation starts" +"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 816 0xc0039a7050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 817 0xc0039a7050 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.165 UTC [cauthdsl] func2 -> DEBU 818 0xc0039a7050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.166 UTC [cauthdsl] func2 -> DEBU 819 0xc0039a7050 principal evaluation fails" +"2019-07-20 02:39:47.166 UTC [cauthdsl] func1 -> DEBU 81a 0xc0039a7050 gate 1563590387165054700 evaluation fails" +"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.166 UTC [policies] Evaluate -> DEBU 81d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.167 UTC [cauthdsl] func1 -> DEBU 81e 0xc0039a7890 gate 1563590387166750100 evaluation starts" +"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 81f 0xc0039a7890 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 820 0xc0039a7890 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.167 UTC [cauthdsl] func2 -> DEBU 821 0xc0039a7890 principal matched by identity 0" +"2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 822 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.168 UTC [msp.identity] Verify -> DEBU 823 Verify: sig = 00000000 30 44 02 20 6d b6 11 5e b2 8d 15 70 cb a8 c8 d8 |0D. m..^...p....| +00000010 34 91 cf f1 80 6a 2f 1f 8e f7 15 2c bf fe d5 fc |4....j/....,....| +00000020 ee 0a 62 60 02 20 13 35 c4 b1 10 1a 41 2f 2a 16 |..b`. .5....A/*.| +00000030 c7 59 4b ca 7c 04 39 0b 04 c6 06 a2 b2 26 9c 1d |.YK.|.9......&..| +00000040 37 39 f1 c3 85 3d |79...=|" +"2019-07-20 02:39:47.169 UTC [cauthdsl] func2 -> DEBU 824 0xc0039a7890 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.169 UTC [cauthdsl] func1 -> DEBU 825 0xc0039a7890 gate 1563590387166750100 evaluation succeeds" +"2019-07-20 02:39:47.169 UTC [policies] Evaluate -> DEBU 826 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 827 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.170 UTC [policies] Evaluate -> DEBU 828 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.171 UTC [policies] Evaluate -> DEBU 829 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.171 UTC [gossip.comm] authenticateRemotePeer -> DEBU 82a Authenticated 172.18.0.8:60306" +"2019-07-20 02:39:47.171 UTC [gossip.comm] GossipStream -> DEBU 82b Servicing 172.18.0.8:60306" +"2019-07-20 02:39:47.171 UTC [gossip.comm] writeToStream -> DEBU 82c Closing writing to stream" +"2019-07-20 02:39:47.172 UTC [gossip.comm] serviceConnection -> DEBU 82d Closing reading from stream" +"2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-07-20 02:39:47.172 UTC [gossip.comm] readFromStream -> DEBU 82f Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:47.173 UTC [gossip.comm] func2 -> DEBU 830 Client 172.18.0.8:60306 disconnected" +"2019-07-20 02:39:47.173 UTC [comm.grpc.server] 1 -> INFO 831 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.146Z grpc.peer_address=172.18.0.8:60306 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.0277ms +"2019-07-20 02:39:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 832 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12908362155311551576, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.175 UTC [gossip.comm] createConnection -> DEBU 835 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:47.174 UTC [gossip.comm] writeToStream -> DEBU 833 Closing writing to stream" +"2019-07-20 02:39:47.174 UTC [grpc] infof -> DEBU 834 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.178 UTC [grpc] DialContext -> DEBU 836 parsed scheme: """ +"2019-07-20 02:39:47.179 UTC [grpc] DialContext -> DEBU 837 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.180 UTC [grpc] watcher -> DEBU 838 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.180 UTC [grpc] switchBalancer -> DEBU 839 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.180 UTC [grpc] HandleSubConnStateChange -> DEBU 83a pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, CONNECTING" +"2019-07-20 02:39:47.187 UTC [grpc] HandleSubConnStateChange -> DEBU 83b pickfirstBalancer: HandleSubConnStateChange: 0xc0039e83b0, READY" +"2019-07-20 02:39:47.196 UTC [msp] GetDefaultSigningIdentity -> DEBU 83c Obtaining default signing identity" +"2019-07-20 02:39:47.196 UTC [msp.identity] Sign -> DEBU 83d Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.197 UTC [msp.identity] Sign -> DEBU 83e Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-07-20 02:39:47.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 840 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 841 Obtaining identity" +"2019-07-20 02:39:47.198 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 842 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.198 UTC [msp] DeserializeIdentity -> DEBU 843 Obtaining identity" +"2019-07-20 02:39:47.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 844 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.199 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" +"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 847 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.200 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 848 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 849 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.200 UTC [policies] Evaluate -> DEBU 84b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.201 UTC [cauthdsl] func1 -> DEBU 84c 0xc003a290c0 gate 1563590387201199500 evaluation starts" +"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84d 0xc003a290c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84e 0xc003a290c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.201 UTC [cauthdsl] func2 -> DEBU 84f 0xc003a290c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.202 UTC [cauthdsl] func2 -> DEBU 850 0xc003a290c0 principal evaluation fails" +"2019-07-20 02:39:47.202 UTC [cauthdsl] func1 -> DEBU 851 0xc003a290c0 gate 1563590387201199500 evaluation fails" +"2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 852 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.202 UTC [policies] Evaluate -> DEBU 853 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.203 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.203 UTC [cauthdsl] func1 -> DEBU 855 0xc003a29900 gate 1563590387203096300 evaluation starts" +"2019-07-20 02:39:47.203 UTC [cauthdsl] func2 -> DEBU 856 0xc003a29900 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.204 UTC [cauthdsl] func2 -> DEBU 857 0xc003a29900 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.205 UTC [cauthdsl] func2 -> DEBU 858 0xc003a29900 principal matched by identity 0" +"2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 859 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.205 UTC [msp.identity] Verify -> DEBU 85a Verify: sig = 00000000 30 45 02 21 00 e9 e4 68 d4 df e3 f8 4d 5a 3a 48 |0E.!...h....MZ:H| +00000010 69 08 ac 7a 81 65 5c ac a8 93 17 b7 50 06 16 b9 |i..z.e\.....P...| +00000020 42 6f 05 0c 4a 02 20 62 cd 76 94 68 20 61 dc f0 |Bo..J. b.v.h a..| +00000030 2e 83 42 5f 09 56 d2 9a df 89 3b 1f f1 67 8c 5e |..B_.V....;..g.^| +00000040 54 84 08 79 53 c7 cb |T..yS..|" +"2019-07-20 02:39:47.206 UTC [cauthdsl] func2 -> DEBU 85b 0xc003a29900 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.206 UTC [cauthdsl] func1 -> DEBU 85c 0xc003a29900 gate 1563590387203096300 evaluation succeeds" +"2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.206 UTC [policies] Evaluate -> DEBU 85e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.208 UTC [policies] Evaluate -> DEBU 85f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.209 UTC [policies] Evaluate -> DEBU 860 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.209 UTC [gossip.comm] authenticateRemotePeer -> DEBU 861 Authenticated 172.18.0.8:7051" +"2019-07-20 02:39:47.210 UTC [gossip.comm] createConnection -> DEBU 862 Exiting" +"2019-07-20 02:39:47.210 UTC [gossip.comm] sendToEndpoint -> DEBU 863 Exiting" +"2019-07-20 02:39:47.215 UTC [comm.grpc.server] 1 -> INFO 864 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.214Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=280.1µs +"2019-07-20 02:39:47.220 UTC [msp] GetDefaultSigningIdentity -> DEBU 865 Obtaining default signing identity" +"2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 866 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.220 UTC [msp.identity] Sign -> DEBU 867 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 868 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60310" +"2019-07-20 02:39:47.221 UTC [gossip.comm] authenticateRemotePeer -> DEBU 869 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60310" +"2019-07-20 02:39:47.221 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +"2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.222 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" +"2019-07-20 02:39:47.222 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.223 UTC [msp] DeserializeIdentity -> DEBU 86e Obtaining identity" +"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 870 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.223 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 872 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.223 UTC [policies] Evaluate -> DEBU 873 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.224 UTC [policies] Evaluate -> DEBU 874 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.224 UTC [cauthdsl] func1 -> DEBU 875 0xc003a8c6d0 gate 1563590387224316500 evaluation starts" +"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 876 0xc003a8c6d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 877 0xc003a8c6d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.224 UTC [cauthdsl] func2 -> DEBU 878 0xc003a8c6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.225 UTC [cauthdsl] func2 -> DEBU 879 0xc003a8c6d0 principal evaluation fails" +"2019-07-20 02:39:47.225 UTC [cauthdsl] func1 -> DEBU 87a 0xc003a8c6d0 gate 1563590387224316500 evaluation fails" +"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.225 UTC [policies] Evaluate -> DEBU 87d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.226 UTC [cauthdsl] func1 -> DEBU 87e 0xc003a8cf10 gate 1563590387226149600 evaluation starts" +"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 87f 0xc003a8cf10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 880 0xc003a8cf10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.226 UTC [cauthdsl] func2 -> DEBU 881 0xc003a8cf10 principal matched by identity 0" +"2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 882 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.227 UTC [msp.identity] Verify -> DEBU 883 Verify: sig = 00000000 30 44 02 20 6d d0 06 0a 99 c2 1d 0b e9 3a 86 7e |0D. m........:.~| +00000010 68 d0 40 cb 2f 4e d9 d8 78 cd 47 dd 01 76 b8 9d |h.@./N..x.G..v..| +00000020 f5 70 2e 60 02 20 3d a3 e5 19 8e 4e a7 e1 9f f1 |.p.`. =....N....| +00000030 d8 bc bb ff 20 77 36 db db 14 c8 b4 d4 5d 1a 9a |.... w6......]..| +00000040 ed 38 04 92 47 49 |.8..GI|" +"2019-07-20 02:39:47.227 UTC [cauthdsl] func2 -> DEBU 884 0xc003a8cf10 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.227 UTC [cauthdsl] func1 -> DEBU 885 0xc003a8cf10 gate 1563590387226149600 evaluation succeeds" +"2019-07-20 02:39:47.227 UTC [policies] Evaluate -> DEBU 886 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 888 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.228 UTC [policies] Evaluate -> DEBU 889 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.228 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88a Authenticated 172.18.0.8:60310" +"2019-07-20 02:39:47.228 UTC [gossip.comm] GossipStream -> DEBU 88b Servicing 172.18.0.8:60310" +"2019-07-20 02:39:47.228 UTC [gossip.comm] serviceConnection -> DEBU 88c Closing reading from stream" +"2019-07-20 02:39:47.229 UTC [gossip.comm] writeToStream -> DEBU 88d Closing writing to stream" +"2019-07-20 02:39:47.229 UTC [gossip.comm] readFromStream -> DEBU 88e 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-07-20 02:39:47.229 UTC [grpc] infof -> DEBU 88f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.231 UTC [grpc] infof -> DEBU 890 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.231 UTC [gossip.comm] readFromStream -> DEBU 891 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:47.231 UTC [gossip.comm] func2 -> DEBU 892 Client 172.18.0.8:60310 disconnected" +"2019-07-20 02:39:47.231 UTC [comm.grpc.server] 1 -> INFO 893 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.219Z grpc.peer_address=172.18.0.8:60310 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6668ms +"2019-07-20 02:39:47.231 UTC [gossip.comm] writeToStream -> DEBU 894 Closing writing to stream" +"2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 895 Obtaining default signing identity" +"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 896 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151010 " +"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 897 Sign: digest: 9E55EC7FB3BB5A09C8F1096E69D65D68FCCE83FB3E49B5C1994EDFEB97B2439D " +"2019-07-20 02:39:47.265 UTC [msp] GetDefaultSigningIdentity -> DEBU 898 Obtaining default signing identity" +"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 899 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:47.265 UTC [msp.identity] Sign -> DEBU 89a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:47.265 UTC [gossip.discovery] periodicalSendAlive -> DEBU 89b Sleeping 5s" +"2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89c Obtaining identity" +"2019-07-20 02:39:47.267 UTC [msp] DeserializeIdentity -> DEBU 89d Obtaining identity" +"2019-07-20 02:39:47.267 UTC [gossip.comm] Send -> DEBU 89e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:47.268 UTC [gossip.comm] Send -> DEBU 89f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a2 Exiting" +"2019-07-20 02:39:47.268 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.269 UTC [gossip.comm] createConnection -> DEBU 8a3 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a4 parsed scheme: """ +"2019-07-20 02:39:47.270 UTC [grpc] DialContext -> DEBU 8a5 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.270 UTC [grpc] watcher -> DEBU 8a6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.270 UTC [grpc] switchBalancer -> DEBU 8a7 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.270 UTC [grpc] HandleSubConnStateChange -> DEBU 8a8 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, CONNECTING" +"2019-07-20 02:39:47.275 UTC [grpc] HandleSubConnStateChange -> DEBU 8a9 pickfirstBalancer: HandleSubConnStateChange: 0xc003ac52b0, READY" +"2019-07-20 02:39:47.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 8aa Obtaining default signing identity" +"2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ab Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.280 UTC [msp.identity] Sign -> DEBU 8ac Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.280 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ad Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-07-20 02:39:47.282 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8ae Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:39:47.283 UTC [msp] DeserializeIdentity -> DEBU 8af Obtaining identity" +"2019-07-20 02:39:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.286 UTC [msp] DeserializeIdentity -> DEBU 8b1 Obtaining identity" +"2019-07-20 02:39:47.287 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.287 UTC [msp] DeserializeIdentity -> DEBU 8b3 Obtaining identity" +"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.288 UTC [policies] Evaluate -> DEBU 8b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.289 UTC [policies] Evaluate -> DEBU 8b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.290 UTC [policies] Evaluate -> DEBU 8b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.290 UTC [cauthdsl] func1 -> DEBU 8ba 0xc003b22fc0 gate 1563590387290515900 evaluation starts" +"2019-07-20 02:39:47.290 UTC [cauthdsl] func2 -> DEBU 8bb 0xc003b22fc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bc 0xc003b22fc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8bd 0xc003b22fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.291 UTC [cauthdsl] func2 -> DEBU 8be 0xc003b22fc0 principal evaluation fails" +"2019-07-20 02:39:47.291 UTC [cauthdsl] func1 -> DEBU 8bf 0xc003b22fc0 gate 1563590387290515900 evaluation fails" +"2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.291 UTC [policies] Evaluate -> DEBU 8c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.292 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.292 UTC [cauthdsl] func1 -> DEBU 8c3 0xc003b23800 gate 1563590387292449700 evaluation starts" +"2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c4 0xc003b23800 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.292 UTC [cauthdsl] func2 -> DEBU 8c5 0xc003b23800 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.293 UTC [cauthdsl] func2 -> DEBU 8c6 0xc003b23800 principal matched by identity 0" +"2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.294 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 4b 5d ab 54 15 82 ca 40 c4 e0 84 79 |0D. K].T...@...y| +00000010 5e ca 3d 33 21 b2 3e 8c a7 81 ef 81 3b 80 cd 16 |^.=3!.>.....;...| +00000020 98 81 0e 88 02 20 7d 19 e5 dc 30 31 7d 30 0d 6c |..... }...01}0.l| +00000030 10 f1 6e 61 fc ef 84 93 f5 10 5f 08 5f 1d b7 d6 |..na......_._...| +00000040 f0 0b 6e d9 05 44 |..n..D|" +"2019-07-20 02:39:47.294 UTC [cauthdsl] func2 -> DEBU 8c9 0xc003b23800 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.296 UTC [cauthdsl] func1 -> DEBU 8ca 0xc003b23800 gate 1563590387292449700 evaluation succeeds" +"2019-07-20 02:39:47.296 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.297 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.297 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8cf Authenticated 172.18.0.8:7051" +"2019-07-20 02:39:47.297 UTC [gossip.comm] createConnection -> DEBU 8d0 Exiting" +"2019-07-20 02:39:47.298 UTC [gossip.comm] sendToEndpoint -> DEBU 8d1 Exiting" +"2019-07-20 02:39:47.302 UTC [comm.grpc.server] 1 -> INFO 8d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.301Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=480.6µs +"2019-07-20 02:39:47.305 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d3 Obtaining default signing identity" +"2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d4 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.305 UTC [msp.identity] Sign -> DEBU 8d5 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.306 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d6 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:58950" +"2019-07-20 02:39:47.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d7 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58950" +"2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" +"2019-07-20 02:39:47.309 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" +"2019-07-20 02:39:47.310 UTC [msp.identity] newIdentity -> DEBU 8da Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-07-20 02:39:47.316 UTC [grpc] infof -> DEBU 8db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.318 UTC [msp] Validate -> DEBU 8dc MSP Org2MSP validating identity" +"2019-07-20 02:39:47.319 UTC [msp] getCertificationChain -> DEBU 8dd MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.320 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.320 UTC [msp] DeserializeIdentity -> DEBU 8df Obtaining identity" +"2019-07-20 02:39:47.321 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.321 UTC [msp] DeserializeIdentity -> DEBU 8e1 Obtaining identity" +"2019-07-20 02:39:47.322 UTC [msp] DeserializeIdentity -> DEBU 8e2 Obtaining identity" +"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.322 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8e5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.323 UTC [policies] Evaluate -> DEBU 8e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.323 UTC [cauthdsl] func1 -> DEBU 8e9 0xc003ba0b30 gate 1563590387323532000 evaluation starts" +"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ea 0xc003ba0b30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8eb 0xc003ba0b30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.323 UTC [cauthdsl] func2 -> DEBU 8ec 0xc003ba0b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8ed 0xc003ba0b30 principal evaluation fails" +"2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8ee 0xc003ba0b30 gate 1563590387323532000 evaluation fails" +"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.324 UTC [policies] Evaluate -> DEBU 8f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.324 UTC [cauthdsl] func1 -> DEBU 8f2 0xc003ba1390 gate 1563590387324697600 evaluation starts" +"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f3 0xc003ba1390 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.324 UTC [cauthdsl] func2 -> DEBU 8f4 0xc003ba1390 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.325 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8f5 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:39:47.325 UTC [msp] Validate -> DEBU 8f6 MSP Org2MSP validating identity" +"2019-07-20 02:39:47.325 UTC [msp] getCertificationChain -> DEBU 8f7 MSP Org2MSP getting certification chain" +"2019-07-20 02:39:47.325 UTC [cauthdsl] func2 -> DEBU 8f8 0xc003ba1390 principal matched by identity 0" +"2019-07-20 02:39:47.325 UTC [msp.identity] Verify -> DEBU 8f9 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:39:47.326 UTC [msp.identity] Verify -> DEBU 8fa Verify: sig = 00000000 30 45 02 21 00 ec 4e f4 b9 c2 ae 88 47 27 4e eb |0E.!..N.....G'N.| +00000010 3f 69 a1 76 5c 36 3a d0 5b 98 46 37 df 28 42 89 |?i.v\6:.[.F7.(B.| +00000020 d0 32 07 7e 32 02 20 4e 19 cc b7 55 d9 c8 ae ad |.2.~2. N...U....| +00000030 f3 11 34 7a 2b c7 7e 6a dc 00 11 ca 5d b1 96 29 |..4z+.~j....]..)| +00000040 28 a0 24 5f 3e b6 6b |(.$_>.k|" +"2019-07-20 02:39:47.326 UTC [cauthdsl] func2 -> DEBU 8fb 0xc003ba1390 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.326 UTC [cauthdsl] func1 -> DEBU 8fc 0xc003ba1390 gate 1563590387324697600 evaluation succeeds" +"2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.326 UTC [policies] Evaluate -> DEBU 8fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 8ff Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.327 UTC [policies] Evaluate -> DEBU 900 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.327 UTC [gossip.comm] authenticateRemotePeer -> DEBU 901 Authenticated 172.18.0.7:58950" +"2019-07-20 02:39:47.327 UTC [gossip.comm] GossipStream -> DEBU 902 Servicing 172.18.0.7:58950" +"2019-07-20 02:39:47.327 UTC [comm.grpc.server] 1 -> INFO 903 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.322Z grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=284.7µs +"2019-07-20 02:39:47.328 UTC [gossip.comm] readFromStream -> DEBU 904 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:47.328 UTC [gossip.comm] func2 -> DEBU 905 Client 172.18.0.7:58950 disconnected" +"2019-07-20 02:39:47.328 UTC [comm.grpc.server] 1 -> INFO 906 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.305Z grpc.peer_address=172.18.0.7:58950 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1435ms +"2019-07-20 02:39:47.328 UTC [gossip.comm] writeToStream -> DEBU 907 Closing writing to stream" +"2019-07-20 02:39:47.331 UTC [msp] GetDefaultSigningIdentity -> DEBU 908 Obtaining default signing identity" +"2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 909 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.332 UTC [msp.identity] Sign -> DEBU 90a Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.332 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60318" +"2019-07-20 02:39:47.334 UTC [comm.grpc.server] 1 -> INFO 90c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.333Z grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=495.3µs +"2019-07-20 02:39:47.335 UTC [gossip.comm] authenticateRemotePeer -> DEBU 90d Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60318" +"2019-07-20 02:39:47.335 UTC [msp] DeserializeIdentity -> DEBU 90e Obtaining identity" +"2019-07-20 02:39:47.336 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 90f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.336 UTC [msp] DeserializeIdentity -> DEBU 910 Obtaining identity" +"2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 911 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.337 UTC [msp] DeserializeIdentity -> DEBU 912 Obtaining identity" +"2019-07-20 02:39:47.337 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 913 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 914 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 915 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.340 UTC [gossip.comm] func1 -> DEBU 916 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 917 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.340 UTC [gossip.gossip] handleMessage -> DEBU 918 Exiting" +"2019-07-20 02:39:47.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 919 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 91a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:47.342 UTC [msp.identity] Verify -> DEBU 91b Verify: digest = 00000000 9e 55 ec 7f b3 bb 5a 09 c8 f1 09 6e 69 d6 5d 68 |.U....Z....ni.]h| +00000010 fc ce 83 fb 3e 49 b5 c1 99 4e df eb 97 b2 43 9d |....>I...N....C.|" +"2019-07-20 02:39:47.346 UTC [msp.identity] Verify -> DEBU 91c Verify: sig = 00000000 30 44 02 20 18 f2 c2 95 0f c2 43 dd bb 8d 34 53 |0D. ......C...4S| +00000010 3d 2c a9 9a ac d2 45 f8 70 4e 74 8a ae 3b 19 33 |=,....E.pNt..;.3| +00000020 f8 4d f8 b5 02 20 08 b7 2f 8b 20 08 b9 33 38 92 |.M... ../. ..38.| +00000030 a7 08 9b fc ee dc e1 a7 88 8e 4a a3 e7 09 25 2a |..........J...%*| +00000040 48 79 eb c2 aa f7 |Hy....|" +"2019-07-20 02:39:47.347 UTC [gossip.discovery] isSentByMe -> DEBU 91d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU 91e Exiting" +"2019-07-20 02:39:47.347 UTC [msp] GetDefaultSigningIdentity -> DEBU 91f Obtaining default signing identity" +"2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 920 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.347 UTC [msp.identity] Sign -> DEBU 921 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.347 UTC [grpc] infof -> DEBU 922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.348 UTC [gossip.comm] authenticateRemotePeer -> DEBU 924 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58954" +"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 925 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.348 UTC [policies] Evaluate -> DEBU 926 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.349 UTC [gossip.comm] authenticateRemotePeer -> DEBU 927 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58954" +"2019-07-20 02:39:47.349 UTC [cauthdsl] func1 -> DEBU 928 0xc003c1c310 gate 1563590387349063600 evaluation starts" +"2019-07-20 02:39:47.349 UTC [msp] DeserializeIdentity -> DEBU 929 Obtaining identity" +"2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92a 0xc003c1c310 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.349 UTC [cauthdsl] func2 -> DEBU 92b 0xc003c1c310 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.350 UTC [msp] DeserializeIdentity -> DEBU 92d Obtaining identity" +"2019-07-20 02:39:47.350 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 92e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.351 UTC [msp] DeserializeIdentity -> DEBU 92f Obtaining identity" +"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 931 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.351 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 932 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.351 UTC [policies] Evaluate -> DEBU 934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.352 UTC [policies] Evaluate -> DEBU 935 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 936 0xc003c32a80 gate 1563590387352234800 evaluation starts" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 937 0xc003c32a80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 938 0xc003c32a80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 939 0xc003c32a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func2 -> DEBU 93a 0xc003c32a80 principal evaluation fails" +"2019-07-20 02:39:47.352 UTC [cauthdsl] func1 -> DEBU 93b 0xc003c32a80 gate 1563590387352234800 evaluation fails" +"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.353 UTC [policies] Evaluate -> DEBU 93e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.353 UTC [cauthdsl] func1 -> DEBU 93f 0xc003c332c0 gate 1563590387353411100 evaluation starts" +"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 940 0xc003c332c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 941 0xc003c332c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.353 UTC [cauthdsl] func2 -> DEBU 942 0xc003c332c0 principal matched by identity 0" +"2019-07-20 02:39:47.353 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:39:47.354 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 44 02 20 65 d6 03 06 2b 67 cb 70 e0 a4 e2 07 |0D. e...+g.p....| +00000010 64 fb a2 19 b3 6c a6 5b 1e cf a2 43 48 39 b0 72 |d....l.[...CH9.r| +00000020 9f df cf 18 02 20 76 23 2e 73 5c ce 38 87 8d 9e |..... v#.s\.8...| +00000030 fd 44 e1 03 fb 66 1c 69 f4 a1 b1 f5 1e 2e 2b 2b |.D...f.i......++| +00000040 48 78 ed 05 fc 4d |Hx...M|" +"2019-07-20 02:39:47.354 UTC [cauthdsl] func2 -> DEBU 945 0xc003c332c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.354 UTC [cauthdsl] func1 -> DEBU 946 0xc003c332c0 gate 1563590387353411100 evaluation succeeds" +"2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 947 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.356 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 949 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.357 UTC [policies] Evaluate -> DEBU 94a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.357 UTC [gossip.comm] authenticateRemotePeer -> DEBU 94b Authenticated 172.18.0.7:58954" +"2019-07-20 02:39:47.358 UTC [gossip.comm] GossipStream -> DEBU 94c Servicing 172.18.0.7:58954" +"2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 94d Entering, 172.18.0.7:58954 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.350 UTC [cauthdsl] func2 -> DEBU 94e 0xc003c1c310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.359 UTC [cauthdsl] func2 -> DEBU 94f 0xc003c1c310 principal evaluation fails" +"2019-07-20 02:39:47.359 UTC [cauthdsl] func1 -> DEBU 950 0xc003c1c310 gate 1563590387349063600 evaluation fails" +"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 953 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.361 UTC [policies] Evaluate -> DEBU 955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.362 UTC [cauthdsl] func1 -> DEBU 956 0xc003c1cb50 gate 1563590387362093400 evaluation starts" +"2019-07-20 02:39:47.359 UTC [gossip.gossip] handleMessage -> DEBU 951 Exiting" +"2019-07-20 02:39:47.360 UTC [gossip.discovery] handleMsgFromComm -> DEBU 952 Got message: GossipMessage: nonce:9525972632863951429 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.364 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 957 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:47.364 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" +"2019-07-20 02:39:47.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 959 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 95b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.366 UTC [policies] Evaluate -> DEBU 95d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.367 UTC [policies] Evaluate -> DEBU 95e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.367 UTC [cauthdsl] func1 -> DEBU 95f 0xc003c42fa0 gate 1563590387367201200 evaluation starts" +"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 960 0xc003c42fa0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 961 0xc003c42fa0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.367 UTC [cauthdsl] func2 -> DEBU 962 0xc003c42fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.368 UTC [cauthdsl] func2 -> DEBU 963 0xc003c42fa0 principal evaluation fails" +"2019-07-20 02:39:47.368 UTC [cauthdsl] func1 -> DEBU 964 0xc003c42fa0 gate 1563590387367201200 evaluation fails" +"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 965 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 966 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.369 UTC [policies] Evaluate -> DEBU 967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.369 UTC [cauthdsl] func1 -> DEBU 968 0xc003c437e0 gate 1563590387369590100 evaluation starts" +"2019-07-20 02:39:47.369 UTC [cauthdsl] func2 -> DEBU 969 0xc003c437e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96a 0xc003c437e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.370 UTC [cauthdsl] func2 -> DEBU 96b 0xc003c437e0 principal matched by identity 0" +"2019-07-20 02:39:47.371 UTC [msp.identity] Verify -> DEBU 96c Verify: digest = 00000000 46 0e f5 10 76 fd 59 e6 b3 07 a1 3c a9 b9 14 47 |F...v.Y....<...G| +00000010 6e b4 e5 a5 0e 58 e2 3e 59 e7 90 e0 f0 9d 65 e3 |n....X.>Y.....e.|" +"2019-07-20 02:39:47.372 UTC [msp.identity] Verify -> DEBU 96d Verify: sig = 00000000 30 45 02 21 00 b8 8e c9 09 9c 74 bb 27 15 12 64 |0E.!......t.'..d| +00000010 a8 e6 99 91 7a fc 2e 35 65 70 c5 88 dd 13 b9 37 |....z..5ep.....7| +00000020 d6 af fd aa 46 02 20 3d 93 80 67 b2 d9 73 c9 0e |....F. =..g..s..| +00000030 fb ed 14 93 c5 6c 38 74 35 30 1b 71 26 3f 14 68 |.....l8t50.q&?.h| +00000040 47 f0 c3 1c 3c 85 ea |G...<..|" +"2019-07-20 02:39:47.372 UTC [cauthdsl] func2 -> DEBU 96e 0xc003c437e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.373 UTC [cauthdsl] func1 -> DEBU 96f 0xc003c437e0 gate 1563590387369590100 evaluation succeeds" +"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 970 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 971 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.373 UTC [policies] Evaluate -> DEBU 972 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.374 UTC [policies] Evaluate -> DEBU 973 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.375 UTC [gossip.discovery] handleAliveMessage -> DEBU 974 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.375 UTC [gossip.discovery] learnNewMembers -> DEBU 975 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]}" +"2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 976 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.376 UTC [gossip.discovery] learnNewMembers -> DEBU 977 Exiting" +"2019-07-20 02:39:47.376 UTC [gossip.discovery] handleAliveMessage -> DEBU 978 Exiting" +"2019-07-20 02:39:47.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 979 Exiting" +"2019-07-20 02:39:47.377 UTC [gossip.discovery] sendMemResponse -> DEBU 97a Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:39:47.377 UTC [msp] DeserializeIdentity -> DEBU 97b Obtaining identity" +"2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97c Obtaining identity" +"2019-07-20 02:39:47.378 UTC [msp] DeserializeIdentity -> DEBU 97d Obtaining identity" +"2019-07-20 02:39:47.378 UTC [gossip.comm] Send -> DEBU 97e Entering, sending GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:47.378 UTC [gossip.discovery] sendMemResponse -> DEBU 97f Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\022" signature:"0D\002 W\351\001\371y\001\231%@\322\211\3049\215\241\214\032\360\251\332*\371\306-\211\210\005\316\305\245ea\002 B\255\255JU\256\330\014Y%\260Ki\200|\007u\026\2114\3708\377y*\355'\350i\020S\277" > alive: alive: alive: " +"2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 980 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9525972632863951429, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-07-20 02:39:47.379 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Exiting" +"2019-07-20 02:39:47.379 UTC [cauthdsl] func2 -> DEBU 982 0xc003c1cb50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.380 UTC [cauthdsl] func2 -> DEBU 983 0xc003c1cb50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.381 UTC [cauthdsl] func2 -> DEBU 984 0xc003c1cb50 principal matched by identity 0" +"2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 985 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.382 UTC [msp.identity] Verify -> DEBU 986 Verify: sig = 00000000 30 44 02 20 07 bf 14 d0 c5 d2 c1 f2 ef 16 88 ec |0D. ............| +00000010 81 9a 71 25 b5 56 e4 e9 cb d7 4c 8f 0c 43 f3 48 |..q%.V....L..C.H| +00000020 78 c8 33 85 02 20 60 09 fd ed 42 92 cb d1 d9 df |x.3.. `...B.....| +00000030 d8 6c c3 bb c4 88 49 a4 53 66 c4 e4 0d 33 9f fe |.l....I.Sf...3..| +00000040 71 c7 d1 67 c3 61 |q..g.a|" +"2019-07-20 02:39:47.383 UTC [cauthdsl] func2 -> DEBU 987 0xc003c1cb50 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.386 UTC [cauthdsl] func1 -> DEBU 988 0xc003c1cb50 gate 1563590387362093400 evaluation succeeds" +"2019-07-20 02:39:47.386 UTC [policies] Evaluate -> DEBU 989 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.387 UTC [policies] Evaluate -> DEBU 98b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.388 UTC [policies] Evaluate -> DEBU 98c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.388 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98d Authenticated 172.18.0.8:60318" +"2019-07-20 02:39:47.388 UTC [gossip.comm] GossipStream -> DEBU 98e Servicing 172.18.0.8:60318" +"2019-07-20 02:39:47.389 UTC [gossip.comm] writeToStream -> DEBU 98f Closing writing to stream" +"2019-07-20 02:39:47.389 UTC [gossip.comm] serviceConnection -> DEBU 990 Closing reading from stream" +"2019-07-20 02:39:47.390 UTC [grpc] infof -> DEBU 991 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 992 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-07-20 02:39:47.390 UTC [gossip.comm] readFromStream -> DEBU 993 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:47.391 UTC [gossip.comm] func2 -> DEBU 994 Client 172.18.0.8:60318 disconnected" +"2019-07-20 02:39:47.391 UTC [comm.grpc.server] 1 -> INFO 995 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60318 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=60.9364ms +"2019-07-20 02:39:47.392 UTC [gossip.comm] writeToStream -> DEBU 996 Closing writing to stream" +"2019-07-20 02:39:47.398 UTC [gossip.comm] func1 -> DEBU 997 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 998 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.403 UTC [gossip.gossip] handleMessage -> DEBU 999 Exiting" +"2019-07-20 02:39:47.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 99a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.404 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 99b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99c Verify: digest = 00000000 9f d0 26 d1 27 53 cc a4 10 e3 12 24 b9 9c af b5 |..&.'S.....$....| +00000010 d8 75 4f 57 66 75 65 1a 86 7e 3d c1 ec 77 c1 12 |.uOWfue..~=..w..|" +"2019-07-20 02:39:47.404 UTC [msp.identity] Verify -> DEBU 99d Verify: sig = 00000000 30 45 02 21 00 82 3a a6 f3 a6 43 fb fa 98 0b 6a |0E.!..:...C....j| +00000010 95 a3 d6 4b 72 16 b6 ec 61 57 e6 00 36 c7 f2 62 |...Kr...aW..6..b| +00000020 05 4f 2e fb 13 02 20 0e 17 15 56 af 2b 49 22 7d |.O.... ...V.+I"}| +00000030 30 66 0f f6 16 cf 2b 65 fb bf 25 25 21 03 0a c8 |0f....+e..%%!...| +00000040 b1 4b 80 07 67 0a ce |.K..g..|" +"2019-07-20 02:39:47.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 99e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 99f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a0 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:47.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a1 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a2 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:47.406 UTC [gossip.discovery] learnExistingMembers -> DEBU 9a3 Exiting" +"2019-07-20 02:39:47.406 UTC [gossip.discovery] handleAliveMessage -> DEBU 9a4 Exiting" +"2019-07-20 02:39:47.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9a5 Exiting" +"2019-07-20 02:39:47.407 UTC [msp] DeserializeIdentity -> DEBU 9a6 Obtaining identity" +"2019-07-20 02:39:47.408 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" +"2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" +"2019-07-20 02:39:47.409 UTC [gossip.comm] Send -> DEBU 9a9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:47.409 UTC [msp] DeserializeIdentity -> DEBU 9aa Obtaining identity" +"2019-07-20 02:39:47.410 UTC [gossip.comm] Send -> DEBU 9ab Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:47.411 UTC [gossip.comm] sendToEndpoint -> DEBU 9ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.412 UTC [gossip.comm] createConnection -> DEBU 9ad Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:47.413 UTC [comm.grpc.server] 1 -> INFO 9ae unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.411Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.507ms +"2019-07-20 02:39:47.415 UTC [grpc] DialContext -> DEBU 9af parsed scheme: """ +"2019-07-20 02:39:47.417 UTC [grpc] DialContext -> DEBU 9b1 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.418 UTC [grpc] watcher -> DEBU 9b2 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.418 UTC [grpc] switchBalancer -> DEBU 9b3 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.418 UTC [grpc] HandleSubConnStateChange -> DEBU 9b4 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, CONNECTING" +"2019-07-20 02:39:47.415 UTC [gossip.comm] sendToEndpoint -> DEBU 9b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:47.419 UTC [gossip.comm] sendToEndpoint -> DEBU 9b5 Exiting" +"2019-07-20 02:39:47.422 UTC [comm.grpc.server] 1 -> INFO 9b6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:39:49.421Z grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.3µs +"2019-07-20 02:39:47.425 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b7 Obtaining default signing identity" +"2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9ba Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.426 UTC [msp] GetDefaultSigningIdentity -> DEBU 9b8 Obtaining default signing identity" +"2019-07-20 02:39:47.426 UTC [grpc] HandleSubConnStateChange -> DEBU 9b9 pickfirstBalancer: HandleSubConnStateChange: 0xc003cd43a0, READY" +"2019-07-20 02:39:47.427 UTC [msp.identity] Sign -> DEBU 9bb Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.428 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9bd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:58958" +"2019-07-20 02:39:47.429 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9be Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:58958" +"2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9bf Obtaining identity" +"2019-07-20 02:39:47.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.429 UTC [msp] DeserializeIdentity -> DEBU 9c1 Obtaining identity" +"2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.430 UTC [msp] DeserializeIdentity -> DEBU 9c3 Obtaining identity" +"2019-07-20 02:39:47.428 UTC [msp.identity] Sign -> DEBU 9bc Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9c6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.431 UTC [policies] Evaluate -> DEBU 9c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.431 UTC [msp.identity] Sign -> DEBU 9ca Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9cc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60326" +"2019-07-20 02:39:47.432 UTC [policies] Evaluate -> DEBU 9c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9cd 0xc003d45cf0 gate 1563590387435038700 evaluation starts" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9ce 0xc003d45cf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9cf 0xc003d45cf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d0 0xc003d45cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func2 -> DEBU 9d1 0xc003d45cf0 principal evaluation fails" +"2019-07-20 02:39:47.435 UTC [cauthdsl] func1 -> DEBU 9d2 0xc003d45cf0 gate 1563590387435038700 evaluation fails" +"2019-07-20 02:39:47.436 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9d3 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60326" +"2019-07-20 02:39:47.436 UTC [msp] DeserializeIdentity -> DEBU 9d4 Obtaining identity" +"2019-07-20 02:39:47.436 UTC [policies] Evaluate -> DEBU 9d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.437 UTC [policies] Evaluate -> DEBU 9d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.437 UTC [cauthdsl] func1 -> DEBU 9d8 0xc003d6e530 gate 1563590387437254300 evaluation starts" +"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9d9 0xc003d6e530 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9da 0xc003d6e530 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.437 UTC [cauthdsl] func2 -> DEBU 9db 0xc003d6e530 principal matched by identity 0" +"2019-07-20 02:39:47.437 UTC [msp.identity] Verify -> DEBU 9dc Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:39:47.438 UTC [msp.identity] Verify -> DEBU 9dd Verify: sig = 00000000 30 45 02 21 00 a7 34 94 cc b4 6e 33 da 61 32 b7 |0E.!..4...n3.a2.| +00000010 02 32 93 59 79 93 21 66 bc 21 a2 25 1f 29 9e 4d |.2.Yy.!f.!.%.).M| +00000020 2f 7b 19 bf f5 02 20 4b e7 84 35 6f 18 ab 22 08 |/{.... K..5o..".| +00000030 f2 54 e4 20 6c 92 45 59 f2 10 63 8d 47 b2 2b 3c |.T. l.EY..c.G.+<| +00000040 fa db 89 4c 14 94 bf |...L...|" +"2019-07-20 02:39:47.438 UTC [cauthdsl] func2 -> DEBU 9de 0xc003d6e530 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.438 UTC [cauthdsl] func1 -> DEBU 9e0 0xc003d6e530 gate 1563590387437254300 evaluation succeeds" +"2019-07-20 02:39:47.439 UTC [grpc] infof -> DEBU 9e1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.438 UTC [policies] Evaluate -> DEBU 9e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.440 UTC [policies] Evaluate -> DEBU 9e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9e6 Authenticated 172.18.0.7:58958" +"2019-07-20 02:39:47.432 UTC [msp] GetDefaultSigningIdentity -> DEBU 9cb Obtaining default signing identity" +"2019-07-20 02:39:47.440 UTC [msp.identity] Sign -> DEBU 9e8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.440 UTC [gossip.comm] GossipStream -> DEBU 9e7 Servicing 172.18.0.7:58958" +"2019-07-20 02:39:47.441 UTC [msp.identity] Sign -> DEBU 9e9 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.441 UTC [msp] DeserializeIdentity -> DEBU 9ea Obtaining identity" +"2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9ec Closing reading from stream" +"2019-07-20 02:39:47.442 UTC [gossip.comm] func2 -> DEBU 9ed Client 172.18.0.7:58954 disconnected" +"2019-07-20 02:39:47.442 UTC [comm.grpc.server] 1 -> INFO 9ee streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:58954 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=95.2205ms +"2019-07-20 02:39:47.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.442 UTC [gossip.comm] serviceConnection -> DEBU 9f1 Closing reading from stream" +"2019-07-20 02:39:47.443 UTC [msp] DeserializeIdentity -> DEBU 9f2 Obtaining identity" +"2019-07-20 02:39:47.443 UTC [gossip.comm] writeToStream -> DEBU 9f4 Closing writing to stream" +"2019-07-20 02:39:47.443 UTC [gossip.comm] readFromStream -> DEBU 9f5 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-07-20 02:39:47.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9eb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-07-20 02:39:47.444 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9f6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" +"2019-07-20 02:39:47.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.444 UTC [msp] DeserializeIdentity -> DEBU 9f9 Obtaining identity" +"2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.445 UTC [msp] DeserializeIdentity -> DEBU 9fc Obtaining identity" +"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9fe Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9ff Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a00 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a01 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.446 UTC [policies] Evaluate -> DEBU a02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.447 UTC [cauthdsl] func1 -> DEBU a03 0xc003da1580 gate 1563590387446997800 evaluation starts" +"2019-07-20 02:39:47.442 UTC [gossip.comm] writeToStream -> DEBU 9f0 Closing writing to stream" +"2019-07-20 02:39:47.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a04 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a05 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.448 UTC [policies] Evaluate -> DEBU a07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.449 UTC [policies] Evaluate -> DEBU a08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.449 UTC [cauthdsl] func1 -> DEBU a09 0xc003d92da0 gate 1563590387449798200 evaluation starts" +"2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0a 0xc003d92da0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.450 UTC [cauthdsl] func2 -> DEBU a0b 0xc003d92da0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0c 0xc003d92da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0e 0xc003d92da0 principal evaluation fails" +"2019-07-20 02:39:47.451 UTC [cauthdsl] func1 -> DEBU a0f 0xc003d92da0 gate 1563590387449798200 evaluation fails" +"2019-07-20 02:39:47.451 UTC [grpc] infof -> DEBU a10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.443 UTC [gossip.comm] func2 -> DEBU 9f3 Client 172.18.0.7:58958 disconnected" +"2019-07-20 02:39:47.451 UTC [policies] Evaluate -> DEBU a11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.452 UTC [comm.grpc.server] 1 -> INFO a12 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:39:57.425Z grpc.peer_address=172.18.0.7:58958 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=26.4571ms +"2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.452 UTC [policies] Evaluate -> DEBU a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.451 UTC [cauthdsl] func2 -> DEBU a0d 0xc003da1580 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.453 UTC [cauthdsl] func1 -> DEBU a15 0xc003d935e0 gate 1563590387452999600 evaluation starts" +"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a17 0xc003d935e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a18 0xc003d935e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a19 0xc003d935e0 principal matched by identity 0" +"2019-07-20 02:39:47.453 UTC [cauthdsl] func2 -> DEBU a16 0xc003da1580 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1b 0xc003da1580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.454 UTC [cauthdsl] func2 -> DEBU a1c 0xc003da1580 principal evaluation fails" +"2019-07-20 02:39:47.455 UTC [cauthdsl] func1 -> DEBU a1d 0xc003da1580 gate 1563590387446997800 evaluation fails" +"2019-07-20 02:39:47.454 UTC [msp.identity] Verify -> DEBU a1a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.455 UTC [msp.identity] Verify -> DEBU a1e Verify: sig = 00000000 30 44 02 20 7e ef 42 17 4e 75 f7 b1 84 c6 08 ac |0D. ~.B.Nu......| +00000010 f5 93 48 4f 87 36 01 b1 22 a4 ec 7c d4 b4 d1 4d |..HO.6.."..|...M| +00000020 d0 f2 3c c0 02 20 57 66 4f b8 9d bd db 81 1f 00 |..<.. WfO.......| +00000030 7c a0 23 b4 ec 75 81 de 6e 69 1e 7e 23 92 c7 42 ||.#..u..ni.~#..B| +00000040 e3 cc 03 cb 12 6c |.....l|" +"2019-07-20 02:39:47.455 UTC [policies] Evaluate -> DEBU a1f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a20 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.456 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.456 UTC [cauthdsl] func1 -> DEBU a22 0xc003d93c60 gate 1563590387456635500 evaluation starts" +"2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a24 0xc003d93c60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a25 0xc003d93c60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.457 UTC [cauthdsl] func2 -> DEBU a26 0xc003d93c60 principal matched by identity 0" +"2019-07-20 02:39:47.456 UTC [cauthdsl] func2 -> DEBU a23 0xc003d935e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.457 UTC [cauthdsl] func1 -> DEBU a27 0xc003d935e0 gate 1563590387452999600 evaluation succeeds" +"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.458 UTC [policies] Evaluate -> DEBU a2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.458 UTC [gossip.comm] authenticateRemotePeer -> DEBU a2c Authenticated 172.18.0.8:60326" +"2019-07-20 02:39:47.459 UTC [gossip.comm] GossipStream -> DEBU a2d Servicing 172.18.0.8:60326" +"2019-07-20 02:39:47.459 UTC [gossip.comm] readFromStream -> DEBU a2e Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:39:47.459 UTC [gossip.comm] func2 -> DEBU a2f Client 172.18.0.8:60326 disconnected" +"2019-07-20 02:39:47.459 UTC [comm.grpc.server] 1 -> INFO a30 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60326 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.3484ms +"2019-07-20 02:39:47.460 UTC [gossip.comm] writeToStream -> DEBU a31 Closing writing to stream" +"2019-07-20 02:39:47.457 UTC [msp.identity] Verify -> DEBU a32 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:39:47.460 UTC [msp.identity] Verify -> DEBU a33 Verify: sig = 00000000 30 45 02 21 00 ee 4f fa 86 9e 91 8b 41 9c 03 b0 |0E.!..O.....A...| +00000010 f7 d0 7a ea bf 00 52 e8 69 02 8d 71 88 48 d5 52 |..z...R.i..q.H.R| +00000020 01 44 a3 a1 4a 02 20 39 89 1d b4 e2 32 73 e9 39 |.D..J. 9....2s.9| +00000030 ed 9c 15 0b 93 84 3c c6 20 0b 3b 8e 75 b2 56 74 |......<. .;.u.Vt| +00000040 45 4f 0c d5 22 dd 1c |EO.."..|" +"2019-07-20 02:39:47.460 UTC [cauthdsl] func2 -> DEBU a34 0xc003d93c60 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.461 UTC [cauthdsl] func1 -> DEBU a35 0xc003d93c60 gate 1563590387456635500 evaluation succeeds" +"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a36 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a38 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.461 UTC [policies] Evaluate -> DEBU a39 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.462 UTC [gossip.comm] authenticateRemotePeer -> DEBU a3a Authenticated 172.18.0.8:7051" +"2019-07-20 02:39:47.462 UTC [gossip.comm] createConnection -> DEBU a3b Exiting" +"2019-07-20 02:39:47.462 UTC [gossip.comm] sendToEndpoint -> DEBU a3c Exiting" +"2019-07-20 02:39:47.584 UTC [gossip.comm] func1 -> DEBU a3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.584 UTC [gossip.gossip] handleMessage -> DEBU a3f Exiting" +"2019-07-20 02:39:47.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU a40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU a41 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:47.584 UTC [msp] DeserializeIdentity -> DEBU a42 Obtaining identity" +"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a43 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a44 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a45 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.585 UTC [policies] Evaluate -> DEBU a47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a49 0xc003dc5ba0 gate 1563590387586305400 evaluation starts" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4a 0xc003dc5ba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4b 0xc003dc5ba0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4c 0xc003dc5ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func2 -> DEBU a4d 0xc003dc5ba0 principal evaluation fails" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a4e 0xc003dc5ba0 gate 1563590387586305400 evaluation fails" +"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.586 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.586 UTC [cauthdsl] func1 -> DEBU a52 0xc003de63e0 gate 1563590387586913300 evaluation starts" +"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a53 0xc003de63e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a54 0xc003de63e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.587 UTC [cauthdsl] func2 -> DEBU a55 0xc003de63e0 principal matched by identity 0" +"2019-07-20 02:39:47.587 UTC [grpc] infof -> DEBU a56 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a57 Verify: digest = 00000000 51 9a 6c 48 b8 eb d6 4b 88 88 ea d0 ec 8e 4b 42 |Q.lH...K......KB| +00000010 57 f4 fc 43 04 d0 64 31 4d 50 e0 af 73 83 b9 17 |W..C..d1MP..s...|" +"2019-07-20 02:39:47.588 UTC [msp.identity] Verify -> DEBU a58 Verify: sig = 00000000 30 44 02 20 65 d8 95 e0 67 01 de a1 7e ed 23 a0 |0D. e...g...~.#.| +00000010 d2 cb 0b 0a dd 64 02 e8 07 3c d2 2b b1 0a 39 d9 |.....d...<.+..9.| +00000020 9d a3 42 2b 02 20 76 d5 68 8a ff 92 e9 b5 62 28 |..B+. v.h.....b(| +00000030 50 49 6e 8b 2b 6e ba c8 6f 8e 45 15 a3 c5 41 80 |PIn.+n..o.E...A.| +00000040 9d 53 ef fe 7e 10 |.S..~.|" +"2019-07-20 02:39:47.588 UTC [cauthdsl] func2 -> DEBU a59 0xc003de63e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.588 UTC [cauthdsl] func1 -> DEBU a5a 0xc003de63e0 gate 1563590387586913300 evaluation succeeds" +"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.588 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a61 updating membership: timestamp: " +"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a62 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] learnExistingMembers -> DEBU a64 Exiting" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleAliveMessage -> DEBU a65 Exiting" +"2019-07-20 02:39:47.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU a66 Exiting" +"2019-07-20 02:39:47.596 UTC [gossip.comm] func1 -> DEBU a67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.596 UTC [gossip.gossip] handleMessage -> DEBU a69 Exiting" +"2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU a6b Exiting" +"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" +"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6d Obtaining identity" +"2019-07-20 02:39:47.598 UTC [msp] DeserializeIdentity -> DEBU a6e Obtaining identity" +"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a6f Obtaining identity" +"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a70 Obtaining identity" +"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a71 Obtaining identity" +"2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a72 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a73 Obtaining identity" +"2019-07-20 02:39:47.599 UTC [msp] DeserializeIdentity -> DEBU a74 Obtaining identity" +"2019-07-20 02:39:47.599 UTC [gossip.comm] Send -> DEBU a75 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a76 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.599 UTC [gossip.comm] createConnection -> DEBU a77 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:47.599 UTC [gossip.comm] sendToEndpoint -> DEBU a79 Exiting" +"2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7a parsed scheme: """ +"2019-07-20 02:39:47.601 UTC [grpc] DialContext -> DEBU a7b scheme "" not registered, fallback to default scheme" +"2019-07-20 02:39:47.601 UTC [grpc] watcher -> DEBU a7c ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-07-20 02:39:47.601 UTC [grpc] switchBalancer -> DEBU a7d ClientConn switching balancer to "pick_first"" +"2019-07-20 02:39:47.601 UTC [grpc] HandleSubConnStateChange -> DEBU a7e pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, CONNECTING" +"2019-07-20 02:39:47.613 UTC [grpc] HandleSubConnStateChange -> DEBU a7f pickfirstBalancer: HandleSubConnStateChange: 0xc003e15e40, READY" +"2019-07-20 02:39:47.616 UTC [msp] GetDefaultSigningIdentity -> DEBU a80 Obtaining default signing identity" +"2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a81 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:39:47.616 UTC [msp.identity] Sign -> DEBU a82 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:39:47.616 UTC [gossip.comm] authenticateRemotePeer -> DEBU a83 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051" +"2019-07-20 02:39:47.617 UTC [gossip.comm] authenticateRemotePeer -> DEBU a84 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" +"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a85 Obtaining identity" +"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a86 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a87 Obtaining identity" +"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.617 UTC [msp] DeserializeIdentity -> DEBU a89 Obtaining identity" +"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a8a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.617 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a8c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:47.617 UTC [policies] Evaluate -> DEBU a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:47.618 UTC [cauthdsl] func1 -> DEBU a90 0xc003e6ed10 gate 1563590387617822800 evaluation starts" +"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a91 0xc003e6ed10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a92 0xc003e6ed10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.618 UTC [cauthdsl] func2 -> DEBU a93 0xc003e6ed10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a94 0xc003e6ed10 principal evaluation fails" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a95 0xc003e6ed10 gate 1563590387617822800 evaluation fails" +"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a96 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:47.619 UTC [policies] Evaluate -> DEBU a98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func1 -> DEBU a99 0xc003e6f550 gate 1563590387619373700 evaluation starts" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9a 0xc003e6f550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9b 0xc003e6f550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:47.619 UTC [cauthdsl] func2 -> DEBU a9c 0xc003e6f550 principal matched by identity 0" +"2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:39:47.619 UTC [msp.identity] Verify -> DEBU a9e Verify: sig = 00000000 30 45 02 21 00 c3 13 c2 66 f7 f6 a6 53 8b 6b 86 |0E.!....f...S.k.| +00000010 c3 c3 e2 78 95 a9 22 3a f0 2e 00 bf 94 b5 74 02 |...x..":......t.| +00000020 20 8f bc 10 e4 02 20 50 2f be 78 fd 1d cd 08 72 | ..... P/.x....r| +00000030 58 e9 b7 ba 25 0d 0f 31 0c 59 72 1c 65 7a 12 dc |X...%..1.Yr.ez..| +00000040 af cb a2 d5 8d 70 b5 |.....p.|" +"2019-07-20 02:39:47.620 UTC [cauthdsl] func2 -> DEBU a9f 0xc003e6f550 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:47.620 UTC [cauthdsl] func1 -> DEBU aa0 0xc003e6f550 gate 1563590387619373700 evaluation succeeds" +"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:47.620 UTC [policies] Evaluate -> DEBU aa4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:47.621 UTC [gossip.comm] authenticateRemotePeer -> DEBU aa5 Authenticated 172.18.0.7:7051" +"2019-07-20 02:39:47.621 UTC [gossip.comm] createConnection -> DEBU aa6 Exiting" +"2019-07-20 02:39:47.621 UTC [gossip.comm] sendToEndpoint -> DEBU aa7 Exiting" +"2019-07-20 02:39:48.270 UTC [gossip.pull] Hello -> DEBU aa8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:48.270 UTC [gossip.comm] Send -> DEBU aa9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aaa Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aab Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.271 UTC [gossip.pull] Hello -> DEBU aac Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:39:48.271 UTC [gossip.comm] Send -> DEBU aad Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.271 UTC [gossip.comm] sendToEndpoint -> DEBU aaf Exiting" +"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab1 Exiting" +"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.272 UTC [gossip.comm] sendToEndpoint -> DEBU ab3 Exiting" +"2019-07-20 02:39:48.273 UTC [gossip.comm] func1 -> DEBU ab4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.273 UTC [gossip.gossip] handleMessage -> DEBU ab5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.274 UTC [gossip.pull] HandleMessage -> DEBU ab6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.274 UTC [gossip.gossip] handleMessage -> DEBU ab7 Exiting" +"2019-07-20 02:39:48.275 UTC [gossip.comm] func1 -> DEBU ab8 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU ab9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.275 UTC [gossip.pull] HandleMessage -> DEBU aba GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.275 UTC [gossip.gossip] handleMessage -> DEBU abb Exiting" +"2019-07-20 02:39:48.281 UTC [gossip.comm] func1 -> DEBU abc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.281 UTC [gossip.gossip] handleMessage -> DEBU abd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.282 UTC [gossip.pull] HandleMessage -> DEBU abe GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.282 UTC [gossip.gossip] handleMessage -> DEBU abf Exiting" +"2019-07-20 02:39:48.301 UTC [msp] GetDefaultSigningIdentity -> DEBU ac0 Obtaining default signing identity" +"2019-07-20 02:39:48.301 UTC [msp.identity] Sign -> DEBU ac1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151011 " +"2019-07-20 02:39:48.302 UTC [msp.identity] Sign -> DEBU ac2 Sign: digest: FFBB9045B582F1F2F605222245833C1B3A2C2C650EF05DD7A6C39D8270C5E845 " +"2019-07-20 02:39:48.303 UTC [msp] GetDefaultSigningIdentity -> DEBU ac3 Obtaining default signing identity" +"2019-07-20 02:39:48.303 UTC [msp.identity] Sign -> DEBU ac4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:48.304 UTC [msp.identity] Sign -> DEBU ac5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:48.304 UTC [gossip.comm] Send -> DEBU ac6 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.304 UTC [msp] DeserializeIdentity -> DEBU ac7 Obtaining identity" +"2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU ac8 Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.305 UTC [msp] DeserializeIdentity -> DEBU ac9 Obtaining identity" +"2019-07-20 02:39:48.305 UTC [gossip.comm] Send -> DEBU aca Entering, sending GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acc Exiting" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" secret_envelope:\r\256'\274n\363\370\230\035f\330\0038\177{;\256\377\002 8F\034yP\252\315\325\"$0\243b'\371\003\260\0070\327\001\215\007\236\202\357\256=\r\036`\005" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ace Exiting" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU acf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\226!\205\340\233y\007*E\237Q\347\030\010?\300\220\243\212 .\347G\335%\002 e~\205\261\237\367\037\266\367\317\256f\3428FC7/\035\221G!\236'\217E*\024~\364\003\225" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.306 UTC [gossip.comm] sendToEndpoint -> DEBU ad0 Exiting" +"2019-07-20 02:39:48.309 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.310 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" +"2019-07-20 02:39:48.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.311 UTC [gossip.comm] func1 -> DEBU ad8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.311 UTC [gossip.gossip] handleMessage -> DEBU ad9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.311 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +"2019-07-20 02:39:48.313 UTC [msp.identity] Verify -> DEBU ada Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +00000040 2a 14 7e f4 03 95 |*.~...|" +"2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU adb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.314 UTC [gossip.discovery] isSentByMe -> DEBU adc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.314 UTC [gossip.discovery] handleAliveMessage -> DEBU add Exiting" +"2019-07-20 02:39:48.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ade Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:48.317 UTC [msp] DeserializeIdentity -> DEBU adf Obtaining identity" +"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ae0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ae2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.318 UTC [policies] Evaluate -> DEBU ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.319 UTC [cauthdsl] func1 -> DEBU ae6 0xc003e87ff0 gate 1563590388319200400 evaluation starts" +"2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae7 0xc003e87ff0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.319 UTC [cauthdsl] func2 -> DEBU ae8 0xc003e87ff0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU ae9 0xc003e87ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.320 UTC [cauthdsl] func2 -> DEBU aea 0xc003e87ff0 principal evaluation fails" +"2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aeb 0xc003e87ff0 gate 1563590388319200400 evaluation fails" +"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.321 UTC [policies] Evaluate -> DEBU aee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.321 UTC [cauthdsl] func1 -> DEBU aef 0xc003f10830 gate 1563590388321942500 evaluation starts" +"2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af0 0xc003f10830 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.322 UTC [cauthdsl] func2 -> DEBU af1 0xc003f10830 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.323 UTC [cauthdsl] func2 -> DEBU af2 0xc003f10830 principal matched by identity 0" +"2019-07-20 02:39:48.323 UTC [msp.identity] Verify -> DEBU af3 Verify: digest = 00000000 dd a6 da a6 83 bb 3d 4d 62 9a 5c b6 79 ea 94 3e |......=Mb.\.y..>| +00000010 51 07 45 5e 71 f1 1a 16 0b 38 83 2a 80 ff b5 f1 |Q.E^q....8.*....|" +"2019-07-20 02:39:48.325 UTC [msp.identity] Verify -> DEBU af4 Verify: sig = 00000000 30 44 02 20 50 79 7d 88 3f 03 86 f4 b3 4f 62 86 |0D. Py}.?....Ob.| +00000010 8a 38 18 a2 e6 0f 11 c6 13 fa b4 76 ec 39 45 64 |.8.........v.9Ed| +00000020 ae b3 f0 40 02 20 0f ce 1f 8d d4 23 9c 3e 25 a0 |...@. .....#.>%.| +00000030 01 30 85 29 fd 39 85 ea 54 0e ac 7c bd 5d 42 d7 |.0.).9..T..|.]B.| +00000040 e0 b9 fa 90 d5 f9 |......|" +"2019-07-20 02:39:48.326 UTC [cauthdsl] func2 -> DEBU af5 0xc003f10830 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.329 UTC [cauthdsl] func1 -> DEBU af6 0xc003f10830 gate 1563590388321942500 evaluation succeeds" +"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.330 UTC [policies] Evaluate -> DEBU af9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.331 UTC [policies] Evaluate -> DEBU afa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.331 UTC [gossip.discovery] handleAliveMessage -> DEBU afb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afd updating membership: timestamp: " +"2019-07-20 02:39:48.332 UTC [gossip.discovery] learnExistingMembers -> DEBU afe Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU aff Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:48.333 UTC [gossip.discovery] learnExistingMembers -> DEBU b00 Exiting" +"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleAliveMessage -> DEBU b01 Exiting" +"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b02 Exiting" +"2019-07-20 02:39:48.334 UTC [gossip.discovery] handleMsgFromComm -> DEBU b03 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.335 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b04 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b05 Exiting" +"2019-07-20 02:39:48.335 UTC [gossip.gossip] handleMessage -> DEBU b06 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b07 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +"2019-07-20 02:39:48.335 UTC [msp.identity] Verify -> DEBU b08 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +00000040 2a 14 7e f4 03 95 |*.~...|" +"2019-07-20 02:39:48.336 UTC [gossip.discovery] handleAliveMessage -> DEBU b09 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.337 UTC [gossip.discovery] isSentByMe -> DEBU b0a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.337 UTC [gossip.discovery] handleAliveMessage -> DEBU b0b Exiting" +"2019-07-20 02:39:48.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b0c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:48.337 UTC [msp] DeserializeIdentity -> DEBU b0d Obtaining identity" +"2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:48.338 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b0f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.339 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b10 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.339 UTC [policies] Evaluate -> DEBU b13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.340 UTC [cauthdsl] func1 -> DEBU b14 0xc003f253c0 gate 1563590388340226000 evaluation starts" +"2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b15 0xc003f253c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.340 UTC [cauthdsl] func2 -> DEBU b16 0xc003f253c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b17 0xc003f253c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.341 UTC [cauthdsl] func2 -> DEBU b18 0xc003f253c0 principal evaluation fails" +"2019-07-20 02:39:48.341 UTC [cauthdsl] func1 -> DEBU b19 0xc003f253c0 gate 1563590388340226000 evaluation fails" +"2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.341 UTC [policies] Evaluate -> DEBU b1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.342 UTC [policies] Evaluate -> DEBU b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.342 UTC [cauthdsl] func1 -> DEBU b1d 0xc003f25c00 gate 1563590388342300800 evaluation starts" +"2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1e 0xc003f25c00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.342 UTC [cauthdsl] func2 -> DEBU b1f 0xc003f25c00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.343 UTC [cauthdsl] func2 -> DEBU b20 0xc003f25c00 principal matched by identity 0" +"2019-07-20 02:39:48.343 UTC [msp.identity] Verify -> DEBU b21 Verify: digest = 00000000 83 07 cd 61 c5 95 48 f2 88 fe e8 ac 2f 59 7a 7b |...a..H...../Yz{| +00000010 5f 4d d3 51 85 71 8c 9e 54 a9 d7 0b 3d 29 32 cb |_M.Q.q..T...=)2.|" +"2019-07-20 02:39:48.344 UTC [msp.identity] Verify -> DEBU b22 Verify: sig = 00000000 30 45 02 21 00 9f d8 8c b9 60 a6 3c 4e 57 db d6 |0E.!.....`. DEBU b23 0xc003f25c00 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.344 UTC [cauthdsl] func1 -> DEBU b24 0xc003f25c00 gate 1563590388342300800 evaluation succeeds" +"2019-07-20 02:39:48.344 UTC [policies] Evaluate -> DEBU b25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b27 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.345 UTC [policies] Evaluate -> DEBU b28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b29 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2a endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 20 but got ts: inc_num:1563590371938894800 seq_num:8 " +"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleAliveMessage -> DEBU b2b Exiting" +"2019-07-20 02:39:48.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2c Exiting" +"2019-07-20 02:39:48.347 UTC [gossip.discovery] handleMsgFromComm -> DEBU b2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.347 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b2e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:48.347 UTC [endorser] ProcessProposal -> DEBU b2f Entering: request from 172.18.0.9:58326" +"2019-07-20 02:39:48.347 UTC [protoutils] ValidateProposalMessage -> DEBU b30 ValidateProposalMessage starts for signed proposal 0xc003e3f720" +"2019-07-20 02:39:48.347 UTC [protoutils] validateChannelHeader -> DEBU b31 validateChannelHeader info: header type 3" +"2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b32 begin" +"2019-07-20 02:39:48.347 UTC [protoutils] checkSignatureFromCreator -> DEBU b33 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:39:48.348 UTC [protoutils] checkSignatureFromCreator -> DEBU b34 creator is valid" +"2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| +00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" +"2019-07-20 02:39:48.348 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| +00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| +00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| +00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| +00000040 43 3c 6e 22 ad 26 76 |C DEBU b37 exits successfully" +"2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b38 validateChaincodeProposalMessage starts for proposal 0xc003e368c0, header 0xc003e3fb30" +"2019-07-20 02:39:48.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU b39 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:39:48.348 UTC [endorser] preProcess -> DEBU b3a [][0b8a6e52] processing txid: 0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da" +"2019-07-20 02:39:48.348 UTC [endorser] SimulateProposal -> DEBU b3b [][0b8a6e52] Entry chaincode: name:"lscc" " +"2019-07-20 02:39:48.349 UTC [endorser] callChaincode -> INFO b3c [][0b8a6e52] Entry chaincode: name:"lscc" " +"2019-07-20 02:39:48.349 UTC [chaincode] Execute -> DEBU b3d Entry" +"2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 61 4e b1 91 45 01 64 14 f4 f8 1d 3d 60 e8 02 8f |aN..E.d....=`...| +00000010 e2 1a 80 0c b6 ea 07 32 b7 8f 09 44 a1 09 b5 08 |.......2...D....|" +"2019-07-20 02:39:48.349 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 e8 57 06 93 54 ee cd d5 f7 7a 98 |0E.!..W..T....z.| +00000010 e9 0b 87 d6 50 8e c5 d9 c5 44 85 f2 24 76 60 0f |....P....D..$v`.| +00000020 5a e6 e3 ca 4f 02 20 3a 19 54 4b 6d b6 a2 66 6a |Z...O. :.TKm..fj| +00000030 a9 0d 07 cb ca d1 df 11 ec 9d 47 a4 51 75 2c 4c |..........G.Qu,L| +00000040 43 3c 6e 22 ad 26 76 |C DEBU b40 Created metadata tar" +"2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b41 HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +"2019-07-20 02:39:48.349 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b42 Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +"2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU b43 constructing new query executor txid = [709da35e-09b3-41d0-8efc-62c5eb9dda45]" +"2019-07-20 02:39:48.349 UTC [stateleveldb] GetState -> DEBU b44 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:39:48.349 UTC [lockbasedtxmgr] Done -> DEBU b45 Done with transaction simulation / query execution [709da35e-09b3-41d0-8efc-62c5eb9dda45]" +"2019-07-20 02:39:48.350 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU b46 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +"2019-07-20 02:39:48.350 UTC [lscc] executeInstall -> INFO b47 Installed Chaincode [exp02] Version [1.0] to peer" +"2019-07-20 02:39:48.350 UTC [chaincode] handleMessage -> DEBU b48 [0b8a6e52] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:48.350 UTC [chaincode] Notify -> DEBU b49 [0b8a6e52] notifying Txid:0b8a6e52ac63c86441c5945c21b8b6c5947ea07bddb6b92e8376ce17066117da, channelID:" +"2019-07-20 02:39:48.350 UTC [chaincode] Execute -> DEBU b4a Exit" +"2019-07-20 02:39:48.350 UTC [endorser] callChaincode -> INFO b4b [][0b8a6e52] Exit chaincode: name:"lscc" (1ms)" +"2019-07-20 02:39:48.350 UTC [endorser] SimulateProposal -> DEBU b4c [][0b8a6e52] Exit" +"2019-07-20 02:39:48.350 UTC [endorser] func1 -> DEBU b4d Exit: request from 172.18.0.9:58326" +"2019-07-20 02:39:48.350 UTC [comm.grpc.server] 1 -> INFO b4e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58326 grpc.code=OK grpc.call_duration=2.9756ms +"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b50 Verify: digest = 00000000 ff bb 90 45 b5 82 f1 f2 f6 05 22 22 45 83 3c 1b |...E......""E.<.| +00000010 3a 2c 2c 65 0e f0 5d d7 a6 c3 9d 82 70 c5 e8 45 |:,,e..].....p..E|" +"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b51 Verify: sig = 00000000 30 44 02 20 32 3f 4c f9 c2 3e ad 96 21 85 e0 9b |0D. 2?L..>..!...| +00000010 79 07 2a 45 9f 51 e7 18 08 3f c0 90 a3 8a 20 2e |y.*E.Q...?.... .| +00000020 e7 47 dd 25 02 20 65 7e 85 b1 9f f7 1f b6 f7 cf |.G.%. e~........| +00000030 ae 66 e2 38 46 43 37 2f 1d 91 47 21 9e 27 8f 45 |.f.8FC7/..G!.'.E| +00000040 2a 14 7e f4 03 95 |*.~...|" +"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b52 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:48.351 UTC [msp.identity] Verify -> DEBU b53 Verify: sig = 00000000 30 44 02 20 4d c5 8f c3 73 8e 7e e4 eb f9 c4 9a |0D. M...s.~.....| +00000010 b2 3e 0d ae 27 bc 6e f3 f8 98 1d 66 d8 03 38 7f |.>..'.n....f..8.| +00000020 7b 3b ae ff 02 20 38 46 1c 79 50 aa cd d5 22 24 |{;... 8F.yP..."$| +00000030 30 a3 62 27 f9 03 b0 07 30 d7 01 8d 07 9e 82 ef |0.b'....0.......| +00000040 ae 3d 0d 1e 60 05 |.=..`.|" +"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:48.351 UTC [gossip.discovery] isSentByMe -> DEBU b55 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Exiting" +"2019-07-20 02:39:48.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU b57 Exiting" +"2019-07-20 02:39:48.351 UTC [gossip.gossip] handleMessage -> DEBU b4f Exiting" +"2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b58 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:48.355 UTC [grpc] warningf -> DEBU b59 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58326: read: connection reset by peer" +"2019-07-20 02:39:48.355 UTC [grpc] infof -> DEBU b5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.393 UTC [gossip.comm] func1 -> DEBU b5c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.393 UTC [gossip.gossip] handleMessage -> DEBU b5d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5e Exiting" +"2019-07-20 02:39:48.395 UTC [gossip.gossip] handleMessage -> DEBU b5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.396 UTC [gossip.pull] HandleMessage -> DEBU b61 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.396 UTC [gossip.pull] SendDigest -> DEBU b62 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:48.396 UTC [gossip.gossip] handleMessage -> DEBU b63 Exiting" +"2019-07-20 02:39:48.396 UTC [gossip.discovery] handleMsgFromComm -> DEBU b60 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b64 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b65 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| +00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" +"2019-07-20 02:39:48.397 UTC [msp.identity] Verify -> DEBU b66 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| +00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| +00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| +00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| +00000040 dc a4 f9 81 1a 32 |.....2|" +"2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b67 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:48.398 UTC [msp.identity] Verify -> DEBU b68 Verify: sig = 00000000 30 45 02 21 00 96 a4 ee c3 c1 8e eb b9 d7 c2 9b |0E.!............| +00000010 6b ab d1 8d 5e 9f 5c 75 38 f5 10 ce 52 9c 78 d2 |k...^.\u8...R.x.| +00000020 93 a8 92 24 d3 02 20 2b e2 d7 d4 f8 0a d5 6c 72 |...$.. +......lr| +00000030 59 f3 a0 6c 99 80 0a 10 25 ff fb 32 18 71 14 78 |Y..l....%..2.q.x| +00000040 35 a9 cf 1f 10 be 91 |5......|" +"2019-07-20 02:39:48.399 UTC [gossip.discovery] handleAliveMessage -> DEBU b69 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:48.399 UTC [gossip.discovery] learnExistingMembers -> DEBU b6c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:48.400 UTC [gossip.discovery] learnExistingMembers -> DEBU b6e Exiting" +"2019-07-20 02:39:48.400 UTC [gossip.discovery] handleAliveMessage -> DEBU b6f Exiting" +"2019-07-20 02:39:48.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU b70 Exiting" +"2019-07-20 02:39:48.401 UTC [gossip.discovery] sendMemResponse -> DEBU b71 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b72 Obtaining identity" +"2019-07-20 02:39:48.401 UTC [msp] DeserializeIdentity -> DEBU b73 Obtaining identity" +"2019-07-20 02:39:48.402 UTC [gossip.comm] Send -> DEBU b74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.402 UTC [gossip.comm] sendToEndpoint -> DEBU b76 Exiting" +"2019-07-20 02:39:48.402 UTC [gossip.discovery] sendMemResponse -> DEBU b77 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" secret_envelope: > alive: " +"2019-07-20 02:39:48.574 UTC [gossip.comm] func1 -> DEBU b78 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.574 UTC [gossip.gossip] handleMessage -> DEBU b79 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.575 UTC [gossip.pull] HandleMessage -> DEBU b7a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7b Obtaining identity" +"2019-07-20 02:39:48.576 UTC [msp] DeserializeIdentity -> DEBU b7c Obtaining identity" +"2019-07-20 02:39:48.576 UTC [gossip.pull] SendDigest -> DEBU b7d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:48.576 UTC [gossip.gossip] handleMessage -> DEBU b7e Exiting" +"2019-07-20 02:39:48.577 UTC [gossip.comm] func1 -> DEBU b7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.577 UTC [gossip.gossip] handleMessage -> DEBU b80 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.578 UTC [gossip.gossip] handleMessage -> DEBU b81 Exiting" +"2019-07-20 02:39:48.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU b82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 164 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.579 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b83 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:48.579 UTC [msp] DeserializeIdentity -> DEBU b84 Obtaining identity" +"2019-07-20 02:39:48.580 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b86 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.581 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b87 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.581 UTC [policies] Evaluate -> DEBU b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.581 UTC [cauthdsl] func1 -> DEBU b8b 0xc003f8b790 gate 1563590388581282400 evaluation starts" +"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8c 0xc003f8b790 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8d 0xc003f8b790 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8e 0xc003f8b790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.581 UTC [cauthdsl] func2 -> DEBU b8f 0xc003f8b790 principal evaluation fails" +"2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b90 0xc003f8b790 gate 1563590388581282400 evaluation fails" +"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.582 UTC [policies] Evaluate -> DEBU b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.582 UTC [cauthdsl] func1 -> DEBU b94 0xc003f8bfd0 gate 1563590388582493300 evaluation starts" +"2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b95 0xc003f8bfd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.582 UTC [cauthdsl] func2 -> DEBU b96 0xc003f8bfd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.583 UTC [cauthdsl] func2 -> DEBU b97 0xc003f8bfd0 principal matched by identity 0" +"2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b98 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| +00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" +"2019-07-20 02:39:48.583 UTC [msp.identity] Verify -> DEBU b99 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| +00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| +00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | +00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| +00000040 32 48 30 50 b8 |2H0P.|" +"2019-07-20 02:39:48.584 UTC [cauthdsl] func2 -> DEBU b9a 0xc003f8bfd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.584 UTC [cauthdsl] func1 -> DEBU b9b 0xc003f8bfd0 gate 1563590388582493300 evaluation succeeds" +"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.584 UTC [policies] Evaluate -> DEBU b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.585 UTC [gossip.discovery] handleAliveMessage -> DEBU ba0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +"2019-07-20 02:39:48.585 UTC [gossip.discovery] learnExistingMembers -> DEBU ba1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes]}" +"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba2 updating membership: timestamp: " +"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba3 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:48.586 UTC [gossip.discovery] learnExistingMembers -> DEBU ba5 Exiting" +"2019-07-20 02:39:48.587 UTC [gossip.discovery] handleAliveMessage -> DEBU ba6 Exiting" +"2019-07-20 02:39:48.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba7 Exiting" +"2019-07-20 02:39:48.587 UTC [gossip.discovery] sendMemResponse -> DEBU ba8 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU ba9 Obtaining identity" +"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU baa Obtaining identity" +"2019-07-20 02:39:48.587 UTC [msp] DeserializeIdentity -> DEBU bab Obtaining identity" +"2019-07-20 02:39:48.588 UTC [gossip.comm] Send -> DEBU bac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bad Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.589 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" +"2019-07-20 02:39:48.589 UTC [gossip.discovery] sendMemResponse -> DEBU baf Exiting, replying with alive: alive:%\240\0010\205)\3759\205\352T\016\254|\275]B\327\340\271\372\220\325\371" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: " +"2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb0 Obtaining identity" +"2019-07-20 02:39:48.752 UTC [msp] DeserializeIdentity -> DEBU bb1 Obtaining identity" +"2019-07-20 02:39:48.753 UTC [gossip.comm] Send -> DEBU bb2 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.753 UTC [gossip.comm] sendToEndpoint -> DEBU bb4 Exiting" +"2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.754 UTC [gossip.comm] sendToEndpoint -> DEBU bb6 Exiting" +"2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.755 UTC [gossip.comm] sendToEndpoint -> DEBU bb8 Exiting" +"2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bb9 Obtaining identity" +"2019-07-20 02:39:48.755 UTC [msp] DeserializeIdentity -> DEBU bba Obtaining identity" +"2019-07-20 02:39:48.756 UTC [gossip.pull] Hello -> DEBU bbb Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:48.757 UTC [gossip.comm] Send -> DEBU bbd Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbe Obtaining identity" +"2019-07-20 02:39:48.757 UTC [msp] DeserializeIdentity -> DEBU bbf Obtaining identity" +"2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.758 UTC [gossip.comm] sendToEndpoint -> DEBU bc2 Exiting" +"2019-07-20 02:39:48.758 UTC [gossip.comm] func1 -> DEBU bc1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.763 UTC [gossip.comm] func1 -> DEBU bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.757 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.763 UTC [gossip.comm] sendToEndpoint -> DEBU bc6 Exiting" +"2019-07-20 02:39:48.766 UTC [gossip.gossip] handleMessage -> DEBU bc7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc8 Obtaining identity" +"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bc9 Obtaining identity" +"2019-07-20 02:39:48.767 UTC [msp] DeserializeIdentity -> DEBU bca Obtaining identity" +"2019-07-20 02:39:48.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:48.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bce Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bcf Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.777 UTC [policies] Evaluate -> DEBU bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.778 UTC [cauthdsl] func1 -> DEBU bd3 0xc003c5c4e0 gate 1563590388778029000 evaluation starts" +"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd4 0xc003c5c4e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd5 0xc003c5c4e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd6 0xc003c5c4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.778 UTC [cauthdsl] func2 -> DEBU bd7 0xc003c5c4e0 principal evaluation fails" +"2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bd8 0xc003c5c4e0 gate 1563590388778029000 evaluation fails" +"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.779 UTC [policies] Evaluate -> DEBU bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.779 UTC [cauthdsl] func1 -> DEBU bdc 0xc003c5cd30 gate 1563590388779866400 evaluation starts" +"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdd 0xc003c5cd30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bde 0xc003c5cd30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.780 UTC [cauthdsl] func2 -> DEBU bdf 0xc003c5cd30 principal matched by identity 0" +"2019-07-20 02:39:48.780 UTC [msp.identity] Verify -> DEBU be0 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:48.781 UTC [msp.identity] Verify -> DEBU be1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:48.781 UTC [cauthdsl] func2 -> DEBU be2 0xc003c5cd30 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.782 UTC [cauthdsl] func1 -> DEBU be3 0xc003c5cd30 gate 1563590388779866400 evaluation succeeds" +"2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.782 UTC [policies] Evaluate -> DEBU be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.783 UTC [policies] Evaluate -> DEBU be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.769 UTC [gossip.comm] sendToEndpoint -> DEBU bcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.783 UTC [msp] DeserializeIdentity -> DEBU be8 Obtaining identity" +"2019-07-20 02:39:48.783 UTC [gossip.comm] sendToEndpoint -> DEBU be9 Exiting" +"2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bea Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU beb Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.784 UTC [policies] Evaluate -> DEBU bee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.784 UTC [cauthdsl] func1 -> DEBU bef 0xc00369e5e0 gate 1563590388784488600 evaluation starts" +"2019-07-20 02:39:48.762 UTC [gossip.comm] sendToEndpoint -> DEBU bc3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.784 UTC [gossip.comm] sendToEndpoint -> DEBU bf1 Exiting" +"2019-07-20 02:39:48.769 UTC [gossip.comm] func1 -> DEBU bcd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.784 UTC [cauthdsl] func2 -> DEBU bf0 0xc00369e5e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bf2 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf3 0xc00369e5e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf4 0xc00369e5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.786 UTC [cauthdsl] func2 -> DEBU bf5 0xc00369e5e0 principal evaluation fails" +"2019-07-20 02:39:48.786 UTC [cauthdsl] func1 -> DEBU bf6 0xc00369e5e0 gate 1563590388784488600 evaluation fails" +"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.787 UTC [policies] Evaluate -> DEBU bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.787 UTC [cauthdsl] func1 -> DEBU bfa 0xc003424290 gate 1563590388787778800 evaluation starts" +"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfb 0xc003424290 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfc 0xc003424290 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.786 UTC [gossip.comm] func1 -> DEBU bfd Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.788 UTC [cauthdsl] func2 -> DEBU bfe 0xc003424290 principal matched by identity 0" +"2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU bff Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:48.789 UTC [msp.identity] Verify -> DEBU c00 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:48.789 UTC [cauthdsl] func2 -> DEBU c01 0xc003424290 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.790 UTC [cauthdsl] func1 -> DEBU c02 0xc003424290 gate 1563590388787778800 evaluation succeeds" +"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c05 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.790 UTC [policies] Evaluate -> DEBU c06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c07 Exiting" +"2019-07-20 02:39:48.791 UTC [gossip.gossip] handleMessage -> DEBU c08 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" +"2019-07-20 02:39:48.791 UTC [msp] DeserializeIdentity -> DEBU c0a Obtaining identity" +"2019-07-20 02:39:48.792 UTC [msp] DeserializeIdentity -> DEBU c0b Obtaining identity" +"2019-07-20 02:39:48.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.793 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.793 UTC [policies] Evaluate -> DEBU c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.794 UTC [policies] Evaluate -> DEBU c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.794 UTC [cauthdsl] func1 -> DEBU c12 0xc002f881c0 gate 1563590388794622500 evaluation starts" +"2019-07-20 02:39:48.794 UTC [cauthdsl] func2 -> DEBU c13 0xc002f881c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c14 0xc002f881c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.795 UTC [cauthdsl] func2 -> DEBU c15 0xc002f881c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.798 UTC [cauthdsl] func2 -> DEBU c16 0xc002f881c0 principal evaluation fails" +"2019-07-20 02:39:48.798 UTC [cauthdsl] func1 -> DEBU c17 0xc002f881c0 gate 1563590388794622500 evaluation fails" +"2019-07-20 02:39:48.798 UTC [policies] Evaluate -> DEBU c18 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.799 UTC [policies] Evaluate -> DEBU c1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.800 UTC [cauthdsl] func1 -> DEBU c1b 0xc002f88a00 gate 1563590388800124500 evaluation starts" +"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1c 0xc002f88a00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1d 0xc002f88a00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.800 UTC [cauthdsl] func2 -> DEBU c1e 0xc002f88a00 principal matched by identity 0" +"2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c1f Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:48.801 UTC [msp.identity] Verify -> DEBU c20 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:48.801 UTC [cauthdsl] func2 -> DEBU c21 0xc002f88a00 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.801 UTC [cauthdsl] func1 -> DEBU c22 0xc002f88a00 gate 1563590388800124500 evaluation succeeds" +"2019-07-20 02:39:48.801 UTC [policies] Evaluate -> DEBU c23 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c25 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.802 UTC [policies] Evaluate -> DEBU c26 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.803 UTC [msp] DeserializeIdentity -> DEBU c27 Obtaining identity" +"2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c28 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.803 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c29 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.803 UTC [policies] Evaluate -> DEBU c2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c2d 0xc002f89af0 gate 1563590388803987600 evaluation starts" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2e 0xc002f89af0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c2f 0xc002f89af0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c30 0xc002f89af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func2 -> DEBU c31 0xc002f89af0 principal evaluation fails" +"2019-07-20 02:39:48.804 UTC [cauthdsl] func1 -> DEBU c32 0xc002f89af0 gate 1563590388803987600 evaluation fails" +"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c33 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.805 UTC [policies] Evaluate -> DEBU c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:48.805 UTC [cauthdsl] func1 -> DEBU c36 0xc0003dc380 gate 1563590388805933700 evaluation starts" +"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c37 0xc0003dc380 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c38 0xc0003dc380 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.806 UTC [cauthdsl] func2 -> DEBU c39 0xc0003dc380 principal matched by identity 0" +"2019-07-20 02:39:48.806 UTC [msp.identity] Verify -> DEBU c3a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:48.807 UTC [msp.identity] Verify -> DEBU c3b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:48.807 UTC [cauthdsl] func2 -> DEBU c3c 0xc0003dc380 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.807 UTC [cauthdsl] func1 -> DEBU c3d 0xc0003dc380 gate 1563590388805933700 evaluation succeeds" +"2019-07-20 02:39:48.807 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c40 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.808 UTC [policies] Evaluate -> DEBU c41 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c42 Exiting" +"2019-07-20 02:39:48.808 UTC [gossip.gossip] handleMessage -> DEBU c43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c44 Verify: digest = 00000000 32 33 fc e6 d3 c3 38 f4 ff ec d9 4a ea 4e 2c 6b |23....8....J.N,k| +00000010 c8 49 ed 2f c8 e7 a4 4a d2 09 e1 ac 5f 95 4a ee |.I./...J...._.J.|" +"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c45 Verify: sig = 00000000 30 44 02 20 1b b4 6d f6 ae 3b cb 37 54 49 5d 88 |0D. ..m..;.7TI].| +00000010 af a0 31 de 23 33 f2 1a 6c d6 b6 5e 78 83 08 ab |..1.#3..l..^x...| +00000020 5f e7 5f df 02 20 4a 91 80 93 fc d7 53 30 81 9c |_._.. J.....S0..| +00000030 0d 16 cc 7c ca c1 59 77 c6 ea 43 74 84 8a ad 37 |...|..Yw..Ct...7| +00000040 36 d7 1f 14 5c d8 |6...\.|" +"2019-07-20 02:39:48.809 UTC [msp.identity] Verify -> DEBU c46 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:48.810 UTC [msp.identity] Verify -> DEBU c47 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c48 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c49 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:48.811 UTC [policies] Evaluate -> DEBU c4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:48.812 UTC [policies] Evaluate -> DEBU c4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:48.813 UTC [policies] Evaluate -> DEBU c4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:48.813 UTC [msp] DeserializeIdentity -> DEBU c4d Obtaining identity" +"2019-07-20 02:39:48.814 UTC [msp.identity] newIdentity -> DEBU c4e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-07-20 02:39:48.815 UTC [cauthdsl] func1 -> DEBU c4f 0xc0002ec510 gate 1563590388815103800 evaluation starts" +"2019-07-20 02:39:48.815 UTC [cauthdsl] func2 -> DEBU c50 0xc0002ec510 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:48.816 UTC [cauthdsl] func2 -> DEBU c51 0xc0002ec510 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:48.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c52 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:39:48.817 UTC [msp] Validate -> DEBU c53 MSP Org1MSP validating identity" +"2019-07-20 02:39:48.818 UTC [msp] getCertificationChain -> DEBU c54 MSP Org1MSP getting certification chain" +"2019-07-20 02:39:48.819 UTC [cauthdsl] func2 -> DEBU c55 0xc0002ec510 principal matched by identity 0" +"2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c56 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:48.820 UTC [msp.identity] Verify -> DEBU c57 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:48.821 UTC [cauthdsl] func2 -> DEBU c58 0xc0002ec510 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:48.822 UTC [cauthdsl] func1 -> DEBU c59 0xc0002ec510 gate 1563590388815103800 evaluation succeeds" +"2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.823 UTC [policies] Evaluate -> DEBU c5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:48.824 UTC [policies] Evaluate -> DEBU c5c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:48.825 UTC [policies] Evaluate -> DEBU c5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:48.825 UTC [gossip.gossip] handleMessage -> DEBU c5e Exiting" +"2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c5f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.826 UTC [gossip.pull] HandleMessage -> DEBU c60 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.826 UTC [gossip.gossip] handleMessage -> DEBU c61 Exiting" +"2019-07-20 02:39:48.827 UTC [gossip.gossip] handleMessage -> DEBU c62 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c63 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:48.827 UTC [msp.identity] Verify -> DEBU c64 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:48.828 UTC [msp] DeserializeIdentity -> DEBU c65 Obtaining identity" +"2019-07-20 02:39:48.828 UTC [gossip.gossip] handleMessage -> DEBU c66 Exiting" +"2019-07-20 02:39:48.912 UTC [gossip.comm] func1 -> DEBU c67 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.913 UTC [gossip.gossip] handleMessage -> DEBU c68 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c69 Obtaining identity" +"2019-07-20 02:39:48.915 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" +"2019-07-20 02:39:48.916 UTC [gossip.gossip] handleMessage -> DEBU c6b Exiting" +"2019-07-20 02:39:48.927 UTC [gossip.comm] func1 -> DEBU c6c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.928 UTC [gossip.gossip] handleMessage -> DEBU c6d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.928 UTC [gossip.pull] HandleMessage -> DEBU c6e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:48.929 UTC [gossip.pull] SendDigest -> DEBU c70 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c71 Exiting" +"2019-07-20 02:39:48.929 UTC [gossip.comm] func1 -> DEBU c6f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:48.929 UTC [gossip.gossip] handleMessage -> DEBU c72 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c73 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:48.930 UTC [msp.identity] Verify -> DEBU c74 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:48.930 UTC [gossip.gossip] handleMessage -> DEBU c75 Exiting" +"2019-07-20 02:39:48.937 UTC [gossip.comm] func1 -> DEBU c76 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:48.937 UTC [gossip.gossip] handleMessage -> DEBU c77 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c78 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:48.938 UTC [msp.identity] Verify -> DEBU c79 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:48.939 UTC [msp] DeserializeIdentity -> DEBU c7a Obtaining identity" +"2019-07-20 02:39:48.939 UTC [gossip.gossip] handleMessage -> DEBU c7b Exiting" +"2019-07-20 02:39:49.077 UTC [gossip.comm] func1 -> DEBU c7c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.077 UTC [gossip.gossip] handleMessage -> DEBU c7d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7e Obtaining identity" +"2019-07-20 02:39:49.077 UTC [msp] DeserializeIdentity -> DEBU c7f Obtaining identity" +"2019-07-20 02:39:49.078 UTC [msp] DeserializeIdentity -> DEBU c80 Obtaining identity" +"2019-07-20 02:39:49.078 UTC [gossip.gossip] handleMessage -> DEBU c81 Exiting" +"2019-07-20 02:39:49.082 UTC [gossip.comm] func1 -> DEBU c82 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.083 UTC [gossip.gossip] handleMessage -> DEBU c83 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.083 UTC [msp] DeserializeIdentity -> DEBU c84 Obtaining identity" +"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c86 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.084 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c87 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:49.084 UTC [policies] Evaluate -> DEBU c8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:49.085 UTC [cauthdsl] func1 -> DEBU c8b 0xc0002d7a20 gate 1563590389084995900 evaluation starts" +"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8c 0xc0002d7a20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8d 0xc0002d7a20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.085 UTC [cauthdsl] func2 -> DEBU c8e 0xc0002d7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:49.086 UTC [cauthdsl] func2 -> DEBU c8f 0xc0002d7a20 principal evaluation fails" +"2019-07-20 02:39:49.086 UTC [cauthdsl] func1 -> DEBU c90 0xc0002d7a20 gate 1563590389084995900 evaluation fails" +"2019-07-20 02:39:49.086 UTC [policies] Evaluate -> DEBU c91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.087 UTC [policies] Evaluate -> DEBU c93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:49.087 UTC [cauthdsl] func1 -> DEBU c94 0xc00027a260 gate 1563590389087922900 evaluation starts" +"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c95 0xc00027a260 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c96 0xc00027a260 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.088 UTC [cauthdsl] func2 -> DEBU c97 0xc00027a260 principal matched by identity 0" +"2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c98 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:49.088 UTC [msp.identity] Verify -> DEBU c99 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:49.089 UTC [cauthdsl] func2 -> DEBU c9a 0xc00027a260 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:49.089 UTC [cauthdsl] func1 -> DEBU c9b 0xc00027a260 gate 1563590389087922900 evaluation succeeds" +"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:49.089 UTC [policies] Evaluate -> DEBU c9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:49.090 UTC [msp] DeserializeIdentity -> DEBU ca0 Obtaining identity" +"2019-07-20 02:39:49.090 UTC [gossip.gossip] handleMessage -> DEBU ca1 Exiting" +"2019-07-20 02:39:49.093 UTC [gossip.comm] func1 -> DEBU ca2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.093 UTC [gossip.gossip] handleMessage -> DEBU ca3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.093 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ca5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.094 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ca7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.094 UTC [policies] Evaluate -> DEBU ca8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU ca9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:49.095 UTC [policies] Evaluate -> DEBU caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:49.095 UTC [cauthdsl] func1 -> DEBU cab 0xc00027bda0 gate 1563590389095398000 evaluation starts" +"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cac 0xc00027bda0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cad 0xc00027bda0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.095 UTC [cauthdsl] func2 -> DEBU cae 0xc00027bda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:49.096 UTC [cauthdsl] func2 -> DEBU caf 0xc00027bda0 principal evaluation fails" +"2019-07-20 02:39:49.096 UTC [cauthdsl] func1 -> DEBU cb0 0xc00027bda0 gate 1563590389095398000 evaluation fails" +"2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.096 UTC [policies] Evaluate -> DEBU cb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.097 UTC [policies] Evaluate -> DEBU cb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:49.097 UTC [cauthdsl] func1 -> DEBU cb4 0xc0002665e0 gate 1563590389097311700 evaluation starts" +"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb5 0xc0002665e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb6 0xc0002665e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.097 UTC [cauthdsl] func2 -> DEBU cb7 0xc0002665e0 principal matched by identity 0" +"2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:49.098 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:49.098 UTC [cauthdsl] func2 -> DEBU cba 0xc0002665e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:49.099 UTC [cauthdsl] func1 -> DEBU cbb 0xc0002665e0 gate 1563590389097311700 evaluation succeeds" +"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.099 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:49.100 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:49.100 UTC [msp] DeserializeIdentity -> DEBU cc0 Obtaining identity" +"2019-07-20 02:39:49.100 UTC [gossip.gossip] handleMessage -> DEBU cc1 Exiting" +"2019-07-20 02:39:49.225 UTC [gossip.comm] func1 -> DEBU cc2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.225 UTC [gossip.gossip] handleMessage -> DEBU cc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc4 Obtaining identity" +"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc5 Obtaining identity" +"2019-07-20 02:39:49.226 UTC [msp] DeserializeIdentity -> DEBU cc6 Obtaining identity" +"2019-07-20 02:39:49.227 UTC [gossip.gossip] handleMessage -> DEBU cc7 Exiting" +"2019-07-20 02:39:49.230 UTC [gossip.comm] func1 -> DEBU cc8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.230 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-07-20 02:39:49.231 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" +"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ccb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.231 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ccd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.231 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:49.232 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:49.232 UTC [cauthdsl] func1 -> DEBU cd1 0xc000262860 gate 1563590389232465300 evaluation starts" +"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd2 0xc000262860 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd3 0xc000262860 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.232 UTC [cauthdsl] func2 -> DEBU cd4 0xc000262860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:49.233 UTC [cauthdsl] func2 -> DEBU cd5 0xc000262860 principal evaluation fails" +"2019-07-20 02:39:49.233 UTC [cauthdsl] func1 -> DEBU cd6 0xc000262860 gate 1563590389232465300 evaluation fails" +"2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.233 UTC [policies] Evaluate -> DEBU cd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.234 UTC [policies] Evaluate -> DEBU cd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:49.234 UTC [cauthdsl] func1 -> DEBU cda 0xc0002630a0 gate 1563590389234175000 evaluation starts" +"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdb 0xc0002630a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdc 0xc0002630a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.234 UTC [cauthdsl] func2 -> DEBU cdd 0xc0002630a0 principal matched by identity 0" +"2019-07-20 02:39:49.234 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:49.235 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:49.235 UTC [cauthdsl] func2 -> DEBU ce0 0xc0002630a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:49.235 UTC [cauthdsl] func1 -> DEBU ce1 0xc0002630a0 gate 1563590389234175000 evaluation succeeds" +"2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.236 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.237 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:49.238 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:49.239 UTC [msp] DeserializeIdentity -> DEBU ce6 Obtaining identity" +"2019-07-20 02:39:49.239 UTC [gossip.gossip] handleMessage -> DEBU ce7 Exiting" +"2019-07-20 02:39:49.273 UTC [gossip.pull] SendReq -> DEBU ce8 Sending [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +"2019-07-20 02:39:49.274 UTC [gossip.comm] Send -> DEBU ce9 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:49.275 UTC [gossip.pull] SendReq -> DEBU cea Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to peer1.org2.example.com:7051" +"2019-07-20 02:39:49.275 UTC [gossip.comm] Send -> DEBU cec Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:49.275 UTC [gossip.comm] sendToEndpoint -> DEBU ceb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU ced Exiting" +"2019-07-20 02:39:49.276 UTC [gossip.comm] sendToEndpoint -> DEBU cee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.278 UTC [gossip.comm] sendToEndpoint -> DEBU cef Exiting" +"2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.281 UTC [gossip.gossip] handleMessage -> DEBU cf1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.281 UTC [msp] DeserializeIdentity -> DEBU cf2 Obtaining identity" +"2019-07-20 02:39:49.281 UTC [gossip.comm] func1 -> DEBU cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.282 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.283 UTC [policies] Evaluate -> DEBU cf7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:49.284 UTC [policies] Evaluate -> DEBU cf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:49.286 UTC [cauthdsl] func1 -> DEBU cfa 0xc000228180 gate 1563590389286449300 evaluation starts" +"2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfb 0xc000228180 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.287 UTC [cauthdsl] func2 -> DEBU cfc 0xc000228180 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfd 0xc000228180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:49.288 UTC [cauthdsl] func2 -> DEBU cfe 0xc000228180 principal evaluation fails" +"2019-07-20 02:39:49.288 UTC [cauthdsl] func1 -> DEBU cff 0xc000228180 gate 1563590389286449300 evaluation fails" +"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.289 UTC [policies] Evaluate -> DEBU d02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:49.290 UTC [cauthdsl] func1 -> DEBU d03 0xc00020cb70 gate 1563590389290395000 evaluation starts" +"2019-07-20 02:39:49.290 UTC [cauthdsl] func2 -> DEBU d04 0xc00020cb70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.291 UTC [cauthdsl] func2 -> DEBU d05 0xc00020cb70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.292 UTC [cauthdsl] func2 -> DEBU d06 0xc00020cb70 principal matched by identity 0" +"2019-07-20 02:39:49.292 UTC [msp.identity] Verify -> DEBU d07 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +"2019-07-20 02:39:49.293 UTC [msp.identity] Verify -> DEBU d08 Verify: sig = 00000000 30 44 02 20 16 11 2c 76 34 0b 04 99 7d e7 f0 df |0D. ..,v4...}...| +00000010 43 2d 8c 9d e2 09 62 f0 49 8e 3a a0 26 d1 c8 e6 |C-....b.I.:.&...| +00000020 7d 07 c6 57 02 20 66 02 4d 17 39 5f d4 bd 22 ef |}..W. f.M.9_..".| +00000030 56 e0 3b 54 38 80 01 ed 3f a5 90 22 06 14 80 77 |V.;T8...?.."...w| +00000040 bf ae d3 ef 0c ad |......|" +"2019-07-20 02:39:49.294 UTC [cauthdsl] func2 -> DEBU d09 0xc00020cb70 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:49.295 UTC [cauthdsl] func1 -> DEBU d0a 0xc00020cb70 gate 1563590389290395000 evaluation succeeds" +"2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.296 UTC [policies] Evaluate -> DEBU d0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:49.297 UTC [policies] Evaluate -> DEBU d0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:49.298 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" +"2019-07-20 02:39:49.299 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.300 UTC [gossip.pull] HandleMessage -> DEBU d11 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 2397890359429312696, Envelope: 956 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.301 UTC [msp] DeserializeIdentity -> DEBU d12 Obtaining identity" +"2019-07-20 02:39:49.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.305 UTC [msp] DeserializeIdentity -> DEBU d14 Obtaining identity" +"2019-07-20 02:39:49.306 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.307 UTC [gossip.gossip] func2 -> DEBU d16 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-07-20 02:39:49.307 UTC [gossip.pull] HandleMessage -> DEBU d17 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +"2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d18 Exiting" +"2019-07-20 02:39:49.308 UTC [gossip.gossip] handleMessage -> DEBU d19 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.309 UTC [msp] DeserializeIdentity -> DEBU d1a Obtaining identity" +"2019-07-20 02:39:49.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.310 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d1d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:49.311 UTC [policies] Evaluate -> DEBU d1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:49.312 UTC [policies] Evaluate -> DEBU d1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:49.313 UTC [policies] Evaluate -> DEBU d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:49.313 UTC [cauthdsl] func1 -> DEBU d21 0xc00044e980 gate 1563590389313647700 evaluation starts" +"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d22 0xc00044e980 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d23 0xc00044e980 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d24 0xc00044e980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:49.318 UTC [cauthdsl] func2 -> DEBU d25 0xc00044e980 principal evaluation fails" +"2019-07-20 02:39:49.319 UTC [cauthdsl] func1 -> DEBU d26 0xc00044e980 gate 1563590389313647700 evaluation fails" +"2019-07-20 02:39:49.320 UTC [policies] Evaluate -> DEBU d27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:49.321 UTC [policies] Evaluate -> DEBU d29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:49.322 UTC [cauthdsl] func1 -> DEBU d2a 0xc00044f240 gate 1563590389322117800 evaluation starts" +"2019-07-20 02:39:49.322 UTC [cauthdsl] func2 -> DEBU d2b 0xc00044f240 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2c 0xc00044f240 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:49.323 UTC [cauthdsl] func2 -> DEBU d2d 0xc00044f240 principal matched by identity 0" +"2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2e Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +"2019-07-20 02:39:49.324 UTC [msp.identity] Verify -> DEBU d2f Verify: sig = 00000000 30 45 02 21 00 b2 0f 25 2e 73 2c ce ca bb da 79 |0E.!...%.s,....y| +00000010 49 7b f3 40 32 fb 7b 7e 3c f4 d0 a5 9c 36 14 8a |I{.@2.{~<....6..| +00000020 ca b4 aa d9 f3 02 20 30 b1 bf 9c 24 a5 aa 46 47 |...... 0...$..FG| +00000030 51 70 36 5a 52 b5 25 aa bf 66 3b 36 1d 1e c6 3a |Qp6ZR.%..f;6...:| +00000040 fb ef cf 54 18 2b 4d |...T.+M|" +"2019-07-20 02:39:49.326 UTC [cauthdsl] func2 -> DEBU d30 0xc00044f240 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:49.326 UTC [cauthdsl] func1 -> DEBU d31 0xc00044f240 gate 1563590389322117800 evaluation succeeds" +"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d34 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:49.326 UTC [policies] Evaluate -> DEBU d35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:49.326 UTC [msp] DeserializeIdentity -> DEBU d36 Obtaining identity" +"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d38 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7348253777525924848, Envelope: 957 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d39 Obtaining identity" +"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.327 UTC [msp] DeserializeIdentity -> DEBU d3b Obtaining identity" +"2019-07-20 02:39:49.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:49.327 UTC [gossip.gossip] func2 -> DEBU d3d Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-07-20 02:39:49.327 UTC [gossip.pull] HandleMessage -> DEBU d3e Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +"2019-07-20 02:39:49.327 UTC [gossip.gossip] handleMessage -> DEBU d3f Exiting" +"2019-07-20 02:39:49.574 UTC [gossip.comm] func1 -> DEBU d40 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.574 UTC [gossip.gossip] handleMessage -> DEBU d41 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.576 UTC [gossip.pull] HandleMessage -> DEBU d42 GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-07-20 02:39:49.576 UTC [msp] DeserializeIdentity -> DEBU d43 Obtaining identity" +"2019-07-20 02:39:49.577 UTC [gossip.gossip] handleMessage -> DEBU d44 Exiting" +"2019-07-20 02:39:49.577 UTC [gossip.pull] SendRes -> DEBU d45 Sending 1 IDENTITY_MSG items to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:50.748 UTC [endorser] ProcessProposal -> DEBU d46 Entering: request from 172.18.0.9:58342" +"2019-07-20 02:39:50.748 UTC [protoutils] ValidateProposalMessage -> DEBU d47 ValidateProposalMessage starts for signed proposal 0xc0002c0d70" +"2019-07-20 02:39:50.749 UTC [protoutils] validateChannelHeader -> DEBU d48 validateChannelHeader info: header type 3" +"2019-07-20 02:39:50.749 UTC [protoutils] checkSignatureFromCreator -> DEBU d49 begin" +"2019-07-20 02:39:50.749 UTC [msp] GetManagerForChain -> DEBU d4a Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:39:50.749 UTC [msp] DeserializeIdentity -> DEBU d4b Obtaining identity" +"2019-07-20 02:39:50.750 UTC [msp.identity] newIdentity -> DEBU d4c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:39:50.750 UTC [protoutils] checkSignatureFromCreator -> DEBU d4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:39:50.750 UTC [msp] Validate -> DEBU d4e MSP Org1MSP validating identity" +"2019-07-20 02:39:50.751 UTC [msp] getCertificationChain -> DEBU d4f MSP Org1MSP getting certification chain" +"2019-07-20 02:39:50.751 UTC [protoutils] checkSignatureFromCreator -> DEBU d50 creator is valid" +"2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d51 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| +00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" +"2019-07-20 02:39:50.751 UTC [msp.identity] Verify -> DEBU d52 Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| +00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| +00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| +00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| +00000040 4d 7b 7e 17 65 84 |M{~.e.|" +"2019-07-20 02:39:50.752 UTC [protoutils] checkSignatureFromCreator -> DEBU d53 exits successfully" +"2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d54 validateChaincodeProposalMessage starts for proposal 0xc003982bd0, header 0xc0002c12c0" +"2019-07-20 02:39:50.752 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d55 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:39:50.752 UTC [endorser] preProcess -> DEBU d56 [businesschannel][79f74fa3] processing txid: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f" +"2019-07-20 02:39:50.752 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d57 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +"2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d58 constructing new tx simulator" +"2019-07-20 02:39:50.752 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d59 constructing new tx simulator txid = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +"2019-07-20 02:39:50.753 UTC [endorser] SimulateProposal -> DEBU d5a [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +"2019-07-20 02:39:50.753 UTC [endorser] callChaincode -> INFO d5b [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +"2019-07-20 02:39:50.754 UTC [chaincode] Execute -> DEBU d5c Entry" +"2019-07-20 02:39:50.755 UTC [chaincode] handleMessage -> DEBU d5d [79f74fa3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d5e [79f74fa3] handling GET_STATE from chaincode" +"2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d5f [79f74fa3] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-07-20 02:39:50.755 UTC [stateleveldb] GetState -> DEBU d60 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:39:50.755 UTC [chaincode] HandleGetState -> DEBU d61 [79f74fa3] No state associated with key: exp02. Sending RESPONSE with an empty payload" +"2019-07-20 02:39:50.755 UTC [chaincode] HandleTransaction -> DEBU d62 [79f74fa3] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:39:50.756 UTC [msp] GetManagerForChain -> DEBU d63 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:39:50.757 UTC [cauthdsl] func1 -> DEBU d64 0xc00042a3a0 gate 1563590390756990200 evaluation starts" +"2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d65 0xc00042a3a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:50.757 UTC [cauthdsl] func2 -> DEBU d66 0xc00042a3a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:50.763 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d67 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d68 0xc00042a3a0 principal matched by identity 0" +"2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d69 Verify: digest = 00000000 57 7b e2 3e 1d 82 63 42 fa 2c a7 c7 11 dc 39 b2 |W{.>..cB.,....9.| +00000010 dc ed 2f 91 c1 96 75 5b 2c df 5f 10 56 0c e2 b9 |../...u[,._.V...|" +"2019-07-20 02:39:50.763 UTC [msp.identity] Verify -> DEBU d6a Verify: sig = 00000000 30 44 02 20 3d c4 f0 de 31 42 86 8f 63 d6 6b 17 |0D. =...1B..c.k.| +00000010 55 c7 bf 46 b6 de 95 5d 1c 12 50 5b 94 cc 44 30 |U..F...]..P[..D0| +00000020 07 64 ae 11 02 20 6c 41 8e 4d a8 49 18 f7 c3 86 |.d... lA.M.I....| +00000030 70 bd 27 76 81 8b cf e3 64 4b f0 b4 bd e3 fa d6 |p.'v....dK......| +00000040 4d 7b 7e 17 65 84 |M{~.e.|" +"2019-07-20 02:39:50.763 UTC [cauthdsl] func2 -> DEBU d6b 0xc00042a3a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6c 0xc00042a3a0 signed by 1 principal evaluation starts (used [true])" +"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6d 0xc00042a3a0 skipping identity 0 because it has already been used" +"2019-07-20 02:39:50.764 UTC [cauthdsl] func2 -> DEBU d6e 0xc00042a3a0 principal evaluation fails" +"2019-07-20 02:39:50.764 UTC [cauthdsl] func1 -> DEBU d6f 0xc00042a3a0 gate 1563590390756990200 evaluation succeeds" +"2019-07-20 02:39:50.765 UTC [chaincode] handleMessage -> DEBU d70 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d71 [79f74fa3] handling PUT_STATE from chaincode" +"2019-07-20 02:39:50.765 UTC [chaincode] HandleTransaction -> DEBU d72 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:39:50.766 UTC [lscc] putChaincodeCollectionData -> DEBU d73 No collection configuration specified" +"2019-07-20 02:39:50.766 UTC [gossip.channel] reportMembershipChanges -> INFO d74 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +"2019-07-20 02:39:50.766 UTC [chaincode] handleMessage -> DEBU d75 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:39:50.767 UTC [chaincode] Notify -> DEBU d76 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" +"2019-07-20 02:39:50.767 UTC [chaincode] Execute -> DEBU d77 Exit" +"2019-07-20 02:39:50.768 UTC [chaincode] LaunchConfig -> DEBU d78 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d79 start container: exp02:1.0" +"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7a start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-07-20 02:39:50.768 UTC [chaincode] Start -> DEBU d7b start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-07-20 02:39:50.768 UTC [container] lockContainer -> DEBU d7c waiting for container(exp02-1.0) lock" +"2019-07-20 02:39:50.769 UTC [container] lockContainer -> DEBU d7d got container (exp02-1.0) lock" +"2019-07-20 02:39:50.769 UTC [dockercontroller] stopInternal -> DEBU d7e stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d7f stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-07-20 02:39:50.772 UTC [dockercontroller] stopInternal -> DEBU d80 killing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d81 kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-07-20 02:39:50.775 UTC [dockercontroller] stopInternal -> DEBU d82 removing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:39:50.778 UTC [dockercontroller] stopInternal -> DEBU d83 remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-07-20 02:39:50.779 UTC [dockercontroller] createContainer -> DEBU d84 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:39:50.779 UTC [dockercontroller] getDockerHostConfig -> DEBU d85 docker container hostconfig NetworkMode: hlf_net" +"2019-07-20 02:39:50.785 UTC [chaincode.platform] GenerateDockerfile -> DEBU d86 +FROM hyperledger/fabric-baseos:amd64-0.4.15 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.2" \ + org.hyperledger.fabric.base.version="0.4.15" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.2" +"2019-07-20 02:39:50.790 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO d87 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-07-20 02:39:50.791 UTC [chaincode.platform.util] DockerBuild -> DEBU d88 Attempting build with image hyperledger/fabric-ccenv:latest" +"2019-07-20 02:39:51.783 UTC [gossip.election] waitForInterrupt -> DEBU d89 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:39:51.784 UTC [gossip.election] IsLeader -> DEBU d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:39:51.784 UTC [msp] GetDefaultSigningIdentity -> DEBU d8b Obtaining default signing identity" +"2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510031801 " +"2019-07-20 02:39:51.784 UTC [msp.identity] Sign -> DEBU d8d Sign: digest: C125DA54F2FD625A6FF1593601FC46CF784E6611475464A50DC95F7779AC6E7F " +"2019-07-20 02:39:51.784 UTC [gossip.election] waitForInterrupt -> DEBU d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d8f Obtaining identity" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d90 Obtaining identity" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d91 Obtaining identity" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d92 Obtaining identity" +"2019-07-20 02:39:51.790 UTC [gossip.comm] Send -> DEBU d93 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" +"2019-07-20 02:39:51.790 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" +"2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.790 UTC [gossip.comm] sendToEndpoint -> DEBU d97 Exiting" +"2019-07-20 02:39:51.954 UTC [gossip.comm] func1 -> DEBU d98 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.955 UTC [gossip.comm] func1 -> DEBU d99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.956 UTC [gossip.comm] func1 -> DEBU d9a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.960 UTC [gossip.gossip] handleMessage -> DEBU d9b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9c Exiting" +"2019-07-20 02:39:51.961 UTC [gossip.gossip] handleMessage -> DEBU d9d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU d9e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d9f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:51.962 UTC [msp] DeserializeIdentity -> DEBU da0 Obtaining identity" +"2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU da1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:51.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:51.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU da3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:51.963 UTC [policies] Evaluate -> DEBU da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:51.963 UTC [cauthdsl] func1 -> DEBU da7 0xc00069b140 gate 1563590391963945100 evaluation starts" +"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da8 0xc00069b140 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU da9 0xc00069b140 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:51.964 UTC [cauthdsl] func2 -> DEBU daa 0xc00069b140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:51.965 UTC [cauthdsl] func2 -> DEBU dab 0xc00069b140 principal evaluation fails" +"2019-07-20 02:39:51.965 UTC [cauthdsl] func1 -> DEBU dac 0xc00069b140 gate 1563590391963945100 evaluation fails" +"2019-07-20 02:39:51.965 UTC [policies] Evaluate -> DEBU dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:51.966 UTC [policies] Evaluate -> DEBU daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:51.966 UTC [cauthdsl] func1 -> DEBU db0 0xc00069b9b0 gate 1563590391966552900 evaluation starts" +"2019-07-20 02:39:51.966 UTC [cauthdsl] func2 -> DEBU db1 0xc00069b9b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db2 0xc00069b9b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:51.967 UTC [cauthdsl] func2 -> DEBU db3 0xc00069b9b0 principal matched by identity 0" +"2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| +00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" +"2019-07-20 02:39:51.968 UTC [msp.identity] Verify -> DEBU db5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| +00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| +00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| +00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| +00000040 bd 87 29 80 ca a0 |..)...|" +"2019-07-20 02:39:51.968 UTC [cauthdsl] func2 -> DEBU db6 0xc00069b9b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:51.969 UTC [cauthdsl] func1 -> DEBU db7 0xc00069b9b0 gate 1563590391966552900 evaluation succeeds" +"2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:51.969 UTC [policies] Evaluate -> DEBU db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dba Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:51.970 UTC [policies] Evaluate -> DEBU dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:51.971 UTC [gossip.comm] func1 -> DEBU dbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.972 UTC [gossip.discovery] handleAliveMessage -> DEBU dbd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.972 UTC [gossip.discovery] learnExistingMembers -> DEBU dbe Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dbf updating membership: timestamp: " +"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc0 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:51.973 UTC [gossip.discovery] learnExistingMembers -> DEBU dc2 Exiting" +"2019-07-20 02:39:51.974 UTC [gossip.discovery] handleAliveMessage -> DEBU dc3 Exiting" +"2019-07-20 02:39:51.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU dc4 Exiting" +"2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dc5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc6 Obtaining identity" +"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc7 Obtaining identity" +"2019-07-20 02:39:51.974 UTC [msp] DeserializeIdentity -> DEBU dc8 Obtaining identity" +"2019-07-20 02:39:51.974 UTC [gossip.comm] Send -> DEBU dc9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:51.974 UTC [gossip.discovery] sendMemResponse -> DEBU dca Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\025" signature:"0D\002 (?g26Y\326s\r4\203\273\372\307!\202\024\201\311;\216\257\251\300\037\0214C$\036\366P\002 \016\025\346\213W\332\316\017\345\031j|k!\252k\026H\344\254Q\233\343}AJ\334\244\371\201\0322" > alive: alive: alive: " +"2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 644 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.975 UTC [gossip.comm] sendToEndpoint -> DEBU dcc Exiting" +"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dcd Exiting" +"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.975 UTC [gossip.pull] HandleMessage -> DEBU dcf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd0 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd1 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [msp] DeserializeIdentity -> DEBU dd5 Obtaining identity" +"2019-07-20 02:39:51.975 UTC [gossip.pull] SendDigest -> DEBU dd6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd7 Exiting" +"2019-07-20 02:39:51.975 UTC [gossip.gossip] handleMessage -> DEBU dd8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.977 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU dda Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:51.977 UTC [msp] DeserializeIdentity -> DEBU ddb Obtaining identity" +"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ddc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ddd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:51.978 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dde Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU ddf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:51.979 UTC [policies] Evaluate -> DEBU de1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:51.979 UTC [cauthdsl] func1 -> DEBU de2 0xc0006bbb60 gate 1563590391979879400 evaluation starts" +"2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de3 0xc0006bbb60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:51.979 UTC [cauthdsl] func2 -> DEBU de4 0xc0006bbb60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de5 0xc0006bbb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU de6 0xc0006bbb60 principal evaluation fails" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU de7 0xc0006bbb60 gate 1563590391979879400 evaluation fails" +"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:51.980 UTC [policies] Evaluate -> DEBU dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func1 -> DEBU deb 0xc0007323a0 gate 1563590391980879800 evaluation starts" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dec 0xc0007323a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU ded 0xc0007323a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:51.980 UTC [cauthdsl] func2 -> DEBU dee 0xc0007323a0 principal matched by identity 0" +"2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU def Verify: digest = 00000000 46 20 41 cc 8d 58 2c 2b 0f 57 ff f2 22 90 f5 5f |F A..X,+.W..".._| +00000010 bc ce 6d 92 64 45 bd 5a 06 5a 03 b3 ad a9 94 81 |..m.dE.Z.Z......|" +"2019-07-20 02:39:51.981 UTC [msp.identity] Verify -> DEBU df0 Verify: sig = 00000000 30 44 02 20 0e cf c9 77 85 5f 4d 3d 6d 04 af 83 |0D. ...w._M=m...| +00000010 9b 19 c0 51 38 19 6a ee a8 70 f3 6c 64 29 c2 52 |...Q8.j..p.ld).R| +00000020 30 df 6e 4f 02 20 0b 19 89 11 de db 6f 04 b7 5f |0.nO. ......o.._| +00000030 00 ae d2 67 e7 1f 76 d9 e0 ae 82 ab c9 2a 4a 46 |...g..v......*JF| +00000040 7a 3d 72 97 6b c2 |z=r.k.|" +"2019-07-20 02:39:51.982 UTC [cauthdsl] func2 -> DEBU df1 0xc0007323a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:51.982 UTC [cauthdsl] func1 -> DEBU df2 0xc0007323a0 gate 1563590391980879800 evaluation succeeds" +"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:51.982 UTC [policies] Evaluate -> DEBU df6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df8 endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" lastAliveTS: 1563590371938894800, 22 but got ts: inc_num:1563590371938894800 seq_num:21 " +"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleAliveMessage -> DEBU df9 Exiting" +"2019-07-20 02:39:51.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfa Exiting" +"2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.983 UTC [gossip.discovery] handleMsgFromComm -> DEBU dfc Exiting" +"2019-07-20 02:39:51.983 UTC [gossip.gossip] handleMessage -> DEBU dfd Exiting" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dfe Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e00 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e01 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e02 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e03 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e04 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e05 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:51.993 UTC [msp] DeserializeIdentity -> DEBU e06 Obtaining identity" +"2019-07-20 02:39:51.993 UTC [gossip.comm] Send -> DEBU e07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e08 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e09 Exiting" +"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:51.994 UTC [gossip.comm] sendToEndpoint -> DEBU e0b Exiting" +"2019-07-20 02:39:52.265 UTC [msp] GetDefaultSigningIdentity -> DEBU e0c Obtaining default signing identity" +"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151012 " +"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e0e Sign: digest: 15EC745CBC671F78A19C4207B9A2F43A526D8229FE508D1D60C1F4E245B3FB39 " +"2019-07-20 02:39:52.266 UTC [msp] GetDefaultSigningIdentity -> DEBU e0f Obtaining default signing identity" +"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e10 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:52.266 UTC [msp.identity] Sign -> DEBU e11 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:52.266 UTC [gossip.discovery] periodicalSendAlive -> DEBU e12 Sleeping 5s" +"2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" +"2019-07-20 02:39:52.269 UTC [msp] DeserializeIdentity -> DEBU e14 Obtaining identity" +"2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e15 Obtaining identity" +"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e16 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:52.270 UTC [msp] DeserializeIdentity -> DEBU e18 Obtaining identity" +"2019-07-20 02:39:52.270 UTC [gossip.comm] Send -> DEBU e19 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1b Exiting" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1d Exiting" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.270 UTC [gossip.comm] sendToEndpoint -> DEBU e1f Exiting" +"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e20 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.272 UTC [gossip.pull] Hello -> DEBU e24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:39:52.272 UTC [gossip.comm] Send -> DEBU e25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e27 Exiting" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e28 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e29 Exiting" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.272 UTC [gossip.comm] sendToEndpoint -> DEBU e2b Exiting" +"2019-07-20 02:39:52.273 UTC [gossip.comm] func1 -> DEBU e2c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.273 UTC [gossip.pull] HandleMessage -> DEBU e2e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 118 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.273 UTC [gossip.gossip] handleMessage -> DEBU e2f Exiting" +"2019-07-20 02:39:52.274 UTC [gossip.comm] func1 -> DEBU e30 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e31 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.274 UTC [gossip.pull] HandleMessage -> DEBU e32 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.274 UTC [gossip.gossip] handleMessage -> DEBU e33 Exiting" +"2019-07-20 02:39:52.275 UTC [gossip.comm] func1 -> DEBU e34 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.275 UTC [gossip.pull] HandleMessage -> DEBU e36 GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.275 UTC [gossip.gossip] handleMessage -> DEBU e37 Exiting" +"2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e38 Obtaining default signing identity" +"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151013 " +"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3a Sign: digest: 1BDA5E011B2CAD7F0981A1AD9ABD0D9AB25D2311F64929992AB2ABDE510006A5 " +"2019-07-20 02:39:52.306 UTC [msp] GetDefaultSigningIdentity -> DEBU e3b Obtaining default signing identity" +"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:52.306 UTC [msp.identity] Sign -> DEBU e3d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e3e Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.306 UTC [msp] DeserializeIdentity -> DEBU e3f Obtaining identity" +"2019-07-20 02:39:52.306 UTC [gossip.comm] Send -> DEBU e40 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.307 UTC [msp] DeserializeIdentity -> DEBU e41 Obtaining identity" +"2019-07-20 02:39:52.307 UTC [gossip.comm] Send -> DEBU e42 Entering, sending GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e44 Exiting" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e45 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e46 Exiting" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e47 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\3700\277\027\253\201\r\0215\253\256\365\332\345\235|\262\364\275X\002 3EQcS\361\024\311\354H\206R\005\030\354\233\210o\030\323\300\211{\215\216\r:g\273>_\241" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.307 UTC [gossip.comm] sendToEndpoint -> DEBU e48 Exiting" +"2019-07-20 02:39:52.308 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.308 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.309 UTC [gossip.gossip] handleMessage -> DEBU e4b Exiting" +"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e4d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4e Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e4f Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e50 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:52.309 UTC [msp.identity] Verify -> DEBU e51 Verify: sig = 00000000 30 44 02 20 03 d0 6b a7 fc 1b d2 38 6b 11 c8 13 |0D. ..k....8k...| +00000010 2c b4 57 a4 10 59 d3 da a5 30 c8 76 05 4a 82 eb |,.W..Y...0.v.J..| +00000020 d8 2b 80 77 02 20 57 45 64 35 11 d8 a8 70 21 96 |.+.w. WEd5...p!.| +00000030 ae 88 80 6c c9 16 bb 3a c7 71 1b c2 07 ce 60 80 |...l...:.q....`.| +00000040 40 d7 8a 33 0f 7f |@..3..|" +"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:52.309 UTC [gossip.discovery] isSentByMe -> DEBU e53 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 Exiting" +"2019-07-20 02:39:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU e55 Exiting" +"2019-07-20 02:39:52.310 UTC [gossip.comm] func1 -> DEBU e56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e57 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.310 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +"2019-07-20 02:39:52.310 UTC [gossip.discovery] handleMsgFromComm -> DEBU e59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 484 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e5a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5b Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +"2019-07-20 02:39:52.311 UTC [msp.identity] Verify -> DEBU e5c Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +"2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.311 UTC [gossip.discovery] isSentByMe -> DEBU e5e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU e5f Exiting" +"2019-07-20 02:39:52.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e60 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:52.311 UTC [msp] DeserializeIdentity -> DEBU e61 Obtaining identity" +"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e63 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.311 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e64 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e68 0xc00296ef30 gate 1563590392311707800 evaluation starts" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e69 0xc00296ef30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6a 0xc00296ef30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6b 0xc00296ef30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func2 -> DEBU e6c 0xc00296ef30 principal evaluation fails" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e6d 0xc00296ef30 gate 1563590392311707800 evaluation fails" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.311 UTC [policies] Evaluate -> DEBU e70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.311 UTC [cauthdsl] func1 -> DEBU e71 0xc00296f790 gate 1563590392311977800 evaluation starts" +"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e72 0xc00296f790 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e73 0xc00296f790 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e74 0xc00296f790 principal matched by identity 0" +"2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e75 Verify: digest = 00000000 d6 2f 09 2d ad 6d 35 46 ef 78 7f 01 4b 0a 64 8f |./.-.m5F.x..K.d.| +00000010 9f f9 82 5c 30 f3 ec 10 d1 1f ff e0 65 33 67 99 |...\0.......e3g.|" +"2019-07-20 02:39:52.312 UTC [msp.identity] Verify -> DEBU e76 Verify: sig = 00000000 30 43 02 20 70 69 80 5a d5 34 0d b5 26 14 03 10 |0C. pi.Z.4..&...| +00000010 fb 41 16 50 4f 1f b4 ef 20 e7 09 ec c4 47 0a d2 |.A.PO... ....G..| +00000020 25 f4 2f b3 02 1f 78 22 08 c9 cf fd 7b 28 d6 20 |%./...x"....{(. | +00000030 c6 5b 85 e1 a8 08 52 47 d6 21 31 13 1e e1 e1 8e |.[....RG.!1.....| +00000040 32 48 30 50 b8 |2H0P.|" +"2019-07-20 02:39:52.312 UTC [cauthdsl] func2 -> DEBU e77 0xc00296f790 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.312 UTC [cauthdsl] func1 -> DEBU e78 0xc00296f790 gate 1563590392311977800 evaluation succeeds" +"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e79 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.312 UTC [policies] Evaluate -> DEBU e7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes" +"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleAliveMessage -> DEBU e7e Exiting" +"2019-07-20 02:39:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU e7f Exiting" +"2019-07-20 02:39:52.313 UTC [gossip.comm] func1 -> DEBU e80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e81 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.gossip] handleMessage -> DEBU e82 Exiting" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU e83 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e84 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e85 Verify: digest = 00000000 c2 f5 97 4c 33 60 7a 9a ba 24 34 c7 47 2b f2 87 |...L3`z..$4.G+..| +00000010 5b eb d2 29 8c 5d a3 17 21 da c7 6e eb 26 41 c2 |[..).]..!..n.&A.|" +"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e86 Verify: sig = 00000000 30 44 02 20 28 3f 67 32 36 59 d6 73 0d 34 83 bb |0D. (?g26Y.s.4..| +00000010 fa c7 21 82 14 81 c9 3b 8e af a9 c0 1f 11 34 43 |..!....;......4C| +00000020 24 1e f6 50 02 20 0e 15 e6 8b 57 da ce 0f e5 19 |$..P. ....W.....| +00000030 6a 7c 6b 21 aa 6b 16 48 e4 ac 51 9b e3 7d 41 4a |j|k!.k.H..Q..}AJ| +00000040 dc a4 f9 81 1a 32 |.....2|" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" +"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e89 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8a Verify: digest = 00000000 1b da 5e 01 1b 2c ad 7f 09 81 a1 ad 9a bd 0d 9a |..^..,..........| +00000010 b2 5d 23 11 f6 49 29 99 2a b2 ab de 51 00 06 a5 |.]#..I).*...Q...|" +"2019-07-20 02:39:52.313 UTC [msp.identity] Verify -> DEBU e8b Verify: sig = 00000000 30 44 02 20 2e 21 54 36 89 0e 50 4e 92 c2 64 3e |0D. .!T6..PN..d>| +00000010 f8 30 bf 17 ab 81 0d 11 35 ab ae f5 da e5 9d 7c |.0......5......|| +00000020 b2 f4 bd 58 02 20 33 45 51 63 53 f1 14 c9 ec 48 |...X. 3EQcS....H| +00000030 86 52 05 18 ec 9b 88 6f 18 d3 c0 89 7b 8d 8e 0d |.R.....o....{...| +00000040 3a 67 bb 3e 5f a1 |:g.>_.|" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] isSentByMe -> DEBU e8d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.313 UTC [gossip.discovery] handleAliveMessage -> DEBU e8e Exiting" +"2019-07-20 02:39:52.313 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:52.314 UTC [msp] DeserializeIdentity -> DEBU e90 Obtaining identity" +"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e92 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.314 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e93 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e97 0xc002a63200 gate 1563590392314316100 evaluation starts" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e98 0xc002a63200 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e99 0xc002a63200 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9a 0xc002a63200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU e9b 0xc002a63200 principal evaluation fails" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU e9c 0xc002a63200 gate 1563590392314316100 evaluation fails" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea0 0xc002a63a40 gate 1563590392314593300 evaluation starts" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea1 0xc002a63a40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea2 0xc002a63a40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea3 0xc002a63a40 principal matched by identity 0" +"2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea4 Verify: digest = 00000000 9a 8a 36 66 3a 44 53 60 48 d2 8f ad eb c3 a1 1e |..6f:DS`H.......| +00000010 c7 a1 8f 57 db 61 9d c1 af fd a0 0d 36 8c 83 e9 |...W.a......6...|" +"2019-07-20 02:39:52.314 UTC [msp.identity] Verify -> DEBU ea5 Verify: sig = 00000000 30 44 02 20 1a f4 32 3b ae 0e 0d 34 bb 01 06 1d |0D. ..2;...4....| +00000010 b2 bc e1 31 95 d9 71 54 41 b7 28 6e 00 8b 67 f1 |...1..qTA.(n..g.| +00000020 9e bd 75 00 02 20 18 ae a5 a6 57 d9 38 c9 79 91 |..u.. ....W.8.y.| +00000030 32 79 72 74 be a9 8e df ad 40 29 41 e3 cc 4f a5 |2yrt.....@)A..O.| +00000040 bd 87 29 80 ca a0 |..)...|" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func2 -> DEBU ea6 0xc002a63a40 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.314 UTC [cauthdsl] func1 -> DEBU ea7 0xc002a63a40 gate 1563590392314593300 evaluation succeeds" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU ea9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eaa Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.314 UTC [policies] Evaluate -> DEBU eab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU eac Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.315 UTC [gossip.discovery] handleAliveMessage -> DEBU ead Exiting" +"2019-07-20 02:39:52.315 UTC [gossip.discovery] handleMsgFromComm -> DEBU eae Exiting" +"2019-07-20 02:39:52.391 UTC [gossip.comm] func1 -> DEBU eaf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.391 UTC [gossip.gossip] handleMessage -> DEBU eb1 Exiting" +"2019-07-20 02:39:52.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU eb2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.391 UTC [gossip.gossip] ValidateAliveMsg -> DEBU eb3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb4 Verify: digest = 00000000 0d 0e 79 e2 c7 a0 b2 f4 86 a8 d7 59 c5 dd ce 25 |..y........Y...%| +00000010 73 3c bf d7 a7 af d9 2e 52 5b de cf 43 6a eb 96 |s<......R[..Cj..|" +"2019-07-20 02:39:52.392 UTC [msp.identity] Verify -> DEBU eb5 Verify: sig = 00000000 30 44 02 20 74 3e 42 0d ca 82 d8 7f e9 f7 f7 36 |0D. t>B........6| +00000010 73 e8 71 45 b1 d6 b4 e2 95 f6 7c 70 64 be a3 2b |s.qE......|pd..+| +00000020 b8 64 3d 00 02 20 10 16 37 52 19 4a 6c 6c c5 d5 |.d=.. ..7R.Jll..| +00000030 f3 fc 28 f9 ed 79 8c d1 07 97 71 da 9f 41 e3 d2 |..(..y....q..A..| +00000040 8c 20 f4 cc 9f e5 |. ....|" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU eb6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] learnExistingMembers -> DEBU ebb Exiting" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleAliveMessage -> DEBU ebc Exiting" +"2019-07-20 02:39:52.392 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebd Exiting" +"2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebe Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.394 UTC [gossip.comm] func1 -> DEBU ebf Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.394 UTC [gossip.gossip] handleMessage -> DEBU ec0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.395 UTC [gossip.pull] HandleMessage -> DEBU ec1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.395 UTC [gossip.pull] SendDigest -> DEBU ec2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:52.395 UTC [gossip.gossip] handleMessage -> DEBU ec3 Exiting" +"2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.396 UTC [gossip.gossip] handleMessage -> DEBU ec5 Exiting" +"2019-07-20 02:39:52.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec6 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec8 Obtaining identity" +"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU ec9 Obtaining identity" +"2019-07-20 02:39:52.397 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" +"2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecb Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:52.398 UTC [msp] DeserializeIdentity -> DEBU ecc Obtaining identity" +"2019-07-20 02:39:52.398 UTC [gossip.comm] Send -> DEBU ecd Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ece Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ecf Exiting" +"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.398 UTC [gossip.comm] sendToEndpoint -> DEBU ed1 Exiting" +"2019-07-20 02:39:52.401 UTC [gossip.comm] func1 -> DEBU ed2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.401 UTC [gossip.gossip] handleMessage -> DEBU ed3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed4 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +"2019-07-20 02:39:52.401 UTC [msp.identity] Verify -> DEBU ed5 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +00000040 77 5f b8 b7 06 c1 |w_....|" +"2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:52.402 UTC [msp.identity] Verify -> DEBU ed7 Verify: sig = 00000000 30 44 02 20 50 d8 3b 18 9a 9e c0 8a aa f3 df 03 |0D. P.;.........| +00000010 c8 ce 20 d0 e5 43 96 93 79 64 50 6b 2d 04 29 d3 |.. ..C..ydPk-.).| +00000020 79 c1 8f c8 02 20 53 87 e9 bf 2f 79 d1 10 ea c0 |y.... S.../y....| +00000030 19 58 40 c3 d7 61 06 5a f9 77 66 b7 96 3d 57 c8 |.X@..a.Z.wf..=W.| +00000040 dd 94 b9 6b 70 ac |...kp.|" +"2019-07-20 02:39:52.403 UTC [gossip.discovery] handleAliveMessage -> DEBU ed8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU ed9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:52.403 UTC [gossip.discovery] learnExistingMembers -> DEBU eda updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:52.404 UTC [gossip.discovery] learnExistingMembers -> DEBU edd Exiting" +"2019-07-20 02:39:52.404 UTC [gossip.discovery] handleAliveMessage -> DEBU ede Exiting" +"2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU edf Exiting" +"2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee1 Obtaining identity" +"2019-07-20 02:39:52.405 UTC [msp] DeserializeIdentity -> DEBU ee2 Obtaining identity" +"2019-07-20 02:39:52.405 UTC [gossip.comm] Send -> DEBU ee3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.405 UTC [gossip.discovery] sendMemResponse -> DEBU ee4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +"2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.405 UTC [gossip.comm] sendToEndpoint -> DEBU ee6 Exiting" +"2019-07-20 02:39:52.406 UTC [gossip.gossip] handleMessage -> DEBU ee7 Exiting" +"2019-07-20 02:39:52.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:52.406 UTC [gossip.discovery] handleMsgFromComm -> DEBU ee9 Exiting" +"2019-07-20 02:39:52.575 UTC [gossip.comm] func1 -> DEBU eea Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU eeb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.575 UTC [gossip.pull] HandleMessage -> DEBU eec GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eed Obtaining identity" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eee Obtaining identity" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU eef Obtaining identity" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef0 Obtaining identity" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef1 Obtaining identity" +"2019-07-20 02:39:52.575 UTC [msp] DeserializeIdentity -> DEBU ef2 Obtaining identity" +"2019-07-20 02:39:52.575 UTC [gossip.pull] SendDigest -> DEBU ef3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:52.575 UTC [gossip.gossip] handleMessage -> DEBU ef4 Exiting" +"2019-07-20 02:39:52.578 UTC [gossip.comm] func1 -> DEBU ef5 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.580 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" +"2019-07-20 02:39:52.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef8 Got message: GossipMessage: tag:EMPTY mem_req:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ef9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:52.581 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" +"2019-07-20 02:39:52.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU efd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.583 UTC [policies] Evaluate -> DEBU eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.584 UTC [policies] Evaluate -> DEBU f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.584 UTC [cauthdsl] func1 -> DEBU f01 0xc002f5ce70 gate 1563590392584287700 evaluation starts" +"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f02 0xc002f5ce70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f03 0xc002f5ce70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.584 UTC [cauthdsl] func2 -> DEBU f04 0xc002f5ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.585 UTC [cauthdsl] func2 -> DEBU f05 0xc002f5ce70 principal evaluation fails" +"2019-07-20 02:39:52.585 UTC [cauthdsl] func1 -> DEBU f06 0xc002f5ce70 gate 1563590392584287700 evaluation fails" +"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.585 UTC [policies] Evaluate -> DEBU f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.586 UTC [cauthdsl] func1 -> DEBU f0a 0xc002f5d6b0 gate 1563590392586054100 evaluation starts" +"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0b 0xc002f5d6b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0c 0xc002f5d6b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.586 UTC [cauthdsl] func2 -> DEBU f0d 0xc002f5d6b0 principal matched by identity 0" +"2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0e Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| +00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" +"2019-07-20 02:39:52.587 UTC [msp.identity] Verify -> DEBU f0f Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| +00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| +00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| +00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| +00000040 6e d8 65 dc d7 b6 e9 |n.e....|" +"2019-07-20 02:39:52.588 UTC [cauthdsl] func2 -> DEBU f10 0xc002f5d6b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.588 UTC [cauthdsl] func1 -> DEBU f11 0xc002f5d6b0 gate 1563590392586054100 evaluation succeeds" +"2019-07-20 02:39:52.588 UTC [policies] Evaluate -> DEBU f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f14 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.589 UTC [policies] Evaluate -> DEBU f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.591 UTC [gossip.discovery] handleAliveMessage -> DEBU f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.591 UTC [gossip.discovery] learnExistingMembers -> DEBU f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f18 updating membership: timestamp: " +"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f19 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +"2019-07-20 02:39:52.592 UTC [gossip.discovery] learnExistingMembers -> DEBU f1b Exiting" +"2019-07-20 02:39:52.593 UTC [gossip.discovery] handleAliveMessage -> DEBU f1c Exiting" +"2019-07-20 02:39:52.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU f1d Exiting" +"2019-07-20 02:39:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU f1e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:39:52.594 UTC [msp] DeserializeIdentity -> DEBU f20 Obtaining identity" +"2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f21 Obtaining identity" +"2019-07-20 02:39:52.594 UTC [gossip.comm] func1 -> DEBU f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.595 UTC [msp] DeserializeIdentity -> DEBU f22 Obtaining identity" +"2019-07-20 02:39:52.597 UTC [gossip.comm] Send -> DEBU f24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.596 UTC [gossip.gossip] handleMessage -> DEBU f23 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.597 UTC [gossip.gossip] handleMessage -> DEBU f25 Exiting" +"2019-07-20 02:39:52.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU f26 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.597 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f27 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:52.597 UTC [msp] DeserializeIdentity -> DEBU f28 Obtaining identity" +"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.598 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f2b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f2f 0xc002ed18e0 gate 1563590392598463400 evaluation starts" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f30 0xc002ed18e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f31 0xc002ed18e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f32 0xc002ed18e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f33 0xc002ed18e0 principal evaluation fails" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f34 0xc002ed18e0 gate 1563590392598463400 evaluation fails" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.598 UTC [policies] Evaluate -> DEBU f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func1 -> DEBU f38 0xc002fe8120 gate 1563590392598798900 evaluation starts" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f39 0xc002fe8120 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3a 0xc002fe8120 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.598 UTC [cauthdsl] func2 -> DEBU f3b 0xc002fe8120 principal matched by identity 0" +"2019-07-20 02:39:52.598 UTC [msp.identity] Verify -> DEBU f3c Verify: digest = 00000000 79 30 40 ed d1 f8 6d 03 2e bd d1 77 c6 b7 c6 b2 |y0@...m....w....| +00000010 1b 08 d9 26 3d f2 fb bc 4c 2c 97 63 16 3b 0d 13 |...&=...L,.c.;..|" +"2019-07-20 02:39:52.599 UTC [msp.identity] Verify -> DEBU f3d Verify: sig = 00000000 30 45 02 21 00 a6 80 c1 dd 5d 72 85 0a a3 ec e4 |0E.!.....]r.....| +00000010 cb cb b6 ad 02 4e c7 8d c4 de 48 ee 3c 53 98 f3 |.....N....H. DEBU f3e 0xc002fe8120 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.599 UTC [cauthdsl] func1 -> DEBU f3f 0xc002fe8120 gate 1563590392598798900 evaluation succeeds" +"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f42 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.599 UTC [policies] Evaluate -> DEBU f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f44 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f45 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 20 but got ts: inc_num:1563590372570532900 seq_num:19 " +"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleAliveMessage -> DEBU f46 Exiting" +"2019-07-20 02:39:52.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU f47 Exiting" +"2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.599 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" +"2019-07-20 02:39:52.600 UTC [gossip.comm] func1 -> DEBU f4a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.600 UTC [gossip.gossip] handleMessage -> DEBU f4c Exiting" +"2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU f4e Exiting" +"2019-07-20 02:39:52.601 UTC [gossip.discovery] sendMemResponse -> DEBU f4f Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +"2019-07-20 02:39:52.601 UTC [gossip.comm] func1 -> DEBU f50 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f51 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.603 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" +"2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f53 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU f54 Exiting" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f55 Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f56 Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f57 Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f59 Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5a Obtaining identity" +"2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" +"2019-07-20 02:39:52.607 UTC [msp] DeserializeIdentity -> DEBU f5d Obtaining identity" +"2019-07-20 02:39:52.607 UTC [gossip.comm] Send -> DEBU f5e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f60 Exiting" +"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f61 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:52.607 UTC [gossip.comm] sendToEndpoint -> DEBU f62 Exiting" +"2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" +"2019-07-20 02:39:52.752 UTC [msp] DeserializeIdentity -> DEBU f64 Obtaining identity" +"2019-07-20 02:39:52.752 UTC [gossip.comm] Send -> DEBU f65 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.752 UTC [gossip.comm] sendToEndpoint -> DEBU f67 Exiting" +"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f69 Exiting" +"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.753 UTC [gossip.comm] sendToEndpoint -> DEBU f6b Exiting" +"2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.754 UTC [gossip.gossip] handleMessage -> DEBU f6e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f6f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f70 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f71 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:52.755 UTC [msp.identity] Verify -> DEBU f72 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:52.756 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f74 Obtaining identity" +"2019-07-20 02:39:52.754 UTC [gossip.comm] func1 -> DEBU f6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.756 UTC [msp] DeserializeIdentity -> DEBU f75 Obtaining identity" +"2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f76 Obtaining identity" +"2019-07-20 02:39:52.757 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f77 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.758 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f79 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.757 UTC [msp] DeserializeIdentity -> DEBU f78 Obtaining identity" +"2019-07-20 02:39:52.758 UTC [gossip.pull] Hello -> DEBU f7a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:52.758 UTC [msp] DeserializeIdentity -> DEBU f7b Obtaining identity" +"2019-07-20 02:39:52.759 UTC [msp] DeserializeIdentity -> DEBU f7c Obtaining identity" +"2019-07-20 02:39:52.759 UTC [gossip.comm] Send -> DEBU f7d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU f7f Exiting" +"2019-07-20 02:39:52.760 UTC [gossip.comm] func1 -> DEBU f80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.762 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f81 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.762 UTC [policies] Evaluate -> DEBU f82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.763 UTC [policies] Evaluate -> DEBU f84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.763 UTC [cauthdsl] func1 -> DEBU f85 0xc003081170 gate 1563590392763909000 evaluation starts" +"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f86 0xc003081170 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f87 0xc003081170 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f88 0xc003081170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.764 UTC [cauthdsl] func2 -> DEBU f89 0xc003081170 principal evaluation fails" +"2019-07-20 02:39:52.765 UTC [cauthdsl] func1 -> DEBU f8a 0xc003081170 gate 1563590392763909000 evaluation fails" +"2019-07-20 02:39:52.765 UTC [policies] Evaluate -> DEBU f8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.766 UTC [policies] Evaluate -> DEBU f8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.767 UTC [cauthdsl] func1 -> DEBU f8e 0xc0030819c0 gate 1563590392767199700 evaluation starts" +"2019-07-20 02:39:52.767 UTC [cauthdsl] func2 -> DEBU f8f 0xc0030819c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f90 0xc0030819c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.768 UTC [cauthdsl] func2 -> DEBU f91 0xc0030819c0 principal matched by identity 0" +"2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f92 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:52.769 UTC [msp.identity] Verify -> DEBU f93 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:52.770 UTC [cauthdsl] func2 -> DEBU f94 0xc0030819c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.770 UTC [cauthdsl] func1 -> DEBU f95 0xc0030819c0 gate 1563590392767199700 evaluation succeeds" +"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.770 UTC [policies] Evaluate -> DEBU f98 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.771 UTC [policies] Evaluate -> DEBU f99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9a Exiting" +"2019-07-20 02:39:52.771 UTC [gossip.gossip] handleMessage -> DEBU f9b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.771 UTC [msp] DeserializeIdentity -> DEBU f9c Obtaining identity" +"2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9d Obtaining identity" +"2019-07-20 02:39:52.772 UTC [msp] DeserializeIdentity -> DEBU f9e Obtaining identity" +"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.773 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.773 UTC [policies] Evaluate -> DEBU fa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.774 UTC [policies] Evaluate -> DEBU fa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.774 UTC [cauthdsl] func1 -> DEBU fa5 0xc0030c34d0 gate 1563590392774506200 evaluation starts" +"2019-07-20 02:39:52.774 UTC [cauthdsl] func2 -> DEBU fa6 0xc0030c34d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa7 0xc0030c34d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa8 0xc0030c34d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.775 UTC [cauthdsl] func2 -> DEBU fa9 0xc0030c34d0 principal evaluation fails" +"2019-07-20 02:39:52.775 UTC [cauthdsl] func1 -> DEBU faa 0xc0030c34d0 gate 1563590392774506200 evaluation fails" +"2019-07-20 02:39:52.775 UTC [policies] Evaluate -> DEBU fab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.776 UTC [policies] Evaluate -> DEBU fad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.777 UTC [cauthdsl] func1 -> DEBU fae 0xc0030c3d10 gate 1563590392776932500 evaluation starts" +"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU faf 0xc0030c3d10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb0 0xc0030c3d10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.777 UTC [cauthdsl] func2 -> DEBU fb1 0xc0030c3d10 principal matched by identity 0" +"2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb2 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:52.778 UTC [msp.identity] Verify -> DEBU fb3 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:52.778 UTC [cauthdsl] func2 -> DEBU fb4 0xc0030c3d10 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.778 UTC [cauthdsl] func1 -> DEBU fb5 0xc0030c3d10 gate 1563590392776932500 evaluation succeeds" +"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.779 UTC [policies] Evaluate -> DEBU fb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fba Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbb Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:52.780 UTC [msp.identity] Verify -> DEBU fbc Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:52.783 UTC [msp.identity] Verify -> DEBU fbd Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:52.783 UTC [msp] DeserializeIdentity -> DEBU fbe Obtaining identity" +"2019-07-20 02:39:52.784 UTC [msp] DeserializeIdentity -> DEBU fbf Obtaining identity" +"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fc0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fc2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.784 UTC [policies] Evaluate -> DEBU fc3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.785 UTC [policies] Evaluate -> DEBU fc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.785 UTC [cauthdsl] func1 -> DEBU fc6 0xc0030f2380 gate 1563590392785406500 evaluation starts" +"2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc7 0xc0030f2380 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.785 UTC [cauthdsl] func2 -> DEBU fc8 0xc0030f2380 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.786 UTC [cauthdsl] func2 -> DEBU fc9 0xc0030f2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.787 UTC [cauthdsl] func2 -> DEBU fca 0xc0030f2380 principal evaluation fails" +"2019-07-20 02:39:52.787 UTC [cauthdsl] func1 -> DEBU fcb 0xc0030f2380 gate 1563590392785406500 evaluation fails" +"2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.787 UTC [policies] Evaluate -> DEBU fcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.788 UTC [policies] Evaluate -> DEBU fce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.788 UTC [cauthdsl] func1 -> DEBU fcf 0xc0030f2bc0 gate 1563590392788342800 evaluation starts" +"2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd0 0xc0030f2bc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.788 UTC [cauthdsl] func2 -> DEBU fd1 0xc0030f2bc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd2 0xc0030f2bc0 principal matched by identity 0" +"2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:52.789 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:52.789 UTC [cauthdsl] func2 -> DEBU fd5 0xc0030f2bc0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.790 UTC [cauthdsl] func1 -> DEBU fd6 0xc0030f2bc0 gate 1563590392788342800 evaluation succeeds" +"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fd9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.790 UTC [policies] Evaluate -> DEBU fda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdb Exiting" +"2019-07-20 02:39:52.791 UTC [gossip.gossip] handleMessage -> DEBU fdc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fdd Obtaining identity" +"2019-07-20 02:39:52.791 UTC [msp] DeserializeIdentity -> DEBU fde Obtaining identity" +"2019-07-20 02:39:52.792 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" +"2019-07-20 02:39:52.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.797 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.798 UTC [cauthdsl] func1 -> DEBU fe6 0xc003116730 gate 1563590392797928400 evaluation starts" +"2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe7 0xc003116730 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.798 UTC [cauthdsl] func2 -> DEBU fe8 0xc003116730 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fe9 0xc003116730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.799 UTC [cauthdsl] func2 -> DEBU fea 0xc003116730 principal evaluation fails" +"2019-07-20 02:39:52.799 UTC [cauthdsl] func1 -> DEBU feb 0xc003116730 gate 1563590392797928400 evaluation fails" +"2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.799 UTC [policies] Evaluate -> DEBU fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.800 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.800 UTC [cauthdsl] func1 -> DEBU fef 0xc003117090 gate 1563590392800302800 evaluation starts" +"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff0 0xc003117090 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff1 0xc003117090 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.800 UTC [cauthdsl] func2 -> DEBU ff2 0xc003117090 principal matched by identity 0" +"2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:52.801 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:52.801 UTC [cauthdsl] func2 -> DEBU ff5 0xc003117090 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.801 UTC [cauthdsl] func1 -> DEBU ff6 0xc003117090 gate 1563590392800302800 evaluation succeeds" +"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.802 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:52.803 UTC [msp.identity] Verify -> DEBU ffc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:52.803 UTC [msp] DeserializeIdentity -> DEBU ffd Obtaining identity" +"2019-07-20 02:39:52.804 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1000 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1001 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1002 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1003 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:52.805 UTC [policies] Evaluate -> DEBU 1004 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:52.805 UTC [cauthdsl] func1 -> DEBU 1005 0xc003125150 gate 1563590392805720700 evaluation starts" +"2019-07-20 02:39:52.805 UTC [cauthdsl] func2 -> DEBU 1006 0xc003125150 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1007 0xc003125150 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1008 0xc003125150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:52.806 UTC [cauthdsl] func2 -> DEBU 1009 0xc003125150 principal evaluation fails" +"2019-07-20 02:39:52.807 UTC [cauthdsl] func1 -> DEBU 100a 0xc003125150 gate 1563590392805720700 evaluation fails" +"2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.807 UTC [policies] Evaluate -> DEBU 100c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:52.808 UTC [policies] Evaluate -> DEBU 100d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:52.808 UTC [cauthdsl] func1 -> DEBU 100e 0xc003125b00 gate 1563590392808304900 evaluation starts" +"2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 100f 0xc003125b00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:52.808 UTC [cauthdsl] func2 -> DEBU 1010 0xc003125b00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:52.809 UTC [cauthdsl] func2 -> DEBU 1011 0xc003125b00 principal matched by identity 0" +"2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1012 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:52.809 UTC [msp.identity] Verify -> DEBU 1013 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:52.810 UTC [cauthdsl] func2 -> DEBU 1014 0xc003125b00 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:52.810 UTC [cauthdsl] func1 -> DEBU 1015 0xc003125b00 gate 1563590392808304900 evaluation succeeds" +"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1016 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1017 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1018 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:52.810 UTC [policies] Evaluate -> DEBU 1019 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101a Exiting" +"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.810 UTC [gossip.pull] HandleMessage -> DEBU 101c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.810 UTC [gossip.gossip] handleMessage -> DEBU 101d Exiting" +"2019-07-20 02:39:52.912 UTC [gossip.comm] func1 -> DEBU 101e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 101f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1020 Obtaining identity" +"2019-07-20 02:39:52.912 UTC [msp] DeserializeIdentity -> DEBU 1021 Obtaining identity" +"2019-07-20 02:39:52.912 UTC [gossip.gossip] handleMessage -> DEBU 1022 Exiting" +"2019-07-20 02:39:52.928 UTC [gossip.comm] func1 -> DEBU 1023 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1024 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.928 UTC [gossip.pull] HandleMessage -> DEBU 1025 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.928 UTC [gossip.pull] SendDigest -> DEBU 1026 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:52.928 UTC [gossip.gossip] handleMessage -> DEBU 1027 Exiting" +"2019-07-20 02:39:52.954 UTC [gossip.comm] func1 -> DEBU 1028 Got message: GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.954 UTC [gossip.gossip] handleMessage -> DEBU 1029 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.955 UTC [gossip.pull] HandleMessage -> DEBU 102a GossipMessage: tag:EMPTY data_req:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:39:52.955 UTC [msp] DeserializeIdentity -> DEBU 102b Obtaining identity" +"2019-07-20 02:39:52.955 UTC [gossip.gossip] handleMessage -> DEBU 102c Exiting" +"2019-07-20 02:39:52.956 UTC [gossip.pull] SendRes -> DEBU 102d Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:39:53.077 UTC [gossip.comm] func1 -> DEBU 102e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:53.077 UTC [gossip.gossip] handleMessage -> DEBU 102f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:53.077 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +"2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" +"2019-07-20 02:39:53.078 UTC [msp] DeserializeIdentity -> DEBU 1032 Obtaining identity" +"2019-07-20 02:39:53.078 UTC [gossip.gossip] handleMessage -> DEBU 1033 Exiting" +"2019-07-20 02:39:53.216 UTC [gossip.comm] func1 -> DEBU 1034 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:53.217 UTC [gossip.gossip] handleMessage -> DEBU 1035 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1036 Obtaining identity" +"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1037 Obtaining identity" +"2019-07-20 02:39:53.218 UTC [msp] DeserializeIdentity -> DEBU 1038 Obtaining identity" +"2019-07-20 02:39:53.219 UTC [gossip.gossip] handleMessage -> DEBU 1039 Exiting" +"2019-07-20 02:39:55.948 UTC [gossip.comm] func1 -> DEBU 103a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.949 UTC [gossip.gossip] handleMessage -> DEBU 103c Exiting" +"2019-07-20 02:39:55.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 103d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 103e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:55.950 UTC [msp] DeserializeIdentity -> DEBU 103f Obtaining identity" +"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1041 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:55.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1042 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:55.951 UTC [policies] Evaluate -> DEBU 1043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:55.952 UTC [policies] Evaluate -> DEBU 1045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:55.952 UTC [cauthdsl] func1 -> DEBU 1046 0xc0032a0750 gate 1563590395952479500 evaluation starts" +"2019-07-20 02:39:55.952 UTC [cauthdsl] func2 -> DEBU 1047 0xc0032a0750 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1048 0xc0032a0750 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 1049 0xc0032a0750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:55.953 UTC [cauthdsl] func2 -> DEBU 104a 0xc0032a0750 principal evaluation fails" +"2019-07-20 02:39:55.953 UTC [cauthdsl] func1 -> DEBU 104b 0xc0032a0750 gate 1563590395952479500 evaluation fails" +"2019-07-20 02:39:55.953 UTC [policies] Evaluate -> DEBU 104c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:55.954 UTC [policies] Evaluate -> DEBU 104e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:55.955 UTC [cauthdsl] func1 -> DEBU 1050 0xc0032a0f90 gate 1563590395955130100 evaluation starts" +"2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1051 0xc0032a0f90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:55.954 UTC [gossip.comm] func1 -> DEBU 104f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.955 UTC [gossip.gossip] handleMessage -> DEBU 1052 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.956 UTC [gossip.pull] HandleMessage -> DEBU 1053 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1054 Obtaining identity" +"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1055 Obtaining identity" +"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1056 Obtaining identity" +"2019-07-20 02:39:55.955 UTC [cauthdsl] func2 -> DEBU 1057 0xc0032a0f90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:55.957 UTC [cauthdsl] func2 -> DEBU 1059 0xc0032a0f90 principal matched by identity 0" +"2019-07-20 02:39:55.956 UTC [msp] DeserializeIdentity -> DEBU 1058 Obtaining identity" +"2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105a Obtaining identity" +"2019-07-20 02:39:55.957 UTC [msp] DeserializeIdentity -> DEBU 105b Obtaining identity" +"2019-07-20 02:39:55.957 UTC [gossip.pull] SendDigest -> DEBU 105c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:39:55.957 UTC [gossip.gossip] handleMessage -> DEBU 105d Exiting" +"2019-07-20 02:39:55.957 UTC [msp.identity] Verify -> DEBU 105e Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| +00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" +"2019-07-20 02:39:55.958 UTC [msp.identity] Verify -> DEBU 105f Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| +00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 1060 0xc0032a0f90 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:55.960 UTC [cauthdsl] func1 -> DEBU 1061 0xc0032a0f90 gate 1563590395955130100 evaluation succeeds" +"2019-07-20 02:39:55.960 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1064 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:55.961 UTC [policies] Evaluate -> DEBU 1065 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:55.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 1066 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:55.962 UTC [gossip.discovery] learnExistingMembers -> DEBU 1067 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1068 updating membership: timestamp: " +"2019-07-20 02:39:55.963 UTC [gossip.discovery] learnExistingMembers -> DEBU 1069 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:55.964 UTC [gossip.discovery] learnExistingMembers -> DEBU 106b Exiting" +"2019-07-20 02:39:55.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 106c Exiting" +"2019-07-20 02:39:55.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106d Exiting" +"2019-07-20 02:39:55.965 UTC [gossip.discovery] sendMemResponse -> DEBU 106e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 106f Obtaining identity" +"2019-07-20 02:39:55.966 UTC [msp] DeserializeIdentity -> DEBU 1070 Obtaining identity" +"2019-07-20 02:39:55.967 UTC [msp] DeserializeIdentity -> DEBU 1071 Obtaining identity" +"2019-07-20 02:39:55.967 UTC [gossip.comm] Send -> DEBU 1072 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:55.967 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:55.968 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Exiting" +"2019-07-20 02:39:55.967 UTC [gossip.discovery] sendMemResponse -> DEBU 1075 Exiting, replying with alive:\215i\211\014\330\217\367ZP\251\315`\315\006\273c\356\370@\030b\331k\217\337\242\013\220\246K\002 y>\310t\342B\3452{\312\024\332#\235\223(\376\351\322\016\361\276\025Gan\330e\334\327\266\351" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\027" signature:"0D\002 ZJ~e\3203\033\276\206\232\357\276\230=\237*\333ue^\306U\310\324\t/\365p\233\035Y\327\002 \033V\300\233\305\215\360\033\244<\007x:\303\371z\226\246\216\016]\\\274f\005\342w_\270\267\006\301" > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +"2019-07-20 02:39:56.272 UTC [gossip.pull] Hello -> DEBU 1076 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1077 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 1078 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 1079 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.273 UTC [gossip.pull] Hello -> DEBU 107a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:39:56.273 UTC [gossip.comm] Send -> DEBU 107b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.273 UTC [gossip.comm] sendToEndpoint -> DEBU 107d Exiting" +"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 107f Exiting" +"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1080 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.274 UTC [gossip.comm] sendToEndpoint -> DEBU 1081 Exiting" +"2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1082 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1083 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1084 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" +"2019-07-20 02:39:56.275 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.275 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.275 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.276 UTC [gossip.gossip] handleMessage -> DEBU 1089 Exiting" +"2019-07-20 02:39:56.277 UTC [gossip.comm] func1 -> DEBU 108a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.277 UTC [gossip.pull] HandleMessage -> DEBU 108c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.277 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" +"2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 108e Obtaining default signing identity" +"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 108f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151014 " +"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1090 Sign: digest: C7D72175B4EA24BE781C5667FDD4D10C6AE41025931EB8B9790DBC66471A6E16 " +"2019-07-20 02:39:56.307 UTC [msp] GetDefaultSigningIdentity -> DEBU 1091 Obtaining default signing identity" +"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1092 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:56.307 UTC [msp.identity] Sign -> DEBU 1093 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1094 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1095 Obtaining identity" +"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1096 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.308 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +"2019-07-20 02:39:56.308 UTC [gossip.comm] Send -> DEBU 1098 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.308 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" +"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Exiting" +"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.309 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" +"2019-07-20 02:39:56.311 UTC [gossip.comm] func1 -> DEBU 109f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.311 UTC [gossip.gossip] handleMessage -> DEBU 10a1 Exiting" +"2019-07-20 02:39:56.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10a3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a4 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a5 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +00000040 f9 ac 47 d7 14 7f 16 |..G....|" +"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:39:56.312 UTC [msp.identity] Verify -> DEBU 10a7 Verify: sig = 00000000 30 44 02 20 54 7a a3 42 c9 28 88 5a 9e dc 61 40 |0D. Tz.B.(.Z..a@| +00000010 15 60 a5 f4 e5 c7 f4 d7 37 be 0d 99 56 96 14 5b |.`......7...V..[| +00000020 cf f2 3f e9 02 20 53 9a 33 29 47 4f cb 41 b1 ea |..?.. S.3)GO.A..| +00000030 6f ea 5e d7 b6 24 9c 62 ac b3 e6 2c ec 98 74 4b |o.^..$.b...,..tK| +00000040 87 ad b6 4e 77 48 |...NwH|" +"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:56.313 UTC [gossip.discovery] isSentByMe -> DEBU 10a9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 10aa Exiting" +"2019-07-20 02:39:56.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10ab Exiting" +"2019-07-20 02:39:56.314 UTC [gossip.comm] func1 -> DEBU 10ac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ad Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.314 UTC [gossip.gossip] handleMessage -> DEBU 10ae Exiting" +"2019-07-20 02:39:56.314 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b1 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +"2019-07-20 02:39:56.315 UTC [msp.identity] Verify -> DEBU 10b2 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +00000040 77 5f b8 b7 06 c1 |w_....|" +"2019-07-20 02:39:56.316 UTC [gossip.comm] func1 -> DEBU 10b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.316 UTC [gossip.gossip] handleMessage -> DEBU 10b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 10b6 Exiting" +"2019-07-20 02:39:56.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b7 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b8 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +"2019-07-20 02:39:56.317 UTC [msp.identity] Verify -> DEBU 10b9 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +00000040 f9 ac 47 d7 14 7f 16 |..G....|" +"2019-07-20 02:39:56.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 10ba Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.318 UTC [gossip.discovery] isSentByMe -> DEBU 10bb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 10bc Exiting" +"2019-07-20 02:39:56.318 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10bd Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:56.318 UTC [msp] DeserializeIdentity -> DEBU 10be Obtaining identity" +"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10c1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.318 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10c5 0xc0033ffb60 gate 1563590396319207900 evaluation starts" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0033ffb60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c7 0xc0033ffb60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c8 0xc0033ffb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0033ffb60 principal evaluation fails" +"2019-07-20 02:39:56.319 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0033ffb60 gate 1563590396319207900 evaluation fails" +"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.319 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.320 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.320 UTC [cauthdsl] func1 -> DEBU 10ce 0xc0034a23a0 gate 1563590396320080200 evaluation starts" +"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10cf 0xc0034a23a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0034a23a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.320 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0034a23a0 principal matched by identity 0" +"2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d2 Verify: digest = 00000000 32 cd 79 69 26 bd f0 b6 fa 3d 9b 05 4c 4c 9f 63 |2.yi&....=..LL.c| +00000010 24 41 4d c3 5c 68 56 af ce 9f 1b c2 8a 17 de 69 |$AM.\hV........i|" +"2019-07-20 02:39:56.320 UTC [msp.identity] Verify -> DEBU 10d3 Verify: sig = 00000000 30 44 02 20 51 04 be fc db d6 de c6 b6 ae 09 47 |0D. Q..........G| +00000010 f4 3c 44 29 af 53 0d 4b 18 41 dd 7f 84 88 de 6d |. DEBU 10d4 0xc0034a23a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.321 UTC [cauthdsl] func1 -> DEBU 10d5 0xc0034a23a0 gate 1563590396320080200 evaluation succeeds" +"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.321 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 10db Exiting" +"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dc Exiting" +"2019-07-20 02:39:56.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.321 UTC [gossip.gossip] handleMessage -> DEBU 10de Exiting" +"2019-07-20 02:39:56.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10df Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e0 Verify: digest = 00000000 c7 d7 21 75 b4 ea 24 be 78 1c 56 67 fd d4 d1 0c |..!u..$.x.Vg....| +00000010 6a e4 10 25 93 1e b8 b9 79 0d bc 66 47 1a 6e 16 |j..%....y..fG.n.|" +"2019-07-20 02:39:56.322 UTC [msp.identity] Verify -> DEBU 10e1 Verify: sig = 00000000 30 45 02 21 00 c4 1f b6 e9 4e 57 5f 8a 64 c3 10 |0E.!.....NW_.d..| +00000010 28 84 fb 65 8d bd 31 ae 31 d3 88 95 a2 e4 d4 d2 |(..e..1.1.......| +00000020 d3 9c 23 e6 6c 02 20 75 27 e3 78 2a 63 b9 2b 57 |..#.l. u'.x*c.+W| +00000030 0f 4d 00 4e 0b d6 25 ba ed c1 dd 27 bc 26 49 ab |.M.N..%....'.&I.| +00000040 f9 ac 47 d7 14 7f 16 |..G....|" +"2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.322 UTC [gossip.discovery] isSentByMe -> DEBU 10e3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 10e4 Exiting" +"2019-07-20 02:39:56.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10e5 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:56.323 UTC [msp] DeserializeIdentity -> DEBU 10e6 Obtaining identity" +"2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.326 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.327 UTC [policies] Evaluate -> DEBU 10ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10ed 0xc003510a90 gate 1563590396327540900 evaluation starts" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ee 0xc003510a90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10ef 0xc003510a90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f0 0xc003510a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func2 -> DEBU 10f1 0xc003510a90 principal evaluation fails" +"2019-07-20 02:39:56.327 UTC [cauthdsl] func1 -> DEBU 10f2 0xc003510a90 gate 1563590396327540900 evaluation fails" +"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.328 UTC [policies] Evaluate -> DEBU 10f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.328 UTC [cauthdsl] func1 -> DEBU 10f6 0xc0035112d0 gate 1563590396328506100 evaluation starts" +"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f7 0xc0035112d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f8 0xc0035112d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.328 UTC [cauthdsl] func2 -> DEBU 10f9 0xc0035112d0 principal matched by identity 0" +"2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 4a 76 46 0b 4f 2a e4 ff 21 78 d0 85 80 ae eb 74 |JvF.O*..!x.....t| +00000010 5d 30 24 cc c9 9f 4f ca b6 de ec f2 1f a5 ec 97 |]0$...O.........|" +"2019-07-20 02:39:56.329 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 eb 3e 8d 69 89 0c d8 8f f7 5a 50 |0E.!..>.i.....ZP| +00000010 a9 cd 60 cd 06 bb 63 ee f8 40 18 62 d9 6b 8f df |..`...c..@.b.k..| +00000020 a2 0b 90 a6 4b 02 20 79 3e c8 74 e2 42 e5 32 7b |....K. y>.t.B.2{| +00000030 ca 14 da 23 9d 93 28 fe e9 d2 0e f1 be 15 47 61 |...#..(.......Ga| +00000040 6e d8 65 dc d7 b6 e9 |n.e....|" +"2019-07-20 02:39:56.329 UTC [cauthdsl] func2 -> DEBU 10fc 0xc0035112d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.329 UTC [cauthdsl] func1 -> DEBU 10fd 0xc0035112d0 gate 1563590396328506100 evaluation succeeds" +"2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.329 UTC [policies] Evaluate -> DEBU 10ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1100 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.330 UTC [policies] Evaluate -> DEBU 1101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1102 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.330 UTC [gossip.discovery] handleAliveMessage -> DEBU 1103 Exiting" +"2019-07-20 02:39:56.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1104 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1105 Verify: digest = 00000000 6b 52 0a 74 5b 65 35 11 2f d9 70 f2 c6 55 63 34 |kR.t[e5./.p..Uc4| +00000010 83 df 0b 2f a7 2b ed 76 60 40 35 ee 40 ad c1 8f |.../.+.v`@5.@...|" +"2019-07-20 02:39:56.330 UTC [msp.identity] Verify -> DEBU 1106 Verify: sig = 00000000 30 44 02 20 5a 4a 7e 65 d0 33 1b be 86 9a ef be |0D. ZJ~e.3......| +00000010 98 3d 9f 2a db 75 65 5e c6 55 c8 d4 09 2f f5 70 |.=.*.ue^.U.../.p| +00000020 9b 1d 59 d7 02 20 1b 56 c0 9b c5 8d f0 1b a4 3c |..Y.. .V.......<| +00000030 07 78 3a c3 f9 7a 96 a6 8e 0e 5d 5c bc 66 05 e2 |.x:..z....]\.f..| +00000040 77 5f b8 b7 06 c1 |w_....|" +"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1107 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleAliveMessage -> DEBU 1108 Exiting" +"2019-07-20 02:39:56.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1109 Exiting" +"2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.396 UTC [gossip.comm] func1 -> DEBU 110b Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.396 UTC [gossip.gossip] handleMessage -> DEBU 110c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.396 UTC [gossip.pull] HandleMessage -> DEBU 110d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.397 UTC [gossip.pull] SendDigest -> DEBU 110e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 110f Exiting" +"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1110 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.397 UTC [gossip.gossip] handleMessage -> DEBU 1111 Exiting" +"2019-07-20 02:39:56.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1112 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1113 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1114 Verify: digest = 00000000 30 98 1f 5f 64 29 89 30 5c 59 fd 02 51 76 6f 11 |0.._d).0\Y..Qvo.| +00000010 51 b3 b7 50 f2 ad 2c b0 2d 4c 83 92 45 0e be 49 |Q..P..,.-L..E..I|" +"2019-07-20 02:39:56.398 UTC [msp.identity] Verify -> DEBU 1115 Verify: sig = 00000000 30 44 02 20 56 d8 b5 99 4c 20 22 6a d7 3a 6b 8d |0D. V...L "j.:k.| +00000010 d4 16 cb 44 f1 6f 70 bc 74 2e dc 24 7a ee 73 4c |...D.op.t..$z.sL| +00000020 55 87 2c d9 02 20 0e ca 61 aa 61 22 3a d5 77 02 |U.,.. ..a.a":.w.| +00000030 f3 0d 26 7e 64 dd db 40 e9 ec 5d 04 e7 30 a6 db |..&~d..@..]..0..| +00000040 61 aa b2 d8 91 4a |a....J|" +"2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1116 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:39:56.399 UTC [msp.identity] Verify -> DEBU 1117 Verify: sig = 00000000 30 44 02 20 7d 62 a6 cc d7 5f 52 a4 65 41 48 3f |0D. }b..._R.eAH?| +00000010 57 5d 86 7f aa bb ab cc 62 14 9b 0e ef 34 6a a9 |W]......b....4j.| +00000020 4c f0 a6 84 02 20 75 7e 8e 55 ea d1 2d d2 af a3 |L.... u~.U..-...| +00000030 b1 14 f8 02 d7 b5 06 45 61 92 c4 32 7d dc d3 35 |.......Ea..2}..5| +00000040 f1 e6 79 84 c9 f7 |..y...|" +"2019-07-20 02:39:56.399 UTC [gossip.discovery] handleAliveMessage -> DEBU 1118 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 1119 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:56.399 UTC [gossip.discovery] learnExistingMembers -> DEBU 111c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:56.400 UTC [gossip.discovery] learnExistingMembers -> DEBU 111d Exiting" +"2019-07-20 02:39:56.400 UTC [gossip.discovery] handleAliveMessage -> DEBU 111e Exiting" +"2019-07-20 02:39:56.400 UTC [gossip.discovery] handleMsgFromComm -> DEBU 111f Exiting" +"2019-07-20 02:39:56.400 UTC [gossip.discovery] sendMemResponse -> DEBU 1120 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +"2019-07-20 02:39:56.400 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +"2019-07-20 02:39:56.401 UTC [gossip.comm] Send -> DEBU 1123 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.401 UTC [gossip.discovery] sendMemResponse -> DEBU 1124 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" secret_envelope: > alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +"2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1125 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.401 UTC [gossip.comm] sendToEndpoint -> DEBU 1126 Exiting" +"2019-07-20 02:39:56.575 UTC [gossip.comm] func1 -> DEBU 1127 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.575 UTC [gossip.gossip] handleMessage -> DEBU 1128 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.577 UTC [gossip.pull] HandleMessage -> DEBU 1129 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112b Obtaining identity" +"2019-07-20 02:39:56.577 UTC [msp] DeserializeIdentity -> DEBU 112c Obtaining identity" +"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112d Obtaining identity" +"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112e Obtaining identity" +"2019-07-20 02:39:56.578 UTC [msp] DeserializeIdentity -> DEBU 112f Obtaining identity" +"2019-07-20 02:39:56.578 UTC [gossip.pull] SendDigest -> DEBU 1130 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:39:56.579 UTC [gossip.gossip] handleMessage -> DEBU 1131 Exiting" +"2019-07-20 02:39:56.581 UTC [gossip.comm] func1 -> DEBU 1132 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1133 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.582 UTC [gossip.gossip] handleMessage -> DEBU 1134 Exiting" +"2019-07-20 02:39:56.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1135 Got message: GossipMessage: tag:EMPTY mem_req:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.582 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1136 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:56.582 UTC [msp] DeserializeIdentity -> DEBU 1137 Obtaining identity" +"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1138 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1139 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 113a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.583 UTC [policies] Evaluate -> DEBU 113d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.583 UTC [cauthdsl] func1 -> DEBU 113e 0xc003647a40 gate 1563590396583810200 evaluation starts" +"2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 113f 0xc003647a40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.583 UTC [cauthdsl] func2 -> DEBU 1140 0xc003647a40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1141 0xc003647a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1142 0xc003647a40 principal evaluation fails" +"2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1143 0xc003647a40 gate 1563590396583810200 evaluation fails" +"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1144 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.584 UTC [policies] Evaluate -> DEBU 1146 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.584 UTC [cauthdsl] func1 -> DEBU 1147 0xc0036522b0 gate 1563590396584797100 evaluation starts" +"2019-07-20 02:39:56.584 UTC [cauthdsl] func2 -> DEBU 1148 0xc0036522b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 1149 0xc0036522b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114a 0xc0036522b0 principal matched by identity 0" +"2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114b Verify: digest = 00000000 b2 1f d3 c5 78 4e f0 67 c6 95 96 e8 61 8f 1e 7b |....xN.g....a..{| +00000010 8a b5 ce 53 08 01 b1 41 bd 4c 76 92 c5 c2 96 88 |...S...A.Lv.....|" +"2019-07-20 02:39:56.585 UTC [msp.identity] Verify -> DEBU 114c Verify: sig = 00000000 30 45 02 21 00 d2 17 c8 86 38 cd 80 57 2c 8d 1b |0E.!.....8..W,..| +00000010 b2 32 cc 27 04 ec 32 ce 67 fc b4 e6 fd aa 08 42 |.2.'..2.g......B| +00000020 ce 00 ff ff fe 02 20 35 74 64 e9 dc 2c a7 a5 2e |...... 5td..,...| +00000030 f2 23 3e 5f 6b 39 70 2c 9c 79 bb b7 ee 0a 8a 22 |.#>_k9p,.y....."| +00000040 c2 f7 6b 80 ac 07 af |..k....|" +"2019-07-20 02:39:56.585 UTC [cauthdsl] func2 -> DEBU 114d 0xc0036522b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.585 UTC [cauthdsl] func1 -> DEBU 114e 0xc0036522b0 gate 1563590396584797100 evaluation succeeds" +"2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 114f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.585 UTC [policies] Evaluate -> DEBU 1150 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1151 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.586 UTC [policies] Evaluate -> DEBU 1152 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1153 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1154 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1155 updating membership: timestamp: " +"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1156 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1157 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:56.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 1158 Exiting" +"2019-07-20 02:39:56.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 1159 Exiting" +"2019-07-20 02:39:56.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 115a Exiting" +"2019-07-20 02:39:56.587 UTC [gossip.discovery] sendMemResponse -> DEBU 115b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:39:56.587 UTC [msp] DeserializeIdentity -> DEBU 115c Obtaining identity" +"2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115d Obtaining identity" +"2019-07-20 02:39:56.588 UTC [msp] DeserializeIdentity -> DEBU 115e Obtaining identity" +"2019-07-20 02:39:56.588 UTC [gossip.comm] Send -> DEBU 115f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.588 UTC [gossip.discovery] sendMemResponse -> DEBU 1160 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\030" signature:"0D\002 V\330\265\231L \"j\327:k\215\324\026\313D\361op\274t.\334$z\356sLU\207,\331\002 \016\312a\252a\":\325w\002\363\r&~d\335\333@\351\354]\004\3470\246\333a\252\262\330\221J" > alive:_k9p,\234y\273\267\356\n\212\"\302\367k\200\254\007\257" > alive: alive:\002 K\326p\345# \236Z\353\237\324$\330\275>L\377-c\017\372W\337\241r\256\325\330\005k@\257" > " +"2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1161 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.589 UTC [gossip.comm] sendToEndpoint -> DEBU 1162 Exiting" +"2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1163 Obtaining identity" +"2019-07-20 02:39:56.752 UTC [msp] DeserializeIdentity -> DEBU 1164 Obtaining identity" +"2019-07-20 02:39:56.752 UTC [gossip.comm] Send -> DEBU 1165 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1166 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.752 UTC [gossip.comm] sendToEndpoint -> DEBU 1167 Exiting" +"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1168 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 1169 Exiting" +"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.753 UTC [gossip.comm] sendToEndpoint -> DEBU 116b Exiting" +"2019-07-20 02:39:56.754 UTC [gossip.comm] func1 -> DEBU 116c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.754 UTC [gossip.gossip] handleMessage -> DEBU 116d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116e Obtaining identity" +"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 116f Obtaining identity" +"2019-07-20 02:39:56.754 UTC [msp] DeserializeIdentity -> DEBU 1170 Obtaining identity" +"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1171 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1172 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1174 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1175 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.755 UTC [policies] Evaluate -> DEBU 1176 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.755 UTC [cauthdsl] func1 -> DEBU 1177 0xc0036866d0 gate 1563590396755881700 evaluation starts" +"2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1178 0xc0036866d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.756 UTC [cauthdsl] func2 -> DEBU 1179 0xc0036866d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117a 0xc0036866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 117b 0xc0036866d0 principal evaluation fails" +"2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 117c 0xc0036866d0 gate 1563590396755881700 evaluation fails" +"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.757 UTC [policies] Evaluate -> DEBU 117f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.757 UTC [cauthdsl] func1 -> DEBU 1180 0xc003687030 gate 1563590396757820400 evaluation starts" +"2019-07-20 02:39:56.757 UTC [cauthdsl] func2 -> DEBU 1181 0xc003687030 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1182 0xc003687030 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.758 UTC [cauthdsl] func2 -> DEBU 1183 0xc003687030 principal matched by identity 0" +"2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1184 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:56.758 UTC [gossip.comm] func1 -> DEBU 1185 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.759 UTC [gossip.comm] func1 -> DEBU 1186 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.758 UTC [msp.identity] Verify -> DEBU 1187 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:56.761 UTC [cauthdsl] func2 -> DEBU 1188 0xc003687030 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" +"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" +"2019-07-20 02:39:56.761 UTC [gossip.pull] Hello -> DEBU 118b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:39:56.761 UTC [msp] DeserializeIdentity -> DEBU 118c Obtaining identity" +"2019-07-20 02:39:56.762 UTC [msp] DeserializeIdentity -> DEBU 118d Obtaining identity" +"2019-07-20 02:39:56.762 UTC [gossip.comm] Send -> DEBU 118e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:56.762 UTC [gossip.comm] sendToEndpoint -> DEBU 118f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1190 Exiting" +"2019-07-20 02:39:56.766 UTC [gossip.comm] func1 -> DEBU 1191 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.761 UTC [cauthdsl] func1 -> DEBU 1192 0xc003687030 gate 1563590396757820400 evaluation succeeds" +"2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.768 UTC [policies] Evaluate -> DEBU 1194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1195 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.769 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1197 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:56.769 UTC [msp.identity] Verify -> DEBU 1198 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:56.770 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119b Obtaining identity" +"2019-07-20 02:39:56.770 UTC [msp] DeserializeIdentity -> DEBU 119c Obtaining identity" +"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 119d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 119f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.771 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a3 0xc0036b3740 gate 1563590396772180600 evaluation starts" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0036b3740 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a5 0xc0036b3740 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a6 0xc0036b3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11a7 0xc0036b3740 principal evaluation fails" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11a8 0xc0036b3740 gate 1563590396772180600 evaluation fails" +"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11a9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.772 UTC [policies] Evaluate -> DEBU 11ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0036b3f90 gate 1563590396772895800 evaluation starts" +"2019-07-20 02:39:56.772 UTC [cauthdsl] func2 -> DEBU 11ad 0xc0036b3f90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11ae 0xc0036b3f90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.773 UTC [cauthdsl] func2 -> DEBU 11af 0xc0036b3f90 principal matched by identity 0" +"2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:56.773 UTC [msp.identity] Verify -> DEBU 11b1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:56.776 UTC [cauthdsl] func2 -> DEBU 11b2 0xc0036b3f90 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.776 UTC [cauthdsl] func1 -> DEBU 11b3 0xc0036b3f90 gate 1563590396772895800 evaluation succeeds" +"2019-07-20 02:39:56.776 UTC [policies] Evaluate -> DEBU 11b4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.777 UTC [policies] Evaluate -> DEBU 11b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b8 Exiting" +"2019-07-20 02:39:56.777 UTC [gossip.gossip] handleMessage -> DEBU 11b9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11ba Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:39:56.777 UTC [msp.identity] Verify -> DEBU 11bb Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bc Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:56.778 UTC [msp.identity] Verify -> DEBU 11bd Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11be Obtaining identity" +"2019-07-20 02:39:56.778 UTC [msp] DeserializeIdentity -> DEBU 11bf Obtaining identity" +"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.778 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.778 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.778 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0036ea820 gate 1563590396778956200 evaluation starts" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0036ea820 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0036ea820 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0036ea820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0036ea820 principal evaluation fails" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0036ea820 gate 1563590396778956200 evaluation fails" +"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.779 UTC [policies] Evaluate -> DEBU 11ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func1 -> DEBU 11cf 0xc0036eb080 gate 1563590396779609200 evaluation starts" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d0 0xc0036eb080 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d1 0xc0036eb080 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.779 UTC [cauthdsl] func2 -> DEBU 11d2 0xc0036eb080 principal matched by identity 0" +"2019-07-20 02:39:56.779 UTC [msp.identity] Verify -> DEBU 11d3 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:56.780 UTC [msp.identity] Verify -> DEBU 11d4 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:56.780 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0036eb080 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.780 UTC [cauthdsl] func1 -> DEBU 11d6 0xc0036eb080 gate 1563590396779609200 evaluation succeeds" +"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.780 UTC [policies] Evaluate -> DEBU 11da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11db Exiting" +"2019-07-20 02:39:56.780 UTC [gossip.gossip] handleMessage -> DEBU 11dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" +"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11de Obtaining identity" +"2019-07-20 02:39:56.780 UTC [msp] DeserializeIdentity -> DEBU 11df Obtaining identity" +"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.781 UTC [policies] Evaluate -> DEBU 11e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11e6 0xc003798b90 gate 1563590396782191100 evaluation starts" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e7 0xc003798b90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e8 0xc003798b90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11e9 0xc003798b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func2 -> DEBU 11ea 0xc003798b90 principal evaluation fails" +"2019-07-20 02:39:56.782 UTC [cauthdsl] func1 -> DEBU 11eb 0xc003798b90 gate 1563590396782191100 evaluation fails" +"2019-07-20 02:39:56.782 UTC [policies] Evaluate -> DEBU 11ec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.783 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.783 UTC [cauthdsl] func1 -> DEBU 11ef 0xc0037993d0 gate 1563590396783331500 evaluation starts" +"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f0 0xc0037993d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f1 0xc0037993d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.783 UTC [cauthdsl] func2 -> DEBU 11f2 0xc0037993d0 principal matched by identity 0" +"2019-07-20 02:39:56.783 UTC [msp.identity] Verify -> DEBU 11f3 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:39:56.784 UTC [msp.identity] Verify -> DEBU 11f4 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:39:56.784 UTC [cauthdsl] func2 -> DEBU 11f5 0xc0037993d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.784 UTC [cauthdsl] func1 -> DEBU 11f6 0xc0037993d0 gate 1563590396783331500 evaluation succeeds" +"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11f9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.784 UTC [policies] Evaluate -> DEBU 11fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.785 UTC [gossip.election] waitForInterrupt -> DEBU 11fb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:39:56.785 UTC [gossip.election] IsLeader -> DEBU 11fc c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:39:56.785 UTC [msp] GetDefaultSigningIdentity -> DEBU 11fd Obtaining default signing identity" +"2019-07-20 02:39:56.785 UTC [msp.identity] Sign -> DEBU 11fe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510041801 " +"2019-07-20 02:39:56.786 UTC [msp.identity] Sign -> DEBU 11ff Sign: digest: 3D17F297AE31AB5120D66524527E2DA3C17A877046C3846100F2EEF767D18437 " +"2019-07-20 02:39:56.786 UTC [gossip.election] waitForInterrupt -> DEBU 1200 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1201 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [gossip.comm] Send -> DEBU 1205 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" +"2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1208 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.787 UTC [gossip.comm] sendToEndpoint -> DEBU 1209 Exiting" +"2019-07-20 02:39:56.791 UTC [msp.identity] Verify -> DEBU 120a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 120b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120c Obtaining identity" +"2019-07-20 02:39:56.792 UTC [msp] DeserializeIdentity -> DEBU 120d Obtaining identity" +"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 120e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 120f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1210 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 1213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1214 0xc0037d9520 gate 1563590396792537900 evaluation starts" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1215 0xc0037d9520 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1216 0xc0037d9520 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1217 0xc0037d9520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1218 0xc0037d9520 principal evaluation fails" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 1219 0xc0037d9520 gate 1563590396792537900 evaluation fails" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.792 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func1 -> DEBU 121d 0xc0037d9d60 gate 1563590396792820100 evaluation starts" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121e 0xc0037d9d60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 121f 0xc0037d9d60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.792 UTC [cauthdsl] func2 -> DEBU 1220 0xc0037d9d60 principal matched by identity 0" +"2019-07-20 02:39:56.792 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:39:56.793 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:39:56.793 UTC [cauthdsl] func2 -> DEBU 1223 0xc0037d9d60 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.793 UTC [cauthdsl] func1 -> DEBU 1224 0xc0037d9d60 gate 1563590396792820100 evaluation succeeds" +"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.793 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 1229 Exiting" +"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.793 UTC [gossip.pull] HandleMessage -> DEBU 122b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.793 UTC [gossip.gossip] handleMessage -> DEBU 122c Exiting" +"2019-07-20 02:39:56.915 UTC [gossip.comm] func1 -> DEBU 122d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.915 UTC [gossip.gossip] handleMessage -> DEBU 122e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.916 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" +"2019-07-20 02:39:56.917 UTC [msp] DeserializeIdentity -> DEBU 1230 Obtaining identity" +"2019-07-20 02:39:56.918 UTC [gossip.gossip] handleMessage -> DEBU 1231 Exiting" +"2019-07-20 02:39:56.928 UTC [gossip.comm] func1 -> DEBU 1232 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.928 UTC [gossip.gossip] handleMessage -> DEBU 1233 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.929 UTC [gossip.pull] HandleMessage -> DEBU 1234 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:39:56.929 UTC [gossip.pull] SendDigest -> DEBU 1235 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:39:56.929 UTC [gossip.gossip] handleMessage -> DEBU 1236 Exiting" +"2019-07-20 02:39:56.950 UTC [gossip.comm] func1 -> DEBU 1237 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1238 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.950 UTC [gossip.gossip] handleMessage -> DEBU 1239 Exiting" +"2019-07-20 02:39:56.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 123a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 123b Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:56.950 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" +"2019-07-20 02:39:56.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 123d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 123f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:56.951 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1243 0xc00392c970 gate 1563590396952123800 evaluation starts" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1244 0xc00392c970 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1245 0xc00392c970 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1246 0xc00392c970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func2 -> DEBU 1247 0xc00392c970 principal evaluation fails" +"2019-07-20 02:39:56.952 UTC [cauthdsl] func1 -> DEBU 1248 0xc00392c970 gate 1563590396952123800 evaluation fails" +"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 1249 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:56.952 UTC [policies] Evaluate -> DEBU 124b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:56.953 UTC [cauthdsl] func1 -> DEBU 124c 0xc00392d1b0 gate 1563590396952965700 evaluation starts" +"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124d 0xc00392d1b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124e 0xc00392d1b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:56.953 UTC [cauthdsl] func2 -> DEBU 124f 0xc00392d1b0 principal matched by identity 0" +"2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1250 Verify: digest = 00000000 95 48 f5 b0 d8 da f5 ff de 4d dd b1 47 60 28 a7 |.H.......M..G`(.| +00000010 22 6b b6 c5 89 4e 23 53 d6 fc c3 30 7b 27 42 eb |"k...N#S...0{'B.|" +"2019-07-20 02:39:56.953 UTC [msp.identity] Verify -> DEBU 1251 Verify: sig = 00000000 30 44 02 20 28 f2 eb 53 10 3b 2f 51 c3 97 33 b5 |0D. (..S.;/Q..3.| +00000010 f4 59 4f c6 e1 f0 9d c2 e9 ad ae 44 79 ce 6f a7 |.YO........Dy.o.| +00000020 61 5b eb 9a 02 20 59 2c e5 f2 d3 23 32 f6 71 6a |a[... Y,...#2.qj| +00000030 e1 26 97 7a 1c f9 09 ab 6f f0 84 e2 07 66 63 17 |.&.z....o....fc.| +00000040 bd e5 5b cf b3 77 |..[..w|" +"2019-07-20 02:39:56.954 UTC [cauthdsl] func2 -> DEBU 1252 0xc00392d1b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:56.954 UTC [cauthdsl] func1 -> DEBU 1253 0xc00392d1b0 gate 1563590396952965700 evaluation succeeds" +"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1256 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:56.954 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:56.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1258 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1259 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125a updating membership: timestamp: " +"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125b Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:56.955 UTC [gossip.discovery] learnExistingMembers -> DEBU 125d Exiting" +"2019-07-20 02:39:56.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 125e Exiting" +"2019-07-20 02:39:56.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 125f Exiting" +"2019-07-20 02:39:56.955 UTC [msp] DeserializeIdentity -> DEBU 1260 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1261 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1262 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1263 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1264 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1265 Obtaining identity" +"2019-07-20 02:39:56.956 UTC [gossip.comm] Send -> DEBU 1266 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:56.956 UTC [msp] DeserializeIdentity -> DEBU 1267 Obtaining identity" +"2019-07-20 02:39:56.957 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" +"2019-07-20 02:39:56.957 UTC [gossip.comm] Send -> DEBU 1269 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126b Exiting" +"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.957 UTC [gossip.comm] sendToEndpoint -> DEBU 126d Exiting" +"2019-07-20 02:39:56.958 UTC [gossip.comm] func1 -> DEBU 126e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 126f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.958 UTC [gossip.gossip] handleMessage -> DEBU 1270 Exiting" +"2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1272 Exiting" +"2019-07-20 02:39:56.959 UTC [gossip.comm] func1 -> DEBU 1273 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1274 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.960 UTC [gossip.gossip] handleMessage -> DEBU 1275 Exiting" +"2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:56.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1277 Exiting" +"2019-07-20 02:39:57.077 UTC [gossip.comm] func1 -> DEBU 1278 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:57.077 UTC [gossip.gossip] handleMessage -> DEBU 1279 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:57.077 UTC [msp] DeserializeIdentity -> DEBU 127a Obtaining identity" +"2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127b Obtaining identity" +"2019-07-20 02:39:57.078 UTC [msp] DeserializeIdentity -> DEBU 127c Obtaining identity" +"2019-07-20 02:39:57.080 UTC [gossip.gossip] handleMessage -> DEBU 127d Exiting" +"2019-07-20 02:39:57.215 UTC [gossip.comm] func1 -> DEBU 127e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:57.216 UTC [gossip.gossip] handleMessage -> DEBU 127f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1280 Obtaining identity" +"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1281 Obtaining identity" +"2019-07-20 02:39:57.219 UTC [msp] DeserializeIdentity -> DEBU 1282 Obtaining identity" +"2019-07-20 02:39:57.219 UTC [gossip.gossip] handleMessage -> DEBU 1283 Exiting" +"2019-07-20 02:39:57.261 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1284 Sleeping 25s" +"2019-07-20 02:39:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 1285 Obtaining default signing identity" +"2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1286 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151015 " +"2019-07-20 02:39:57.266 UTC [msp.identity] Sign -> DEBU 1287 Sign: digest: 0002FCB77BD293C038C9723707CBBAC6C32ED8A408B1F1A6C0E74FA9D271B781 " +"2019-07-20 02:39:57.267 UTC [msp] GetDefaultSigningIdentity -> DEBU 1288 Obtaining default signing identity" +"2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 1289 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:39:57.267 UTC [msp.identity] Sign -> DEBU 128a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:39:57.267 UTC [gossip.discovery] periodicalSendAlive -> DEBU 128b Sleeping 5s" +"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128c Obtaining identity" +"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128d Obtaining identity" +"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 128e Obtaining identity" +"2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 128f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:57.276 UTC [msp] DeserializeIdentity -> DEBU 1290 Obtaining identity" +"2019-07-20 02:39:57.276 UTC [gossip.comm] Send -> DEBU 1291 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:57.277 UTC [gossip.comm] Send -> DEBU 1292 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1293 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1294 Exiting" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1295 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1296 Exiting" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1297 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:57.277 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Exiting" +"2019-07-20 02:39:57.401 UTC [gossip.comm] func1 -> DEBU 1299 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.402 UTC [gossip.gossip] handleMessage -> DEBU 129a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.403 UTC [gossip.gossip] handleMessage -> DEBU 129b Exiting" +"2019-07-20 02:39:57.403 UTC [gossip.discovery] handleMsgFromComm -> DEBU 129c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.403 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 129d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 b9 dd c8 c7 6d ff 2b 8a 99 ea 11 e3 44 96 78 ff |....m.+.....D.x.| +00000010 d9 76 8b 02 5f 76 6d 63 c6 65 6a 00 4e 95 50 36 |.v.._vmc.ej.N.P6|" +"2019-07-20 02:39:57.404 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 b7 49 ab 36 61 f7 81 6d 69 29 bf |0E.!..I.6a..mi).| +00000010 36 52 9d a6 90 5f 3b a2 30 72 6a d9 de 9c 0a 21 |6R..._;.0rj....!| +00000020 7f ff de 82 c7 02 20 49 95 b5 20 20 97 19 91 63 |...... I.. ...c| +00000030 fa c3 66 a3 99 63 96 08 df 8e 9e c2 7b fb b5 14 |..f..c......{...| +00000040 c3 7d 6d 48 06 16 e2 |.}mH...|" +"2019-07-20 02:39:57.404 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a0 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a2 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:57.404 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a3 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a4 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:57.405 UTC [gossip.discovery] learnExistingMembers -> DEBU 12a5 Exiting" +"2019-07-20 02:39:57.405 UTC [gossip.discovery] handleAliveMessage -> DEBU 12a6 Exiting" +"2019-07-20 02:39:57.405 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12a7 Exiting" +"2019-07-20 02:39:57.412 UTC [gossip.comm] func1 -> DEBU 12a8 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12a9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12aa Exiting" +"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12ac Exiting" +"2019-07-20 02:39:57.413 UTC [gossip.comm] func1 -> DEBU 12ad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.gossip] handleMessage -> DEBU 12af Exiting" +"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.413 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12b1 Exiting" +"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b2 Obtaining identity" +"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b3 Obtaining identity" +"2019-07-20 02:39:57.413 UTC [msp] DeserializeIdentity -> DEBU 12b4 Obtaining identity" +"2019-07-20 02:39:57.413 UTC [gossip.comm] Send -> DEBU 12b5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:57.414 UTC [msp] DeserializeIdentity -> DEBU 12b6 Obtaining identity" +"2019-07-20 02:39:57.414 UTC [gossip.comm] Send -> DEBU 12b7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12b9 Exiting" +"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12ba Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.414 UTC [gossip.comm] sendToEndpoint -> DEBU 12bb Exiting" +"2019-07-20 02:39:57.586 UTC [gossip.comm] func1 -> DEBU 12bc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.586 UTC [gossip.gossip] handleMessage -> DEBU 12bd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.587 UTC [gossip.gossip] handleMessage -> DEBU 12be Exiting" +"2019-07-20 02:39:57.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.587 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 12c0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:39:57.587 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:57.587 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:57.587 UTC [policies] Evaluate -> DEBU 12c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12c8 0xc003a8cc90 gate 1563590397587995100 evaluation starts" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12c9 0xc003a8cc90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12ca 0xc003a8cc90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cb 0xc003a8cc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12cc 0xc003a8cc90 principal evaluation fails" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12cd 0xc003a8cc90 gate 1563590397587995100 evaluation fails" +"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12ce Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:57.588 UTC [policies] Evaluate -> DEBU 12d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func1 -> DEBU 12d1 0xc003a8d4d0 gate 1563590397588716100 evaluation starts" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d2 0xc003a8d4d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:57.588 UTC [cauthdsl] func2 -> DEBU 12d3 0xc003a8d4d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d4 0xc003a8d4d0 principal matched by identity 0" +"2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d5 Verify: digest = 00000000 83 1d c3 d2 b4 ac 95 19 17 8d fe a1 81 8d 9a e5 |................| +00000010 78 dc 36 0b 00 8c 9a 0e 72 f4 9c f5 4a 9d 7f 0f |x.6.....r...J...|" +"2019-07-20 02:39:57.589 UTC [msp.identity] Verify -> DEBU 12d6 Verify: sig = 00000000 30 45 02 21 00 9a 40 65 b0 10 da 51 8a f3 ee ac |0E.!..@e...Q....| +00000010 2f 2e 81 a3 c6 f1 57 70 46 e7 e2 5b 12 9d 5a 65 |/.....WpF..[..Ze| +00000020 01 16 95 a8 d3 02 20 37 45 a3 c5 78 bf 84 68 2e |...... 7E..x..h.| +00000030 82 2e 93 c1 30 45 37 59 55 bb b1 42 d7 3d 21 81 |....0E7YU..B.=!.| +00000040 0c 75 ab 99 6c ad bd |.u..l..|" +"2019-07-20 02:39:57.589 UTC [cauthdsl] func2 -> DEBU 12d7 0xc003a8d4d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:57.589 UTC [cauthdsl] func1 -> DEBU 12d8 0xc003a8d4d0 gate 1563590397588716100 evaluation succeeds" +"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12d9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12db Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:57.589 UTC [policies] Evaluate -> DEBU 12dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12df updating membership: timestamp: " +"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e0 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:39:57.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e2 Exiting" +"2019-07-20 02:39:57.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 12e3 Exiting" +"2019-07-20 02:39:57.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12e4 Exiting" +"2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e5 Obtaining identity" +"2019-07-20 02:39:57.595 UTC [msp] DeserializeIdentity -> DEBU 12e6 Obtaining identity" +"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e7 Obtaining identity" +"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e8 Obtaining identity" +"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12e9 Obtaining identity" +"2019-07-20 02:39:57.596 UTC [msp] DeserializeIdentity -> DEBU 12ea Obtaining identity" +"2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12eb Obtaining identity" +"2019-07-20 02:39:57.597 UTC [gossip.comm] Send -> DEBU 12ec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:57.597 UTC [msp] DeserializeIdentity -> DEBU 12ed Obtaining identity" +"2019-07-20 02:39:57.598 UTC [gossip.comm] Send -> DEBU 12ee Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f0 Exiting" +"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.598 UTC [gossip.comm] sendToEndpoint -> DEBU 12f2 Exiting" +"2019-07-20 02:39:57.598 UTC [gossip.comm] func1 -> DEBU 12f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f5 Exiting" +"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12f7 Exiting" +"2019-07-20 02:39:57.599 UTC [gossip.comm] func1 -> DEBU 12f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12f9 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.gossip] handleMessage -> DEBU 12fa Exiting" +"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:39:57.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 12fc Exiting" +"2019-07-20 02:39:59.948 UTC [gossip.comm] func1 -> DEBU 12fd Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.948 UTC [gossip.gossip] handleMessage -> DEBU 12ff Exiting" +"2019-07-20 02:39:59.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1300 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1301 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:39:59.948 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" +"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1303 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1304 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:59.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1306 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1307 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:39:59.949 UTC [policies] Evaluate -> DEBU 1308 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:39:59.949 UTC [cauthdsl] func1 -> DEBU 1309 0xc003bb2320 gate 1563590399949786200 evaluation starts" +"2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130a 0xc003bb2320 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:59.949 UTC [cauthdsl] func2 -> DEBU 130b 0xc003bb2320 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130c 0xc003bb2320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 130d 0xc003bb2320 principal evaluation fails" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 130e 0xc003bb2320 gate 1563590399949786200 evaluation fails" +"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 130f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1310 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:39:59.950 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func1 -> DEBU 1312 0xc003bb2b90 gate 1563590399950706500 evaluation starts" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1313 0xc003bb2b90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1314 0xc003bb2b90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:39:59.950 UTC [cauthdsl] func2 -> DEBU 1315 0xc003bb2b90 principal matched by identity 0" +"2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| +00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" +"2019-07-20 02:39:59.951 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| +00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| +00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| +00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| +00000040 ad ca ca e5 1e 5a |.....Z|" +"2019-07-20 02:39:59.952 UTC [cauthdsl] func2 -> DEBU 1318 0xc003bb2b90 principal evaluation succeeds for identity 0" +"2019-07-20 02:39:59.952 UTC [cauthdsl] func1 -> DEBU 1319 0xc003bb2b90 gate 1563590399950706500 evaluation succeeds" +"2019-07-20 02:39:59.952 UTC [policies] Evaluate -> DEBU 131a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:39:59.953 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:39:59.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 131e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 131f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:39:59.953 UTC [gossip.discovery] learnExistingMembers -> DEBU 1320 updating membership: timestamp: " +"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1321 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1322 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:39:59.954 UTC [gossip.discovery] learnExistingMembers -> DEBU 1323 Exiting" +"2019-07-20 02:39:59.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1324 Exiting" +"2019-07-20 02:39:59.954 UTC [gossip.discovery] sendMemResponse -> DEBU 1325 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" +"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1327 Obtaining identity" +"2019-07-20 02:39:59.955 UTC [msp] DeserializeIdentity -> DEBU 1328 Obtaining identity" +"2019-07-20 02:39:59.955 UTC [gossip.comm] Send -> DEBU 1329 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:39:59.956 UTC [gossip.discovery] sendMemResponse -> DEBU 132a Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\031" signature:"0E\002!\000\267I\2536a\367\201mi)\2776R\235\246\220_;\2420rj\331\336\234\n!\177\377\336\202\307\002 I\225\265 \227\031\221c\372\303f\243\231c\226\010\337\216\236\302{\373\265\024\303}mH\006\026\342" > alive: " +"2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.957 UTC [gossip.comm] sendToEndpoint -> DEBU 132c Exiting" +"2019-07-20 02:39:59.957 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.958 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.958 UTC [gossip.pull] HandleMessage -> DEBU 132f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" +"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" +"2019-07-20 02:39:59.958 UTC [msp] DeserializeIdentity -> DEBU 1332 Obtaining identity" +"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1333 Obtaining identity" +"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1334 Obtaining identity" +"2019-07-20 02:39:59.959 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +"2019-07-20 02:39:59.959 UTC [gossip.pull] SendDigest -> DEBU 1336 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:39:59.959 UTC [gossip.gossip] handleMessage -> DEBU 1337 Exiting" +"2019-07-20 02:39:59.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1338 Exiting" +"2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 1339 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:00.274 UTC [gossip.comm] Send -> DEBU 133a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.274 UTC [gossip.pull] Hello -> DEBU 133b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.275 UTC [gossip.pull] Hello -> DEBU 133d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:00.275 UTC [gossip.comm] Send -> DEBU 133e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 133f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1340 Exiting" +"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1341 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1342 Exiting" +"2019-07-20 02:40:00.275 UTC [gossip.comm] sendToEndpoint -> DEBU 1343 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.276 UTC [gossip.comm] sendToEndpoint -> DEBU 1344 Exiting" +"2019-07-20 02:40:00.276 UTC [gossip.comm] func1 -> DEBU 1345 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1346 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.277 UTC [gossip.pull] HandleMessage -> DEBU 1347 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.277 UTC [gossip.gossip] handleMessage -> DEBU 1348 Exiting" +"2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 1349 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.278 UTC [gossip.pull] HandleMessage -> DEBU 134b GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.278 UTC [gossip.gossip] handleMessage -> DEBU 134c Exiting" +"2019-07-20 02:40:00.278 UTC [gossip.comm] func1 -> DEBU 134d Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 134e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.279 UTC [gossip.pull] HandleMessage -> DEBU 134f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.279 UTC [gossip.gossip] handleMessage -> DEBU 1350 Exiting" +"2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1351 Obtaining default signing identity" +"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1352 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151016 " +"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1353 Sign: digest: 11CA326B0DACA229CE2CE81B0CFFF6F167054870B698D3BCC60F2CCD5EECB3F3 " +"2019-07-20 02:40:00.309 UTC [msp] GetDefaultSigningIdentity -> DEBU 1354 Obtaining default signing identity" +"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1355 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:00.309 UTC [msp.identity] Sign -> DEBU 1356 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 1357 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 1358 Obtaining identity" +"2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 1359 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.310 UTC [gossip.comm] sendToEndpoint -> DEBU 135a Exiting" +"2019-07-20 02:40:00.310 UTC [gossip.comm] Send -> DEBU 135b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.310 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" +"2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.311 UTC [gossip.comm] sendToEndpoint -> DEBU 135e Exiting" +"2019-07-20 02:40:00.311 UTC [gossip.comm] Send -> DEBU 135f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1360 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.312 UTC [gossip.comm] sendToEndpoint -> DEBU 1361 Exiting" +"2019-07-20 02:40:00.313 UTC [gossip.comm] func1 -> DEBU 1362 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1363 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.313 UTC [gossip.gossip] handleMessage -> DEBU 1364 Exiting" +"2019-07-20 02:40:00.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1365 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.314 UTC [gossip.comm] func1 -> DEBU 1366 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.314 UTC [gossip.gossip] handleMessage -> DEBU 1367 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1368 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:00.314 UTC [msp.identity] Verify -> DEBU 1369 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +"2019-07-20 02:40:00.315 UTC [msp.identity] Verify -> DEBU 136a Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +00000040 4e d6 49 e1 dd 1b |N.I...|" +"2019-07-20 02:40:00.315 UTC [gossip.comm] func1 -> DEBU 136b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 136c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.315 UTC [gossip.discovery] isSentByMe -> DEBU 136d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 136e Exiting" +"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 136f Exiting" +"2019-07-20 02:40:00.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1370 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1371 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" +"2019-07-20 02:40:00.316 UTC [gossip.gossip] handleMessage -> DEBU 1373 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1374 Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +"2019-07-20 02:40:00.317 UTC [msp.identity] Verify -> DEBU 1375 Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +00000040 4e d6 49 e1 dd 1b |N.I...|" +"2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1376 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.317 UTC [gossip.discovery] isSentByMe -> DEBU 1377 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 1378 Exiting" +"2019-07-20 02:40:00.317 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1379 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:00.317 UTC [msp] DeserializeIdentity -> DEBU 137a Obtaining identity" +"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 137b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 137d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 137f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1381 0xc003cd45b0 gate 1563590400318472100 evaluation starts" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1382 0xc003cd45b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1383 0xc003cd45b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1384 0xc003cd45b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func2 -> DEBU 1385 0xc003cd45b0 principal evaluation fails" +"2019-07-20 02:40:00.318 UTC [cauthdsl] func1 -> DEBU 1386 0xc003cd45b0 gate 1563590400318472100 evaluation fails" +"2019-07-20 02:40:00.318 UTC [policies] Evaluate -> DEBU 1387 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1388 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.319 UTC [policies] Evaluate -> DEBU 1389 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.319 UTC [cauthdsl] func1 -> DEBU 138a 0xc003cd4e10 gate 1563590400319460300 evaluation starts" +"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138b 0xc003cd4e10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138c 0xc003cd4e10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.319 UTC [cauthdsl] func2 -> DEBU 138d 0xc003cd4e10 principal matched by identity 0" +"2019-07-20 02:40:00.319 UTC [msp.identity] Verify -> DEBU 138e Verify: digest = 00000000 64 e6 bd 9b c4 af c6 3c 24 e1 0e 9a 0b ec e2 3d |d......<$......=| +00000010 03 6e 6c 5f 0b 5e 39 29 da 7d d8 fb 9f 31 b9 c1 |.nl_.^9).}...1..|" +"2019-07-20 02:40:00.320 UTC [msp.identity] Verify -> DEBU 138f Verify: sig = 00000000 30 44 02 20 5f e3 aa 3f 94 4e 5f e6 55 aa 4c d3 |0D. _..?.N_.U.L.| +00000010 04 80 9f 88 f2 43 3b b4 d7 56 e6 8d 67 e9 a7 c7 |.....C;..V..g...| +00000020 ca 23 15 f5 02 20 28 9c 73 a9 00 21 bc bc 00 33 |.#... (.s..!...3| +00000030 13 bd fe 64 e7 c6 33 61 5b 99 5b 42 2c 95 3f a1 |...d..3a[.[B,.?.| +00000040 ad ca ca e5 1e 5a |.....Z|" +"2019-07-20 02:40:00.320 UTC [cauthdsl] func2 -> DEBU 1390 0xc003cd4e10 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.320 UTC [cauthdsl] func1 -> DEBU 1391 0xc003cd4e10 gate 1563590400319460300 evaluation succeeds" +"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1392 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1393 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1394 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.320 UTC [policies] Evaluate -> DEBU 1395 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1396 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" +"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" +"2019-07-20 02:40:00.321 UTC [gossip.gossip] handleMessage -> DEBU 139a Exiting" +"2019-07-20 02:40:00.321 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1399 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.322 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 139b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139c Verify: digest = 00000000 11 ca 32 6b 0d ac a2 29 ce 2c e8 1b 0c ff f6 f1 |..2k...).,......| +00000010 67 05 48 70 b6 98 d3 bc c6 0f 2c cd 5e ec b3 f3 |g.Hp......,.^...|" +"2019-07-20 02:40:00.322 UTC [msp.identity] Verify -> DEBU 139d Verify: sig = 00000000 30 44 02 20 74 ec fe 05 09 f5 74 c2 58 fb 4a f8 |0D. t.....t.X.J.| +00000010 6f 33 8b 3c 96 7b ec bf 21 58 34 1e 02 00 d2 0b |o3.<.{..!X4.....| +00000020 d8 74 07 04 02 20 59 4a fe 89 80 db e3 35 72 3a |.t... YJ.....5r:| +00000030 0e 47 7d 60 02 1f b7 31 f9 6c e7 1d d5 33 0f 9e |.G}`...1.l...3..| +00000040 4e d6 49 e1 dd 1b |N.I...|" +"2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:00.323 UTC [msp.identity] Verify -> DEBU 139f Verify: sig = 00000000 30 44 02 20 58 40 7c 49 09 c6 a4 f9 da 59 12 bf |0D. X@|I.....Y..| +00000010 7a 38 1d fb 5d 95 58 26 92 c8 a0 3b 06 3b 03 68 |z8..].X&...;.;.h| +00000020 bd 29 24 99 02 20 33 53 85 b7 ac 4b ef 99 a3 4f |.)$.. 3S...K...O| +00000030 36 7d d1 08 b7 a3 a8 2c 9a 5e 86 92 2f fa 80 c9 |6}.....,.^../...| +00000040 4f 89 be 1b 47 d5 |O...G.|" +"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:00.323 UTC [gossip.discovery] isSentByMe -> DEBU 13a1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 13a2 Exiting" +"2019-07-20 02:40:00.323 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13a3 Exiting" +"2019-07-20 02:40:00.395 UTC [gossip.comm] func1 -> DEBU 13a4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.395 UTC [gossip.gossip] handleMessage -> DEBU 13a5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.397 UTC [gossip.pull] HandleMessage -> DEBU 13a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.398 UTC [gossip.pull] SendDigest -> DEBU 13a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13a8 Exiting" +"2019-07-20 02:40:00.398 UTC [gossip.comm] func1 -> DEBU 13a9 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13aa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.398 UTC [gossip.gossip] handleMessage -> DEBU 13ab Exiting" +"2019-07-20 02:40:00.398 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13ac Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.398 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ad Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13ae Verify: digest = 00000000 b2 df 75 9a c5 cd b4 29 05 05 d3 7e cd ea ba b1 |..u....)...~....| +00000010 29 a8 a9 25 d2 e9 e4 20 b9 cd 4c 96 94 4b 70 bb |)..%... ..L..Kp.|" +"2019-07-20 02:40:00.400 UTC [msp.identity] Verify -> DEBU 13af Verify: sig = 00000000 30 45 02 21 00 ae ba 69 b1 18 cb c3 27 ed 1f 1e |0E.!...i....'...| +00000010 ec 78 6e e7 f4 61 a8 c8 c2 ac ec 49 b9 fa b6 40 |.xn..a.....I...@| +00000020 53 2e 97 6c 1e 02 20 48 5e a8 6c ca f8 d1 22 ac |S..l.. H^.l...".| +00000030 ec 63 b2 b0 1c d9 86 3a 93 25 43 35 79 66 77 5d |.c.....:.%C5yfw]| +00000040 9c 50 f7 27 c9 50 6e |.P.'.Pn|" +"2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:00.401 UTC [msp.identity] Verify -> DEBU 13b1 Verify: sig = 00000000 30 44 02 20 64 44 b6 aa 9f f9 b9 e1 0f 65 2b 3e |0D. dD.......e+>| +00000010 e8 a7 42 e8 6f c5 84 00 11 a8 16 cb e4 dd a3 a3 |..B.o...........| +00000020 45 89 e3 36 02 20 17 a3 1e d3 94 25 da e8 b9 3c |E..6. .....%...<| +00000030 34 a2 f3 f9 fd ea a2 aa a9 af 6f 13 dc 62 cf 4c |4.........o..b.L| +00000040 b4 8b 61 7d f0 f7 |..a}..|" +"2019-07-20 02:40:00.401 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b2 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:00.401 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b4 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b5 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b6 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:00.402 UTC [gossip.discovery] learnExistingMembers -> DEBU 13b7 Exiting" +"2019-07-20 02:40:00.402 UTC [gossip.discovery] handleAliveMessage -> DEBU 13b8 Exiting" +"2019-07-20 02:40:00.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13b9 Exiting" +"2019-07-20 02:40:00.402 UTC [gossip.discovery] sendMemResponse -> DEBU 13ba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bb Obtaining identity" +"2019-07-20 02:40:00.402 UTC [msp] DeserializeIdentity -> DEBU 13bc Obtaining identity" +"2019-07-20 02:40:00.403 UTC [gossip.comm] Send -> DEBU 13bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.403 UTC [gossip.discovery] sendMemResponse -> DEBU 13be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" secret_envelope:\350\247B\350o\305\204\000\021\250\026\313\344\335\243\243E\211\3436\002 \027\243\036\323\224%\332\350\271<4\242\363\371\375\352\242\252\251\257o\023\334b\317L\264\213a}\360\367" > > alive: " +"2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.403 UTC [gossip.comm] sendToEndpoint -> DEBU 13c0 Exiting" +"2019-07-20 02:40:00.577 UTC [gossip.comm] func1 -> DEBU 13c1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.577 UTC [gossip.gossip] handleMessage -> DEBU 13c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.578 UTC [gossip.pull] HandleMessage -> DEBU 13c3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" +"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c5 Obtaining identity" +"2019-07-20 02:40:00.578 UTC [msp] DeserializeIdentity -> DEBU 13c6 Obtaining identity" +"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c7 Obtaining identity" +"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c8 Obtaining identity" +"2019-07-20 02:40:00.579 UTC [msp] DeserializeIdentity -> DEBU 13c9 Obtaining identity" +"2019-07-20 02:40:00.583 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.583 UTC [gossip.pull] SendDigest -> DEBU 13cb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:00.583 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" +"2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13cd Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.584 UTC [gossip.gossip] handleMessage -> DEBU 13ce Exiting" +"2019-07-20 02:40:00.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cf Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13d0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:00.584 UTC [msp] DeserializeIdentity -> DEBU 13d1 Obtaining identity" +"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.584 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13d4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.585 UTC [policies] Evaluate -> DEBU 13d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13d8 0xc003c1dbf0 gate 1563590400585459000 evaluation starts" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13d9 0xc003c1dbf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13da 0xc003c1dbf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13db 0xc003c1dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func2 -> DEBU 13dc 0xc003c1dbf0 principal evaluation fails" +"2019-07-20 02:40:00.585 UTC [cauthdsl] func1 -> DEBU 13dd 0xc003c1dbf0 gate 1563590400585459000 evaluation fails" +"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.586 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.586 UTC [cauthdsl] func1 -> DEBU 13e1 0xc003de6430 gate 1563590400586238400 evaluation starts" +"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e2 0xc003de6430 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e3 0xc003de6430 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.586 UTC [cauthdsl] func2 -> DEBU 13e4 0xc003de6430 principal matched by identity 0" +"2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 86 b9 c7 5f ed e5 be f6 d8 85 e9 e3 f2 09 bd b0 |..._............| +00000010 2f 34 3b 45 e9 01 f4 b7 52 25 1c f6 92 75 21 7f |/4;E....R%...u!.|" +"2019-07-20 02:40:00.586 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 44 02 20 24 c6 14 9d e8 1d 73 3c 83 1a 5e 08 |0D. $.....s<..^.| +00000010 ac 7d f7 5a 94 1a c0 70 a9 5b 20 06 d9 fd ec 3d |.}.Z...p.[ ....=| +00000020 54 30 68 7e 02 20 08 90 da f4 ba 3c 8f 73 53 fa |T0h~. .....<.sS.| +00000030 0e 5b 5b b7 96 90 74 e0 b4 d4 6c 8c 7c d5 ad 4c |.[[...t...l.|..L| +00000040 4b 91 d8 df 33 f5 |K...3.|" +"2019-07-20 02:40:00.587 UTC [cauthdsl] func2 -> DEBU 13e7 0xc003de6430 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.587 UTC [cauthdsl] func1 -> DEBU 13e8 0xc003de6430 gate 1563590400586238400 evaluation succeeds" +"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13eb Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.587 UTC [policies] Evaluate -> DEBU 13ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13ef updating membership: timestamp: " +"2019-07-20 02:40:00.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f0 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:00.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 13f2 Exiting" +"2019-07-20 02:40:00.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f3 Exiting" +"2019-07-20 02:40:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13f4 Exiting" +"2019-07-20 02:40:00.588 UTC [gossip.discovery] sendMemResponse -> DEBU 13f5 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f6 Obtaining identity" +"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f7 Obtaining identity" +"2019-07-20 02:40:00.588 UTC [msp] DeserializeIdentity -> DEBU 13f8 Obtaining identity" +"2019-07-20 02:40:00.588 UTC [gossip.comm] Send -> DEBU 13f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.589 UTC [gossip.discovery] sendMemResponse -> DEBU 13fa Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\032" signature:"0E\002!\000\256\272i\261\030\313\303'\355\037\036\354xn\347\364a\250\310\302\254\354I\271\372\266@S.\227l\036\002 H^\250l\312\370\321\"\254\354c\262\260\034\331\206:\223%C5yfw]\234P\367'\311Pn" > alive: alive: alive: " +"2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.589 UTC [gossip.comm] sendToEndpoint -> DEBU 13fc Exiting" +"2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fd Obtaining identity" +"2019-07-20 02:40:00.717 UTC [msp] DeserializeIdentity -> DEBU 13fe Obtaining identity" +"2019-07-20 02:40:00.718 UTC [gossip.comm] Send -> DEBU 13ff Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1400 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1401 Exiting" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1402 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1403 Exiting" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1404 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.718 UTC [gossip.comm] sendToEndpoint -> DEBU 1405 Exiting" +"2019-07-20 02:40:00.719 UTC [gossip.comm] func1 -> DEBU 1406 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.719 UTC [gossip.gossip] handleMessage -> DEBU 1407 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.719 UTC [msp] DeserializeIdentity -> DEBU 1408 Obtaining identity" +"2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 1409 Obtaining identity" +"2019-07-20 02:40:00.721 UTC [msp] DeserializeIdentity -> DEBU 140a Obtaining identity" +"2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 140b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 140d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 140f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1410 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1411 0xc003e15bd0 gate 1563590400722307300 evaluation starts" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1412 0xc003e15bd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1413 0xc003e15bd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1414 0xc003e15bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func2 -> DEBU 1415 0xc003e15bd0 principal evaluation fails" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 1416 0xc003e15bd0 gate 1563590400722307300 evaluation fails" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1417 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1418 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.722 UTC [policies] Evaluate -> DEBU 1419 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.722 UTC [cauthdsl] func1 -> DEBU 141a 0xc003e32550 gate 1563590400722785400 evaluation starts" +"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141b 0xc003e32550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141c 0xc003e32550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.723 UTC [gossip.comm] func1 -> DEBU 141d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.723 UTC [cauthdsl] func2 -> DEBU 141e 0xc003e32550 principal matched by identity 0" +"2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 141f Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:00.724 UTC [msp.identity] Verify -> DEBU 1420 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:00.724 UTC [cauthdsl] func2 -> DEBU 1421 0xc003e32550 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.724 UTC [cauthdsl] func1 -> DEBU 1422 0xc003e32550 gate 1563590400722785400 evaluation succeeds" +"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1423 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1424 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1425 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.725 UTC [policies] Evaluate -> DEBU 1426 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1427 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1428 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:00.726 UTC [msp.identity] Verify -> DEBU 1429 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:00.727 UTC [msp.identity] Verify -> DEBU 142a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142b Obtaining identity" +"2019-07-20 02:40:00.730 UTC [msp] DeserializeIdentity -> DEBU 142c Obtaining identity" +"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 142d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 142f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 1431 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.731 UTC [msp] DeserializeIdentity -> DEBU 1432 Obtaining identity" +"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1433 Obtaining identity" +"2019-07-20 02:40:00.732 UTC [gossip.pull] Hello -> DEBU 1434 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1435 Obtaining identity" +"2019-07-20 02:40:00.732 UTC [msp] DeserializeIdentity -> DEBU 1436 Obtaining identity" +"2019-07-20 02:40:00.732 UTC [gossip.comm] Send -> DEBU 1437 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1438 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.732 UTC [gossip.comm] sendToEndpoint -> DEBU 1439 Exiting" +"2019-07-20 02:40:00.738 UTC [gossip.comm] func1 -> DEBU 143a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.731 UTC [policies] Evaluate -> DEBU 143b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.738 UTC [cauthdsl] func1 -> DEBU 143c 0xc003e86d10 gate 1563590400738727800 evaluation starts" +"2019-07-20 02:40:00.739 UTC [gossip.comm] func1 -> DEBU 143d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143e 0xc003e86d10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.739 UTC [cauthdsl] func2 -> DEBU 143f 0xc003e86d10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1440 0xc003e86d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.740 UTC [cauthdsl] func2 -> DEBU 1441 0xc003e86d10 principal evaluation fails" +"2019-07-20 02:40:00.740 UTC [cauthdsl] func1 -> DEBU 1442 0xc003e86d10 gate 1563590400738727800 evaluation fails" +"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1443 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.740 UTC [policies] Evaluate -> DEBU 1445 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.742 UTC [cauthdsl] func1 -> DEBU 1446 0xc003e87550 gate 1563590400741095900 evaluation starts" +"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1447 0xc003e87550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1448 0xc003e87550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.742 UTC [cauthdsl] func2 -> DEBU 1449 0xc003e87550 principal matched by identity 0" +"2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:00.743 UTC [msp.identity] Verify -> DEBU 144b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:00.743 UTC [cauthdsl] func2 -> DEBU 144c 0xc003e87550 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.744 UTC [cauthdsl] func1 -> DEBU 144d 0xc003e87550 gate 1563590400741095900 evaluation succeeds" +"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 144f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.744 UTC [policies] Evaluate -> DEBU 1450 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.745 UTC [policies] Evaluate -> DEBU 1451 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.747 UTC [gossip.gossip] handleMessage -> DEBU 1452 Exiting" +"2019-07-20 02:40:00.748 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1454 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:00.749 UTC [msp.identity] Verify -> DEBU 1455 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1456 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:00.750 UTC [msp.identity] Verify -> DEBU 1457 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:00.751 UTC [msp] DeserializeIdentity -> DEBU 1458 Obtaining identity" +"2019-07-20 02:40:00.752 UTC [msp] DeserializeIdentity -> DEBU 1459 Obtaining identity" +"2019-07-20 02:40:00.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 145a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 145c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.756 UTC [policies] Evaluate -> DEBU 145e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.757 UTC [policies] Evaluate -> DEBU 145f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.757 UTC [cauthdsl] func1 -> DEBU 1460 0xc003f4be10 gate 1563590400757245300 evaluation starts" +"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1461 0xc003f4be10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1462 0xc003f4be10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.757 UTC [cauthdsl] func2 -> DEBU 1463 0xc003f4be10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.758 UTC [cauthdsl] func2 -> DEBU 1464 0xc003f4be10 principal evaluation fails" +"2019-07-20 02:40:00.758 UTC [cauthdsl] func1 -> DEBU 1465 0xc003f4be10 gate 1563590400757245300 evaluation fails" +"2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1466 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.758 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.759 UTC [policies] Evaluate -> DEBU 1468 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.759 UTC [cauthdsl] func1 -> DEBU 1469 0xc003f7c6b0 gate 1563590400759673900 evaluation starts" +"2019-07-20 02:40:00.759 UTC [cauthdsl] func2 -> DEBU 146a 0xc003f7c6b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146b 0xc003f7c6b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.760 UTC [cauthdsl] func2 -> DEBU 146c 0xc003f7c6b0 principal matched by identity 0" +"2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:00.760 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:00.761 UTC [cauthdsl] func2 -> DEBU 146f 0xc003f7c6b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.761 UTC [cauthdsl] func1 -> DEBU 1470 0xc003f7c6b0 gate 1563590400759673900 evaluation succeeds" +"2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1471 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.761 UTC [policies] Evaluate -> DEBU 1472 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1473 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.762 UTC [policies] Evaluate -> DEBU 1474 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1475 Obtaining identity" +"2019-07-20 02:40:00.762 UTC [msp] DeserializeIdentity -> DEBU 1476 Obtaining identity" +"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1477 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1478 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1479 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.763 UTC [policies] Evaluate -> DEBU 147a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.764 UTC [policies] Evaluate -> DEBU 147c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.764 UTC [cauthdsl] func1 -> DEBU 147d 0xc003f7de80 gate 1563590400764851600 evaluation starts" +"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147e 0xc003f7de80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 147f 0xc003f7de80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1480 0xc003f7de80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.765 UTC [cauthdsl] func2 -> DEBU 1481 0xc003f7de80 principal evaluation fails" +"2019-07-20 02:40:00.765 UTC [cauthdsl] func1 -> DEBU 1482 0xc003f7de80 gate 1563590400764851600 evaluation fails" +"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1483 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1484 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.766 UTC [policies] Evaluate -> DEBU 1485 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.766 UTC [cauthdsl] func1 -> DEBU 1486 0xc003fc46c0 gate 1563590400766587500 evaluation starts" +"2019-07-20 02:40:00.766 UTC [cauthdsl] func2 -> DEBU 1487 0xc003fc46c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1488 0xc003fc46c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.767 UTC [cauthdsl] func2 -> DEBU 1489 0xc003fc46c0 principal matched by identity 0" +"2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:00.767 UTC [msp.identity] Verify -> DEBU 148b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:00.768 UTC [cauthdsl] func2 -> DEBU 148c 0xc003fc46c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.768 UTC [cauthdsl] func1 -> DEBU 148d 0xc003fc46c0 gate 1563590400766587500 evaluation succeeds" +"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 148f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.768 UTC [policies] Evaluate -> DEBU 1490 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.769 UTC [policies] Evaluate -> DEBU 1491 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1492 Exiting" +"2019-07-20 02:40:00.769 UTC [gossip.gossip] handleMessage -> DEBU 1493 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.770 UTC [gossip.pull] HandleMessage -> DEBU 1494 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1495 Exiting" +"2019-07-20 02:40:00.770 UTC [gossip.gossip] handleMessage -> DEBU 1496 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.770 UTC [msp] DeserializeIdentity -> DEBU 1497 Obtaining identity" +"2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1498 Obtaining identity" +"2019-07-20 02:40:00.771 UTC [msp] DeserializeIdentity -> DEBU 1499 Obtaining identity" +"2019-07-20 02:40:00.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 149a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 149c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.772 UTC [policies] Evaluate -> DEBU 149f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.772 UTC [cauthdsl] func1 -> DEBU 14a0 0xc003fe90c0 gate 1563590400772916400 evaluation starts" +"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a1 0xc003fe90c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a2 0xc003fe90c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a3 0xc003fe90c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.773 UTC [cauthdsl] func2 -> DEBU 14a4 0xc003fe90c0 principal evaluation fails" +"2019-07-20 02:40:00.773 UTC [cauthdsl] func1 -> DEBU 14a5 0xc003fe90c0 gate 1563590400772916400 evaluation fails" +"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.774 UTC [policies] Evaluate -> DEBU 14a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.774 UTC [cauthdsl] func1 -> DEBU 14a9 0xc003fe9900 gate 1563590400774755500 evaluation starts" +"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14aa 0xc003fe9900 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ab 0xc003fe9900 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.775 UTC [cauthdsl] func2 -> DEBU 14ac 0xc003fe9900 principal matched by identity 0" +"2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ad Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:00.775 UTC [msp.identity] Verify -> DEBU 14ae Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:00.776 UTC [cauthdsl] func2 -> DEBU 14af 0xc003fe9900 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.776 UTC [cauthdsl] func1 -> DEBU 14b0 0xc003fe9900 gate 1563590400774755500 evaluation succeeds" +"2019-07-20 02:40:00.776 UTC [policies] Evaluate -> DEBU 14b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.777 UTC [policies] Evaluate -> DEBU 14b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.777 UTC [msp.identity] Verify -> DEBU 14b5 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:00.778 UTC [msp.identity] Verify -> DEBU 14b6 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" +"2019-07-20 02:40:00.778 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" +"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14bb Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:00.780 UTC [policies] Evaluate -> DEBU 14be == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:00.780 UTC [cauthdsl] func1 -> DEBU 14bf 0xc003f94080 gate 1563590400780667200 evaluation starts" +"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c0 0xc003f94080 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c1 0xc003f94080 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c2 0xc003f94080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:00.781 UTC [cauthdsl] func2 -> DEBU 14c3 0xc003f94080 principal evaluation fails" +"2019-07-20 02:40:00.781 UTC [cauthdsl] func1 -> DEBU 14c4 0xc003f94080 gate 1563590400780667200 evaluation fails" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003f948c0 gate 1563590400782561100 evaluation starts" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003f948c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003f948c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003f948c0 principal matched by identity 0" +"2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:00.782 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003f948c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:00.782 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003f948c0 gate 1563590400782561100 evaluation succeeds" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:00.782 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d4 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:00.783 UTC [msp.identity] Verify -> DEBU 14d5 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:00.783 UTC [gossip.gossip] handleMessage -> DEBU 14d6 Exiting" +"2019-07-20 02:40:00.878 UTC [gossip.comm] func1 -> DEBU 14d7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14d8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14d9 Obtaining identity" +"2019-07-20 02:40:00.878 UTC [msp] DeserializeIdentity -> DEBU 14da Obtaining identity" +"2019-07-20 02:40:00.878 UTC [gossip.gossip] handleMessage -> DEBU 14db Exiting" +"2019-07-20 02:40:00.894 UTC [gossip.comm] func1 -> DEBU 14dc Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.894 UTC [gossip.gossip] handleMessage -> DEBU 14dd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.894 UTC [gossip.pull] HandleMessage -> DEBU 14de GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:00.895 UTC [gossip.pull] SendDigest -> DEBU 14df Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:00.895 UTC [gossip.gossip] handleMessage -> DEBU 14e0 Exiting" +"2019-07-20 02:40:01.043 UTC [gossip.comm] func1 -> DEBU 14e1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:01.044 UTC [gossip.gossip] handleMessage -> DEBU 14e2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:01.044 UTC [msp] DeserializeIdentity -> DEBU 14e3 Obtaining identity" +"2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +"2019-07-20 02:40:01.045 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" +"2019-07-20 02:40:01.046 UTC [gossip.gossip] handleMessage -> DEBU 14e6 Exiting" +"2019-07-20 02:40:01.182 UTC [gossip.comm] func1 -> DEBU 14e7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:01.183 UTC [gossip.gossip] handleMessage -> DEBU 14e8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14e9 Obtaining identity" +"2019-07-20 02:40:01.183 UTC [msp] DeserializeIdentity -> DEBU 14ea Obtaining identity" +"2019-07-20 02:40:01.184 UTC [msp] DeserializeIdentity -> DEBU 14eb Obtaining identity" +"2019-07-20 02:40:01.184 UTC [gossip.gossip] handleMessage -> DEBU 14ec Exiting" +"2019-07-20 02:40:01.752 UTC [gossip.election] waitForInterrupt -> DEBU 14ed c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:01.752 UTC [gossip.election] IsLeader -> DEBU 14ee c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:01.752 UTC [msp] GetDefaultSigningIdentity -> DEBU 14ef Obtaining default signing identity" +"2019-07-20 02:40:01.752 UTC [msp.identity] Sign -> DEBU 14f0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510051801 " +"2019-07-20 02:40:01.753 UTC [msp.identity] Sign -> DEBU 14f1 Sign: digest: E591A4CF9EA32E358DCA63E1CA940EE9984AD1C9CC3264A0DA2FF9495EA9026B " +"2019-07-20 02:40:01.753 UTC [gossip.election] waitForInterrupt -> DEBU 14f2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:01.759 UTC [msp] DeserializeIdentity -> DEBU 14f3 Obtaining identity" +"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" +"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" +"2019-07-20 02:40:01.760 UTC [msp] DeserializeIdentity -> DEBU 14f6 Obtaining identity" +"2019-07-20 02:40:01.761 UTC [gossip.comm] Send -> DEBU 14f7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f8 Obtaining identity" +"2019-07-20 02:40:01.762 UTC [msp] DeserializeIdentity -> DEBU 14f9 Obtaining identity" +"2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:01.762 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Exiting" +"2019-07-20 02:40:01.918 UTC [gossip.comm] func1 -> DEBU 14fc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.918 UTC [gossip.gossip] handleMessage -> DEBU 14fe Exiting" +"2019-07-20 02:40:01.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1500 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:01.918 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:01.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:01.919 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:01.919 UTC [cauthdsl] func1 -> DEBU 1508 0xc0029ef890 gate 1563590401919773100 evaluation starts" +"2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 1509 0xc0029ef890 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:01.919 UTC [cauthdsl] func2 -> DEBU 150a 0xc0029ef890 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150b 0xc0029ef890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 150c 0xc0029ef890 principal evaluation fails" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 150d 0xc0029ef890 gate 1563590401919773100 evaluation fails" +"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 150f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1511 0xc0032980d0 gate 1563590401920244600 evaluation starts" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1512 0xc0032980d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1513 0xc0032980d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1514 0xc0032980d0 principal matched by identity 0" +"2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1515 Verify: digest = 00000000 01 6e a2 f4 56 9e 32 2d 9f 4d 9e 02 c5 6d e9 28 |.n..V.2-.M...m.(| +00000010 82 4c 1a 7d a9 37 3b a0 a1 d0 24 8e 58 10 7e 72 |.L.}.7;...$.X.~r|" +"2019-07-20 02:40:01.920 UTC [msp.identity] Verify -> DEBU 1516 Verify: sig = 00000000 30 45 02 21 00 ae 66 68 23 a1 f5 68 b8 52 0a 95 |0E.!..fh#..h.R..| +00000010 38 01 2f 29 74 0a ec cf 66 5c b3 e2 e4 4a 07 b6 |8./)t...f\...J..| +00000020 83 43 09 a6 8b 02 20 24 4b 00 91 b7 55 5a 4f fd |.C.... $K...UZO.| +00000030 b0 04 1f d7 42 9d 48 c6 53 0c 2e 60 c7 b9 42 8d |....B.H.S..`..B.| +00000040 60 b0 80 44 f4 c2 73 |`..D..s|" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func2 -> DEBU 1517 0xc0032980d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:01.920 UTC [cauthdsl] func1 -> DEBU 1518 0xc0032980d0 gate 1563590401920244600 evaluation succeeds" +"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 1519 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:01.920 UTC [policies] Evaluate -> DEBU 151a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:01.921 UTC [policies] Evaluate -> DEBU 151c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 151d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 151f updating membership: timestamp: " +"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1520 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1521 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 1522 Exiting" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 1523 Exiting" +"2019-07-20 02:40:01.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1524 Exiting" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1525 Obtaining identity" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1526 Obtaining identity" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1527 Obtaining identity" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 1529 Obtaining identity" +"2019-07-20 02:40:01.922 UTC [msp] DeserializeIdentity -> DEBU 152a Obtaining identity" +"2019-07-20 02:40:01.922 UTC [gossip.comm] Send -> DEBU 152b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152c Obtaining identity" +"2019-07-20 02:40:01.923 UTC [msp] DeserializeIdentity -> DEBU 152d Obtaining identity" +"2019-07-20 02:40:01.923 UTC [gossip.comm] Send -> DEBU 152e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 152f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1530 Exiting" +"2019-07-20 02:40:01.923 UTC [gossip.comm] sendToEndpoint -> DEBU 1531 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.924 UTC [gossip.comm] sendToEndpoint -> DEBU 1532 Exiting" +"2019-07-20 02:40:01.927 UTC [gossip.comm] func1 -> DEBU 1533 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1534 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.928 UTC [gossip.gossip] handleMessage -> DEBU 1535 Exiting" +"2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1536 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1537 Exiting" +"2019-07-20 02:40:01.929 UTC [gossip.comm] func1 -> DEBU 1538 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 1539 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.929 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" +"2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:01.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 153c Exiting" +"2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 153d Obtaining default signing identity" +"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151017 " +"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 153f Sign: digest: 52DA398D25C6952AA335AE471E2837386B978F542632A147D2426BCCA07AF961 " +"2019-07-20 02:40:02.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1540 Obtaining default signing identity" +"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1541 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:02.233 UTC [msp.identity] Sign -> DEBU 1542 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:02.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1543 Sleeping 5s" +"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1544 Obtaining identity" +"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1545 Obtaining identity" +"2019-07-20 02:40:02.242 UTC [msp] DeserializeIdentity -> DEBU 1546 Obtaining identity" +"2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 1547 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:02.243 UTC [msp] DeserializeIdentity -> DEBU 1548 Obtaining identity" +"2019-07-20 02:40:02.243 UTC [gossip.comm] Send -> DEBU 154a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:02.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1549 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154c Exiting" +"2019-07-20 02:40:02.244 UTC [gossip.comm] Send -> DEBU 154b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.244 UTC [gossip.comm] sendToEndpoint -> DEBU 154e Exiting" +"2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 154f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1550 Exiting" +"2019-07-20 02:40:02.364 UTC [gossip.comm] func1 -> DEBU 1551 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.364 UTC [gossip.gossip] handleMessage -> DEBU 1552 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.365 UTC [gossip.gossip] handleMessage -> DEBU 1553 Exiting" +"2019-07-20 02:40:02.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1554 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1555 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1556 Verify: digest = 00000000 12 ed 66 37 d8 7d 6d 4a af f4 3b c5 b5 74 a3 82 |..f7.}mJ..;..t..| +00000010 a4 55 75 f0 db 21 d1 0a 5c ed 2f 80 93 fb 4d 92 |.Uu..!..\./...M.|" +"2019-07-20 02:40:02.365 UTC [msp.identity] Verify -> DEBU 1557 Verify: sig = 00000000 30 44 02 20 55 29 6a d6 d7 c4 9a 7a 22 63 cb 7c |0D. U)j....z"c.|| +00000010 4c 8e 6a 15 40 46 b6 56 87 cb 42 22 ef 19 fa 5d |L.j.@F.V..B"...]| +00000020 ec a2 10 6b 02 20 32 94 4a 8d f1 90 5b e8 6c 72 |...k. 2.J...[.lr| +00000030 18 3b 32 78 3d db e9 e2 44 4c 4c bc 78 f0 f3 4d |.;2x=...DLL.x..M| +00000040 a4 ba 04 56 60 f2 |...V`.|" +"2019-07-20 02:40:02.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 1558 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 1559 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155a updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:02.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 155b Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155c Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:02.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 155d Exiting" +"2019-07-20 02:40:02.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 155e Exiting" +"2019-07-20 02:40:02.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 155f Exiting" +"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1560 Obtaining identity" +"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1561 Obtaining identity" +"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1562 Obtaining identity" +"2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1563 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:02.372 UTC [msp] DeserializeIdentity -> DEBU 1564 Obtaining identity" +"2019-07-20 02:40:02.372 UTC [gossip.comm] Send -> DEBU 1565 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1566 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1567 Exiting" +"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1568 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1569 Exiting" +"2019-07-20 02:40:02.375 UTC [gossip.comm] func1 -> DEBU 156a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.375 UTC [gossip.gossip] handleMessage -> DEBU 156c Exiting" +"2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156e Exiting" +"2019-07-20 02:40:02.376 UTC [gossip.comm] func1 -> DEBU 156f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1570 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.376 UTC [gossip.gossip] handleMessage -> DEBU 1571 Exiting" +"2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1572 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:02.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1573 Exiting" +"2019-07-20 02:40:02.547 UTC [gossip.comm] func1 -> DEBU 1574 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1575 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.547 UTC [gossip.gossip] handleMessage -> DEBU 1576 Exiting" +"2019-07-20 02:40:02.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1577 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1578 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:02.547 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" +"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:02.547 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:02.547 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:02.547 UTC [cauthdsl] func1 -> DEBU 1580 0xc00350b830 gate 1563590402547835300 evaluation starts" +"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1581 0xc00350b830 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1582 0xc00350b830 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1583 0xc00350b830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:02.547 UTC [cauthdsl] func2 -> DEBU 1584 0xc00350b830 principal evaluation fails" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1585 0xc00350b830 gate 1563590402547835300 evaluation fails" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1589 0xc0036da070 gate 1563590402548125100 evaluation starts" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158a 0xc0036da070 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158b 0xc0036da070 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158c 0xc0036da070 principal matched by identity 0" +"2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 d6 76 c2 ed a9 5d aa 5d 9f 67 c5 7e 78 4f be 32 |.v...].].g.~xO.2| +00000010 55 06 f7 08 6d fc ce 81 17 8b 24 37 0e 6a 35 2b |U...m.....$7.j5+|" +"2019-07-20 02:40:02.548 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 87 a0 1c 2d c8 14 12 6c 23 2e fb |0E.!....-...l#..| +00000010 88 f7 be 3d b8 e4 ce df 25 55 26 31 97 5b 85 91 |...=....%U&1.[..| +00000020 8d 2c 57 61 ee 02 20 72 cc c4 a2 95 38 a3 ca d1 |.,Wa.. r....8...| +00000030 df c2 50 9d 3b 01 f7 f3 9f 82 90 1a 72 57 89 80 |..P.;.......rW..| +00000040 24 92 e5 d3 b9 72 a6 |$....r.|" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func2 -> DEBU 158f 0xc0036da070 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:02.548 UTC [cauthdsl] func1 -> DEBU 1590 0xc0036da070 gate 1563590402548125100 evaluation succeeds" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:02.548 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1595 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1596 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1597 updating membership: timestamp: " +"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1598 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1599 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 159a Exiting" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 159b Exiting" +"2019-07-20 02:40:02.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 159c Exiting" +"2019-07-20 02:40:02.555 UTC [msp] DeserializeIdentity -> DEBU 159d Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159e Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 159f Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a0 Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" +"2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a4 Obtaining identity" +"2019-07-20 02:40:02.556 UTC [msp] DeserializeIdentity -> DEBU 15a5 Obtaining identity" +"2019-07-20 02:40:02.556 UTC [gossip.comm] Send -> DEBU 15a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a8 Exiting" +"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15a9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.556 UTC [gossip.comm] sendToEndpoint -> DEBU 15aa Exiting" +"2019-07-20 02:40:02.558 UTC [gossip.comm] func1 -> DEBU 15ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ac Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.558 UTC [gossip.gossip] handleMessage -> DEBU 15ad Exiting" +"2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15af Exiting" +"2019-07-20 02:40:02.559 UTC [gossip.comm] func1 -> DEBU 15b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.559 UTC [gossip.gossip] handleMessage -> DEBU 15b2 Exiting" +"2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:02.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b4 Exiting" +"2019-07-20 02:40:03.914 UTC [gossip.comm] func1 -> DEBU 15b5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.914 UTC [gossip.gossip] handleMessage -> DEBU 15b6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.915 UTC [gossip.gossip] handleMessage -> DEBU 15b7 Exiting" +"2019-07-20 02:40:03.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 15b9 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:03.917 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" +"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:03.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:03.917 UTC [policies] Evaluate -> DEBU 15c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:03.917 UTC [cauthdsl] func1 -> DEBU 15c1 0xc0037e93a0 gate 1563590403917788500 evaluation starts" +"2019-07-20 02:40:03.917 UTC [cauthdsl] func2 -> DEBU 15c2 0xc0037e93a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c3 0xc0037e93a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c4 0xc0037e93a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15c5 0xc0037e93a0 principal evaluation fails" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15c6 0xc0037e93a0 gate 1563590403917788500 evaluation fails" +"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:03.918 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func1 -> DEBU 15ca 0xc0037e9be0 gate 1563590403918507600 evaluation starts" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cb 0xc0037e9be0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cc 0xc0037e9be0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:03.918 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0037e9be0 principal matched by identity 0" +"2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15ce Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| +00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" +"2019-07-20 02:40:03.918 UTC [msp.identity] Verify -> DEBU 15cf Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| +00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| +00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| +00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| +00000040 c0 28 b6 d6 5d 37 |.(..]7|" +"2019-07-20 02:40:03.919 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0037e9be0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:03.919 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0037e9be0 gate 1563590403918507600 evaluation succeeds" +"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:03.919 UTC [policies] Evaluate -> DEBU 15d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d8 updating membership: timestamp: " +"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d9 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15da Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 15db Exiting" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 15dc Exiting" +"2019-07-20 02:40:03.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 15dd Exiting" +"2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15de Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15df Obtaining identity" +"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e0 Obtaining identity" +"2019-07-20 02:40:03.920 UTC [msp] DeserializeIdentity -> DEBU 15e1 Obtaining identity" +"2019-07-20 02:40:03.920 UTC [gossip.comm] Send -> DEBU 15e2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:03.920 UTC [gossip.discovery] sendMemResponse -> DEBU 15e3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\033" signature:"0D\002 U)j\326\327\304\232z\"c\313|L\216j\025@F\266V\207\313B\"\357\031\372]\354\242\020k\002 2\224J\215\361\220[\350lr\030;2x=\333\351\342DLL\274x\360\363M\244\272\004V`\362" > alive: alive: alive: " +"2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.920 UTC [gossip.comm] sendToEndpoint -> DEBU 15e5 Exiting" +"2019-07-20 02:40:03.923 UTC [gossip.comm] func1 -> DEBU 15e6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.923 UTC [gossip.gossip] handleMessage -> DEBU 15e7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.923 UTC [gossip.pull] HandleMessage -> DEBU 15e8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15e9 Obtaining identity" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ea Obtaining identity" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15eb Obtaining identity" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ec Obtaining identity" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ed Obtaining identity" +"2019-07-20 02:40:03.923 UTC [msp] DeserializeIdentity -> DEBU 15ee Obtaining identity" +"2019-07-20 02:40:03.924 UTC [gossip.pull] SendDigest -> DEBU 15ef Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:03.924 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Exiting" +"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.241 UTC [gossip.pull] Hello -> DEBU 15f5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:04.241 UTC [gossip.comm] Send -> DEBU 15f6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.241 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Exiting" +"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Exiting" +"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.242 UTC [gossip.comm] sendToEndpoint -> DEBU 15fc Exiting" +"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.243 UTC [gossip.gossip] handleMessage -> DEBU 1600 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15fe Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.243 UTC [gossip.comm] func1 -> DEBU 15ff Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.244 UTC [gossip.pull] HandleMessage -> DEBU 1601 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" +"2019-07-20 02:40:04.244 UTC [gossip.gossip] handleMessage -> DEBU 1603 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.245 UTC [gossip.pull] HandleMessage -> DEBU 1604 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1605 Exiting" +"2019-07-20 02:40:04.245 UTC [gossip.gossip] handleMessage -> DEBU 1606 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.246 UTC [gossip.pull] HandleMessage -> DEBU 1607 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.246 UTC [gossip.gossip] handleMessage -> DEBU 1608 Exiting" +"2019-07-20 02:40:04.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 1609 Obtaining default signing identity" +"2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151018 " +"2019-07-20 02:40:04.277 UTC [msp.identity] Sign -> DEBU 160b Sign: digest: 93D1F13605203EFCFEF67678C6420F3747E27FD1936093D97526EA62CD9AE28D " +"2019-07-20 02:40:04.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 160c Obtaining default signing identity" +"2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:04.278 UTC [msp.identity] Sign -> DEBU 160e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 160f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1610 Obtaining identity" +"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1611 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.278 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" +"2019-07-20 02:40:04.278 UTC [gossip.comm] Send -> DEBU 1613 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1614 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1615 Exiting" +"2019-07-20 02:40:04.278 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.279 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" +"2019-07-20 02:40:04.280 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.280 UTC [gossip.gossip] handleMessage -> DEBU 161a Exiting" +"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 161b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 161c Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161d Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +"2019-07-20 02:40:04.280 UTC [msp.identity] Verify -> DEBU 161e Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +00000040 5a b2 a9 7e 27 67 |Z..~'g|" +"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 161f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.280 UTC [gossip.discovery] isSentByMe -> DEBU 1620 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.280 UTC [gossip.discovery] handleAliveMessage -> DEBU 1621 Exiting" +"2019-07-20 02:40:04.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1622 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:04.281 UTC [msp] DeserializeIdentity -> DEBU 1623 Obtaining identity" +"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1625 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1626 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1627 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1628 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1629 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162a 0xc003e0ba00 gate 1563590404281511600 evaluation starts" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162b 0xc003e0ba00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162c 0xc003e0ba00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162d 0xc003e0ba00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 162e 0xc003e0ba00 principal evaluation fails" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 162f 0xc003e0ba00 gate 1563590404281511600 evaluation fails" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1630 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1631 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.281 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func1 -> DEBU 1633 0xc003f84240 gate 1563590404281840000 evaluation starts" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1634 0xc003f84240 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.281 UTC [cauthdsl] func2 -> DEBU 1635 0xc003f84240 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1636 0xc003f84240 principal matched by identity 0" +"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1637 Verify: digest = 00000000 ed a0 7b e2 02 8d a0 60 77 b3 ce d9 25 9a 9d d4 |..{....`w...%...| +00000010 32 a9 ef 45 4b 8b 7e 60 4b 2e 88 d0 60 61 03 e7 |2..EK.~`K...`a..|" +"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1638 Verify: sig = 00000000 30 44 02 20 10 4d 8a 1f 60 6a ea e7 59 27 ed 41 |0D. .M..`j..Y'.A| +00000010 bf f4 aa 38 be 45 c1 ed 3b 4a a8 9f 92 b9 67 be |...8.E..;J....g.| +00000020 61 f6 03 e2 02 20 10 ad 2c 33 b8 fc c5 66 15 11 |a.... ..,3...f..| +00000030 6c 82 24 9d 85 fd 69 01 6d 9c 26 b5 f1 a5 d3 1d |l.$...i.m.&.....| +00000040 c0 28 b6 d6 5d 37 |.(..]7|" +"2019-07-20 02:40:04.282 UTC [cauthdsl] func2 -> DEBU 1639 0xc003f84240 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.282 UTC [cauthdsl] func1 -> DEBU 163a 0xc003f84240 gate 1563590404281840000 evaluation succeeds" +"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.282 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 163f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1640 Exiting" +"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1641 Exiting" +"2019-07-20 02:40:04.282 UTC [gossip.comm] func1 -> DEBU 1642 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1643 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.282 UTC [gossip.gossip] handleMessage -> DEBU 1644 Exiting" +"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1646 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1647 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +"2019-07-20 02:40:04.282 UTC [msp.identity] Verify -> DEBU 1648 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +00000040 5a b2 a9 7e 27 67 |Z..~'g|" +"2019-07-20 02:40:04.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 1649 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.283 UTC [gossip.discovery] isSentByMe -> DEBU 164a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 164b Exiting" +"2019-07-20 02:40:04.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164c Exiting" +"2019-07-20 02:40:04.280 UTC [gossip.comm] sendToEndpoint -> DEBU 164d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.284 UTC [gossip.comm] sendToEndpoint -> DEBU 164e Exiting" +"2019-07-20 02:40:04.286 UTC [gossip.comm] func1 -> DEBU 164f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1650 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.286 UTC [gossip.gossip] handleMessage -> DEBU 1651 Exiting" +"2019-07-20 02:40:04.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1652 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1653 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1654 Verify: digest = 00000000 93 d1 f1 36 05 20 3e fc fe f6 76 78 c6 42 0f 37 |...6. >...vx.B.7| +00000010 47 e2 7f d1 93 60 93 d9 75 26 ea 62 cd 9a e2 8d |G....`..u&.b....|" +"2019-07-20 02:40:04.286 UTC [msp.identity] Verify -> DEBU 1655 Verify: sig = 00000000 30 44 02 20 6d dc fe 70 87 cd db fb 65 9c b2 b9 |0D. m..p....e...| +00000010 cd 5a a6 d3 5e fb f5 7b 0c 8e d2 9b 98 23 b0 a4 |.Z..^..{.....#..| +00000020 27 37 6f 88 02 20 78 17 94 e6 92 e2 09 51 20 a4 |'7o.. x......Q .| +00000030 43 a9 69 74 bd 90 47 9c 08 d3 cf c3 09 82 12 1e |C.it..G.........| +00000040 5a b2 a9 7e 27 67 |Z..~'g|" +"2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1656 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:04.287 UTC [msp.identity] Verify -> DEBU 1657 Verify: sig = 00000000 30 45 02 21 00 c1 8e d2 c4 0a a7 e6 72 3d a6 38 |0E.!........r=.8| +00000010 0f ed 4d f7 c8 ec bd 0a 7f 2d 0e 1f 54 d9 70 6e |..M......-..T.pn| +00000020 76 b4 c6 ca 9b 02 20 0d c8 ac 59 5e 61 b8 a8 d2 |v..... ...Y^a...| +00000030 d5 11 5d f8 4a c1 95 66 ba 70 72 58 ce 1d 8c 1e |..].J..f.prX....| +00000040 26 8a bc 78 94 f0 33 |&..x..3|" +"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 1658 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:04.287 UTC [gossip.discovery] isSentByMe -> DEBU 1659 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 165a Exiting" +"2019-07-20 02:40:04.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 165b Exiting" +"2019-07-20 02:40:04.362 UTC [gossip.comm] func1 -> DEBU 165c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 165d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.362 UTC [gossip.pull] HandleMessage -> DEBU 165e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.362 UTC [gossip.pull] SendDigest -> DEBU 165f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:04.362 UTC [gossip.gossip] handleMessage -> DEBU 1660 Exiting" +"2019-07-20 02:40:04.363 UTC [gossip.comm] func1 -> DEBU 1661 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.364 UTC [gossip.gossip] handleMessage -> DEBU 1662 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.365 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" +"2019-07-20 02:40:04.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1664 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1665 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:04.366 UTC [msp.identity] Verify -> DEBU 1666 Verify: digest = 00000000 30 9c 61 33 0d 39 d2 88 0b 7d 64 96 99 e0 6f 00 |0.a3.9...}d...o.| +00000010 a6 8d 29 70 ab 8e a8 ef d6 2f d8 b6 8b 78 a4 ac |..)p...../...x..|" +"2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1667 Verify: sig = 00000000 30 44 02 20 66 67 dc 1d 84 59 fd 04 16 c6 d1 2a |0D. fg...Y.....*| +00000010 56 a8 c8 ec f2 6b 9d f0 c1 44 a3 35 1f 7e be 31 |V....k...D.5.~.1| +00000020 87 c0 51 9c 02 20 69 67 b6 4d 54 b7 80 c8 00 48 |..Q.. ig.MT....H| +00000030 87 18 f4 2a 54 93 fb cf a2 9d 1d ee a2 47 cd 75 |...*T........G.u| +00000040 d7 40 36 01 9e 5d |.@6..]|" +"2019-07-20 02:40:04.367 UTC [msp.identity] Verify -> DEBU 1668 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:04.369 UTC [msp.identity] Verify -> DEBU 1669 Verify: sig = 00000000 30 45 02 21 00 d7 a7 57 78 82 88 75 6e 35 1a 0b |0E.!...Wx..un5..| +00000010 ce 35 8a 83 35 96 a8 d0 ca f2 f0 70 9f 21 0b 28 |.5..5......p.!.(| +00000020 03 ca 0b 36 18 02 20 61 8a 8b 77 39 f4 77 9c 86 |...6.. a..w9.w..| +00000030 09 f2 3c a7 e0 5f 73 56 4c 38 99 d1 b7 25 d0 6a |..<.._sVL8...%.j| +00000040 93 11 2e 59 e1 fa e1 |...Y...|" +"2019-07-20 02:40:04.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 166a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:04.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 166c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:04.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 166f Exiting" +"2019-07-20 02:40:04.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 1670 Exiting" +"2019-07-20 02:40:04.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1671 Exiting" +"2019-07-20 02:40:04.372 UTC [gossip.discovery] sendMemResponse -> DEBU 1672 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1673 Obtaining identity" +"2019-07-20 02:40:04.372 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" +"2019-07-20 02:40:04.373 UTC [gossip.comm] Send -> DEBU 1675 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.373 UTC [gossip.discovery] sendMemResponse -> DEBU 1676 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" secret_envelope: > alive: " +"2019-07-20 02:40:04.373 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.374 UTC [gossip.comm] sendToEndpoint -> DEBU 1678 Exiting" +"2019-07-20 02:40:04.542 UTC [gossip.comm] func1 -> DEBU 1679 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 167a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.542 UTC [gossip.pull] HandleMessage -> DEBU 167b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167c Obtaining identity" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167d Obtaining identity" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167e Obtaining identity" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 167f Obtaining identity" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1680 Obtaining identity" +"2019-07-20 02:40:04.542 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" +"2019-07-20 02:40:04.542 UTC [gossip.pull] SendDigest -> DEBU 1682 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:04.542 UTC [gossip.gossip] handleMessage -> DEBU 1683 Exiting" +"2019-07-20 02:40:04.547 UTC [gossip.comm] func1 -> DEBU 1684 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1685 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.548 UTC [gossip.gossip] handleMessage -> DEBU 1686 Exiting" +"2019-07-20 02:40:04.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1687 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1688 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:04.549 UTC [msp] DeserializeIdentity -> DEBU 1689 Obtaining identity" +"2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 168a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.550 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 168c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.550 UTC [policies] Evaluate -> DEBU 168e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.551 UTC [policies] Evaluate -> DEBU 168f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.551 UTC [cauthdsl] func1 -> DEBU 1690 0xc0030b0240 gate 1563590404551482900 evaluation starts" +"2019-07-20 02:40:04.551 UTC [cauthdsl] func2 -> DEBU 1691 0xc0030b0240 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1692 0xc0030b0240 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1693 0xc0030b0240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.552 UTC [cauthdsl] func2 -> DEBU 1694 0xc0030b0240 principal evaluation fails" +"2019-07-20 02:40:04.552 UTC [cauthdsl] func1 -> DEBU 1695 0xc0030b0240 gate 1563590404551482900 evaluation fails" +"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1696 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1697 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.553 UTC [policies] Evaluate -> DEBU 1698 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.553 UTC [cauthdsl] func1 -> DEBU 1699 0xc0030b0a80 gate 1563590404553822100 evaluation starts" +"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169a 0xc0030b0a80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169b 0xc0030b0a80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.554 UTC [cauthdsl] func2 -> DEBU 169c 0xc0030b0a80 principal matched by identity 0" +"2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169d Verify: digest = 00000000 9a 13 10 4b 51 eb b5 b0 d6 3e 7e d2 f8 2c 85 f6 |...KQ....>~..,..| +00000010 c2 e2 82 51 f4 47 c9 85 c8 16 41 f8 c6 cf 4f 52 |...Q.G....A...OR|" +"2019-07-20 02:40:04.555 UTC [msp.identity] Verify -> DEBU 169e Verify: sig = 00000000 30 44 02 20 49 d9 c5 d5 a7 f6 d5 1c ea ec 58 44 |0D. I.........XD| +00000010 d8 21 7c 49 ea cc ab d9 3d 7b 34 06 c3 87 6f e9 |.!|I....={4...o.| +00000020 a7 24 6a 4d 02 20 7e e0 73 cb 60 73 7b 79 03 58 |.$jM. ~.s.`s{y.X| +00000030 b7 8d fd d8 62 61 30 cb 2d d1 76 bb 03 a6 27 77 |....ba0.-.v...'w| +00000040 ea 97 9e 04 9f af |......|" +"2019-07-20 02:40:04.556 UTC [cauthdsl] func2 -> DEBU 169f 0xc0030b0a80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.556 UTC [cauthdsl] func1 -> DEBU 16a0 0xc0030b0a80 gate 1563590404553822100 evaluation succeeds" +"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.556 UTC [policies] Evaluate -> DEBU 16a3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.557 UTC [policies] Evaluate -> DEBU 16a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.557 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:04.557 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a7 updating membership: timestamp: " +"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a8 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16a9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:04.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 16aa Exiting" +"2019-07-20 02:40:04.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ab Exiting" +"2019-07-20 02:40:04.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16ac Exiting" +"2019-07-20 02:40:04.559 UTC [gossip.discovery] sendMemResponse -> DEBU 16ad Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:04.559 UTC [msp] DeserializeIdentity -> DEBU 16ae Obtaining identity" +"2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16af Obtaining identity" +"2019-07-20 02:40:04.560 UTC [msp] DeserializeIdentity -> DEBU 16b0 Obtaining identity" +"2019-07-20 02:40:04.560 UTC [gossip.comm] Send -> DEBU 16b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.560 UTC [gossip.discovery] sendMemResponse -> DEBU 16b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\034" signature:"0D\002 fg\334\035\204Y\375\004\026\306\321*V\250\310\354\362k\235\360\301D\2435\037~\2761\207\300Q\234\002 ig\266MT\267\200\310\000H\207\030\364*T\223\373\317\242\235\035\356\242G\315u\327@6\001\236]" > alive: alive: alive: " +"2019-07-20 02:40:04.560 UTC [gossip.comm] sendToEndpoint -> DEBU 16b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.561 UTC [gossip.comm] sendToEndpoint -> DEBU 16b4 Exiting" +"2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b5 Obtaining identity" +"2019-07-20 02:40:04.718 UTC [msp] DeserializeIdentity -> DEBU 16b6 Obtaining identity" +"2019-07-20 02:40:04.718 UTC [gossip.comm] Send -> DEBU 16b7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16ba Exiting" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bc Exiting" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16b8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.718 UTC [gossip.comm] sendToEndpoint -> DEBU 16bd Exiting" +"2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16be Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.720 UTC [gossip.gossip] handleMessage -> DEBU 16c0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.720 UTC [msp] DeserializeIdentity -> DEBU 16c2 Obtaining identity" +"2019-07-20 02:40:04.720 UTC [gossip.comm] func1 -> DEBU 16c1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.719 UTC [gossip.comm] func1 -> DEBU 16bf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c3 Obtaining identity" +"2019-07-20 02:40:04.721 UTC [msp] DeserializeIdentity -> DEBU 16c4 Obtaining identity" +"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16c7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.722 UTC [policies] Evaluate -> DEBU 16c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.723 UTC [policies] Evaluate -> DEBU 16ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.723 UTC [cauthdsl] func1 -> DEBU 16cb 0xc00333b930 gate 1563590404723377000 evaluation starts" +"2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cc 0xc00333b930 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.726 UTC [cauthdsl] func2 -> DEBU 16cd 0xc00333b930 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16ce 0xc00333b930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.727 UTC [cauthdsl] func2 -> DEBU 16cf 0xc00333b930 principal evaluation fails" +"2019-07-20 02:40:04.728 UTC [cauthdsl] func1 -> DEBU 16d0 0xc00333b930 gate 1563590404723377000 evaluation fails" +"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.728 UTC [policies] Evaluate -> DEBU 16d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.729 UTC [cauthdsl] func1 -> DEBU 16d4 0xc0033ec170 gate 1563590404729020200 evaluation starts" +"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d5 0xc0033ec170 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0033ec170 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.729 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0033ec170 principal matched by identity 0" +"2019-07-20 02:40:04.729 UTC [msp.identity] Verify -> DEBU 16d8 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:04.730 UTC [msp.identity] Verify -> DEBU 16d9 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:04.730 UTC [cauthdsl] func2 -> DEBU 16da 0xc0033ec170 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.730 UTC [cauthdsl] func1 -> DEBU 16db 0xc0033ec170 gate 1563590404729020200 evaluation succeeds" +"2019-07-20 02:40:04.730 UTC [policies] Evaluate -> DEBU 16dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16de Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.731 UTC [policies] Evaluate -> DEBU 16df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e0 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:04.732 UTC [msp.identity] Verify -> DEBU 16e1 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e2 Obtaining identity" +"2019-07-20 02:40:04.733 UTC [msp] DeserializeIdentity -> DEBU 16e3 Obtaining identity" +"2019-07-20 02:40:04.733 UTC [gossip.pull] Hello -> DEBU 16e4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e5 Obtaining identity" +"2019-07-20 02:40:04.734 UTC [msp] DeserializeIdentity -> DEBU 16e6 Obtaining identity" +"2019-07-20 02:40:04.734 UTC [gossip.comm] Send -> DEBU 16e7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.734 UTC [gossip.comm] sendToEndpoint -> DEBU 16e9 Exiting" +"2019-07-20 02:40:04.735 UTC [gossip.comm] func1 -> DEBU 16ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.735 UTC [msp.identity] Verify -> DEBU 16eb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:04.736 UTC [msp.identity] Verify -> DEBU 16ec Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:04.737 UTC [msp] DeserializeIdentity -> DEBU 16ed Obtaining identity" +"2019-07-20 02:40:04.738 UTC [msp] DeserializeIdentity -> DEBU 16ee Obtaining identity" +"2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.739 UTC [policies] Evaluate -> DEBU 16f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.740 UTC [policies] Evaluate -> DEBU 16f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.741 UTC [cauthdsl] func1 -> DEBU 16f5 0xc003976780 gate 1563590404741004700 evaluation starts" +"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f6 0xc003976780 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f7 0xc003976780 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.741 UTC [cauthdsl] func2 -> DEBU 16f8 0xc003976780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.742 UTC [cauthdsl] func2 -> DEBU 16f9 0xc003976780 principal evaluation fails" +"2019-07-20 02:40:04.742 UTC [cauthdsl] func1 -> DEBU 16fa 0xc003976780 gate 1563590404741004700 evaluation fails" +"2019-07-20 02:40:04.742 UTC [policies] Evaluate -> DEBU 16fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.743 UTC [policies] Evaluate -> DEBU 16fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.744 UTC [cauthdsl] func1 -> DEBU 16fe 0xc003976fc0 gate 1563590404743984100 evaluation starts" +"2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 16ff 0xc003976fc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.744 UTC [cauthdsl] func2 -> DEBU 1700 0xc003976fc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.745 UTC [cauthdsl] func2 -> DEBU 1701 0xc003976fc0 principal matched by identity 0" +"2019-07-20 02:40:04.745 UTC [msp.identity] Verify -> DEBU 1702 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:04.746 UTC [msp.identity] Verify -> DEBU 1703 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:04.747 UTC [cauthdsl] func2 -> DEBU 1704 0xc003976fc0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.747 UTC [cauthdsl] func1 -> DEBU 1705 0xc003976fc0 gate 1563590404743984100 evaluation succeeds" +"2019-07-20 02:40:04.747 UTC [policies] Evaluate -> DEBU 1706 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1708 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.748 UTC [policies] Evaluate -> DEBU 1709 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.748 UTC [gossip.gossip] handleMessage -> DEBU 170a Exiting" +"2019-07-20 02:40:04.749 UTC [gossip.gossip] handleMessage -> DEBU 170b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" +"2019-07-20 02:40:04.749 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +"2019-07-20 02:40:04.750 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +"2019-07-20 02:40:04.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 170f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1711 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.753 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1713 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.754 UTC [policies] Evaluate -> DEBU 1714 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.754 UTC [cauthdsl] func1 -> DEBU 1715 0xc003a36ad0 gate 1563590404754449500 evaluation starts" +"2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1716 0xc003a36ad0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.754 UTC [cauthdsl] func2 -> DEBU 1717 0xc003a36ad0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1718 0xc003a36ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.755 UTC [cauthdsl] func2 -> DEBU 1719 0xc003a36ad0 principal evaluation fails" +"2019-07-20 02:40:04.755 UTC [cauthdsl] func1 -> DEBU 171a 0xc003a36ad0 gate 1563590404754449500 evaluation fails" +"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.755 UTC [policies] Evaluate -> DEBU 171d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.756 UTC [cauthdsl] func1 -> DEBU 171e 0xc003a37310 gate 1563590404756180200 evaluation starts" +"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 171f 0xc003a37310 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1720 0xc003a37310 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.756 UTC [cauthdsl] func2 -> DEBU 1721 0xc003a37310 principal matched by identity 0" +"2019-07-20 02:40:04.757 UTC [msp.identity] Verify -> DEBU 1722 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:04.758 UTC [msp.identity] Verify -> DEBU 1723 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:04.758 UTC [cauthdsl] func2 -> DEBU 1724 0xc003a37310 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.758 UTC [cauthdsl] func1 -> DEBU 1725 0xc003a37310 gate 1563590404756180200 evaluation succeeds" +"2019-07-20 02:40:04.758 UTC [policies] Evaluate -> DEBU 1726 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1727 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1728 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.759 UTC [policies] Evaluate -> DEBU 1729 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172a Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:04.759 UTC [msp.identity] Verify -> DEBU 172b Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172c Obtaining identity" +"2019-07-20 02:40:04.760 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" +"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 172e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 172f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1730 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1731 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.761 UTC [policies] Evaluate -> DEBU 1732 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.762 UTC [policies] Evaluate -> DEBU 1733 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.762 UTC [cauthdsl] func1 -> DEBU 1734 0xc003a81200 gate 1563590404762213800 evaluation starts" +"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1735 0xc003a81200 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1736 0xc003a81200 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.762 UTC [cauthdsl] func2 -> DEBU 1737 0xc003a81200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.763 UTC [cauthdsl] func2 -> DEBU 1738 0xc003a81200 principal evaluation fails" +"2019-07-20 02:40:04.763 UTC [cauthdsl] func1 -> DEBU 1739 0xc003a81200 gate 1563590404762213800 evaluation fails" +"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.763 UTC [policies] Evaluate -> DEBU 173c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.764 UTC [cauthdsl] func1 -> DEBU 173d 0xc003a81a40 gate 1563590404764229700 evaluation starts" +"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173e 0xc003a81a40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 173f 0xc003a81a40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.764 UTC [cauthdsl] func2 -> DEBU 1740 0xc003a81a40 principal matched by identity 0" +"2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1741 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:04.766 UTC [msp.identity] Verify -> DEBU 1742 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:04.766 UTC [cauthdsl] func2 -> DEBU 1743 0xc003a81a40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.767 UTC [cauthdsl] func1 -> DEBU 1744 0xc003a81a40 gate 1563590404764229700 evaluation succeeds" +"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1745 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1746 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1747 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.767 UTC [policies] Evaluate -> DEBU 1748 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.768 UTC [msp.identity] Verify -> DEBU 1749 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:04.769 UTC [msp.identity] Verify -> DEBU 174a Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174b Exiting" +"2019-07-20 02:40:04.769 UTC [gossip.gossip] handleMessage -> DEBU 174c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174d Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:04.770 UTC [msp.identity] Verify -> DEBU 174f Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:04.771 UTC [msp.identity] Verify -> DEBU 1750 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1751 Obtaining identity" +"2019-07-20 02:40:04.771 UTC [msp] DeserializeIdentity -> DEBU 1752 Obtaining identity" +"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1753 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1754 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1755 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.773 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.774 UTC [policies] Evaluate -> DEBU 1757 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.775 UTC [policies] Evaluate -> DEBU 1758 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.775 UTC [cauthdsl] func1 -> DEBU 1759 0xc003dfe9b0 gate 1563590404775612700 evaluation starts" +"2019-07-20 02:40:04.775 UTC [cauthdsl] func2 -> DEBU 175a 0xc003dfe9b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175b 0xc003dfe9b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175c 0xc003dfe9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.776 UTC [cauthdsl] func2 -> DEBU 175d 0xc003dfe9b0 principal evaluation fails" +"2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 175e 0xc003dfe9b0 gate 1563590404775612700 evaluation fails" +"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 175f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1760 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.777 UTC [policies] Evaluate -> DEBU 1761 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.777 UTC [cauthdsl] func1 -> DEBU 1762 0xc003dff1f0 gate 1563590404777929000 evaluation starts" +"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1763 0xc003dff1f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1764 0xc003dff1f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.778 UTC [cauthdsl] func2 -> DEBU 1765 0xc003dff1f0 principal matched by identity 0" +"2019-07-20 02:40:04.778 UTC [msp.identity] Verify -> DEBU 1766 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:04.779 UTC [msp.identity] Verify -> DEBU 1767 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:04.779 UTC [cauthdsl] func2 -> DEBU 1768 0xc003dff1f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.779 UTC [cauthdsl] func1 -> DEBU 1769 0xc003dff1f0 gate 1563590404777929000 evaluation succeeds" +"2019-07-20 02:40:04.779 UTC [policies] Evaluate -> DEBU 176a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.780 UTC [policies] Evaluate -> DEBU 176c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.781 UTC [policies] Evaluate -> DEBU 176d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +"2019-07-20 02:40:04.781 UTC [msp] DeserializeIdentity -> DEBU 176f Obtaining identity" +"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1771 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.782 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1772 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:04.782 UTC [policies] Evaluate -> DEBU 1775 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:04.783 UTC [cauthdsl] func1 -> DEBU 1776 0xc003f6e9c0 gate 1563590404783062200 evaluation starts" +"2019-07-20 02:40:04.783 UTC [cauthdsl] func2 -> DEBU 1777 0xc003f6e9c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1778 0xc003f6e9c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 1779 0xc003f6e9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:04.787 UTC [cauthdsl] func2 -> DEBU 177a 0xc003f6e9c0 principal evaluation fails" +"2019-07-20 02:40:04.787 UTC [cauthdsl] func1 -> DEBU 177b 0xc003f6e9c0 gate 1563590404783062200 evaluation fails" +"2019-07-20 02:40:04.787 UTC [policies] Evaluate -> DEBU 177c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:04.788 UTC [policies] Evaluate -> DEBU 177e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:04.788 UTC [cauthdsl] func1 -> DEBU 177f 0xc003f6f200 gate 1563590404788468000 evaluation starts" +"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1780 0xc003f6f200 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1781 0xc003f6f200 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:04.788 UTC [cauthdsl] func2 -> DEBU 1782 0xc003f6f200 principal matched by identity 0" +"2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1783 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:04.789 UTC [msp.identity] Verify -> DEBU 1784 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:04.789 UTC [cauthdsl] func2 -> DEBU 1785 0xc003f6f200 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:04.789 UTC [cauthdsl] func1 -> DEBU 1786 0xc003f6f200 gate 1563590404788468000 evaluation succeeds" +"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1787 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1788 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 1789 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:04.790 UTC [policies] Evaluate -> DEBU 178a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178b Exiting" +"2019-07-20 02:40:04.790 UTC [gossip.gossip] handleMessage -> DEBU 178c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.791 UTC [gossip.pull] HandleMessage -> DEBU 178d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.791 UTC [gossip.gossip] handleMessage -> DEBU 178e Exiting" +"2019-07-20 02:40:04.877 UTC [gossip.comm] func1 -> DEBU 178f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.877 UTC [gossip.gossip] handleMessage -> DEBU 1790 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.877 UTC [msp] DeserializeIdentity -> DEBU 1791 Obtaining identity" +"2019-07-20 02:40:04.878 UTC [msp] DeserializeIdentity -> DEBU 1792 Obtaining identity" +"2019-07-20 02:40:04.878 UTC [gossip.gossip] handleMessage -> DEBU 1793 Exiting" +"2019-07-20 02:40:04.895 UTC [gossip.comm] func1 -> DEBU 1794 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.895 UTC [gossip.gossip] handleMessage -> DEBU 1795 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.896 UTC [gossip.pull] HandleMessage -> DEBU 1796 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:04.896 UTC [gossip.pull] SendDigest -> DEBU 1797 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:04.896 UTC [gossip.gossip] handleMessage -> DEBU 1798 Exiting" +"2019-07-20 02:40:05.042 UTC [gossip.comm] func1 -> DEBU 1799 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:05.042 UTC [gossip.gossip] handleMessage -> DEBU 179a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179b Obtaining identity" +"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179c Obtaining identity" +"2019-07-20 02:40:05.042 UTC [msp] DeserializeIdentity -> DEBU 179d Obtaining identity" +"2019-07-20 02:40:05.043 UTC [gossip.gossip] handleMessage -> DEBU 179e Exiting" +"2019-07-20 02:40:05.182 UTC [gossip.comm] func1 -> DEBU 179f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:05.182 UTC [gossip.gossip] handleMessage -> DEBU 17a0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:05.182 UTC [msp] DeserializeIdentity -> DEBU 17a1 Obtaining identity" +"2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a2 Obtaining identity" +"2019-07-20 02:40:05.183 UTC [msp] DeserializeIdentity -> DEBU 17a3 Obtaining identity" +"2019-07-20 02:40:05.183 UTC [gossip.gossip] handleMessage -> DEBU 17a4 Exiting" +"2019-07-20 02:40:06.753 UTC [gossip.election] waitForInterrupt -> DEBU 17a5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:06.754 UTC [gossip.election] IsLeader -> DEBU 17a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:06.754 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a7 Obtaining default signing identity" +"2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510061801 " +"2019-07-20 02:40:06.755 UTC [msp.identity] Sign -> DEBU 17a9 Sign: digest: 0A2417D6F32F0145DB5A6AD97AF07578F0DC3B14FDE2F95001B604A62A4FEC0B " +"2019-07-20 02:40:06.756 UTC [gossip.election] waitForInterrupt -> DEBU 17aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ab Obtaining identity" +"2019-07-20 02:40:06.765 UTC [msp] DeserializeIdentity -> DEBU 17ac Obtaining identity" +"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ad Obtaining identity" +"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17ae Obtaining identity" +"2019-07-20 02:40:06.766 UTC [gossip.comm] Send -> DEBU 17af Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b0 Obtaining identity" +"2019-07-20 02:40:06.766 UTC [msp] DeserializeIdentity -> DEBU 17b1 Obtaining identity" +"2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.766 UTC [gossip.comm] sendToEndpoint -> DEBU 17b3 Exiting" +"2019-07-20 02:40:06.912 UTC [gossip.comm] func1 -> DEBU 17b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.913 UTC [gossip.gossip] handleMessage -> DEBU 17b6 Exiting" +"2019-07-20 02:40:06.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17b8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:06.913 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:06.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:06.913 UTC [policies] Evaluate -> DEBU 17bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c0 0xc00285b7b0 gate 1563590406916398500 evaluation starts" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c1 0xc00285b7b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c2 0xc00285b7b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c3 0xc00285b7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func2 -> DEBU 17c4 0xc00285b7b0 principal evaluation fails" +"2019-07-20 02:40:06.916 UTC [cauthdsl] func1 -> DEBU 17c5 0xc00285b7b0 gate 1563590406916398500 evaluation fails" +"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:06.917 UTC [policies] Evaluate -> DEBU 17c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:06.917 UTC [cauthdsl] func1 -> DEBU 17c9 0xc00285bff0 gate 1563590406917178300 evaluation starts" +"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17ca 0xc00285bff0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cb 0xc00285bff0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:06.917 UTC [cauthdsl] func2 -> DEBU 17cc 0xc00285bff0 principal matched by identity 0" +"2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17cd Verify: digest = 00000000 ab 03 83 d7 43 bb 1b 61 cb e1 88 ca 40 df 51 86 |....C..a....@.Q.| +00000010 59 ab 66 81 d9 42 04 49 40 b1 0d cc a6 19 ef 83 |Y.f..B.I@.......|" +"2019-07-20 02:40:06.917 UTC [msp.identity] Verify -> DEBU 17ce Verify: sig = 00000000 30 44 02 20 47 1b 2a a9 f8 00 a5 85 82 52 d9 32 |0D. G.*......R.2| +00000010 00 d7 35 a3 07 ab 35 92 0a 14 ed 05 56 99 32 2f |..5...5.....V.2/| +00000020 1a 0e 68 72 02 20 44 ca ce 45 de f0 b2 32 75 65 |..hr. D..E...2ue| +00000030 d3 aa 99 f7 5c f2 f4 64 d2 51 4b 03 8c 4d d3 a2 |....\..d.QK..M..| +00000040 e6 f9 a9 92 f0 a0 |......|" +"2019-07-20 02:40:06.918 UTC [cauthdsl] func2 -> DEBU 17cf 0xc00285bff0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:06.918 UTC [cauthdsl] func1 -> DEBU 17d0 0xc00285bff0 gate 1563590406917178300 evaluation succeeds" +"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:06.918 UTC [policies] Evaluate -> DEBU 17d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:06.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 17d5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d7 updating membership: timestamp: " +"2019-07-20 02:40:06.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d8 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17d9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:06.919 UTC [gossip.discovery] learnExistingMembers -> DEBU 17da Exiting" +"2019-07-20 02:40:06.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 17db Exiting" +"2019-07-20 02:40:06.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17dc Exiting" +"2019-07-20 02:40:06.923 UTC [gossip.comm] func1 -> DEBU 17dd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17de Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.923 UTC [gossip.gossip] handleMessage -> DEBU 17df Exiting" +"2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e1 Exiting" +"2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e2 Obtaining identity" +"2019-07-20 02:40:06.923 UTC [msp] DeserializeIdentity -> DEBU 17e3 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e4 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e5 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e7 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17e8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17e9 Obtaining identity" +"2019-07-20 02:40:06.924 UTC [msp] DeserializeIdentity -> DEBU 17ea Obtaining identity" +"2019-07-20 02:40:06.924 UTC [gossip.comm] Send -> DEBU 17eb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ed Exiting" +"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.925 UTC [gossip.comm] sendToEndpoint -> DEBU 17ef Exiting" +"2019-07-20 02:40:06.928 UTC [gossip.comm] func1 -> DEBU 17f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f1 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.929 UTC [gossip.gossip] handleMessage -> DEBU 17f2 Exiting" +"2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:06.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17f4 Exiting" +"2019-07-20 02:40:07.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f5 Obtaining default signing identity" +"2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151019 " +"2019-07-20 02:40:07.233 UTC [msp.identity] Sign -> DEBU 17f7 Sign: digest: A5E5D6E64F8F6C1FAA2BC3C99B4B9AF3B3BA328A9870DDA72718709F7712B546 " +"2019-07-20 02:40:07.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f8 Obtaining default signing identity" +"2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17f9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:07.234 UTC [msp.identity] Sign -> DEBU 17fa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:07.234 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17fb Sleeping 5s" +"2019-07-20 02:40:07.237 UTC [msp] DeserializeIdentity -> DEBU 17fc Obtaining identity" +"2019-07-20 02:40:07.238 UTC [msp] DeserializeIdentity -> DEBU 17fd Obtaining identity" +"2019-07-20 02:40:07.238 UTC [gossip.comm] Send -> DEBU 17fe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:07.239 UTC [msp] DeserializeIdentity -> DEBU 17ff Obtaining identity" +"2019-07-20 02:40:07.239 UTC [gossip.comm] Send -> DEBU 1801 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:07.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1800 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:07.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1802 Exiting" +"2019-07-20 02:40:07.240 UTC [msp] DeserializeIdentity -> DEBU 1803 Obtaining identity" +"2019-07-20 02:40:07.240 UTC [gossip.comm] Send -> DEBU 1804 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1805 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1806 Exiting" +"2019-07-20 02:40:07.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1807 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1808 Exiting" +"2019-07-20 02:40:07.365 UTC [gossip.comm] func1 -> DEBU 1809 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.365 UTC [gossip.gossip] handleMessage -> DEBU 180b Exiting" +"2019-07-20 02:40:07.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 180c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 180d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:07.365 UTC [msp.identity] Verify -> DEBU 180e Verify: digest = 00000000 2b 9e 49 fe 26 11 78 34 3b 01 7f 16 c9 58 7f 1e |+.I.&.x4;....X..| +00000010 3a 8e 0c 07 25 a0 b2 47 0a 25 8f d9 76 80 4b df |:...%..G.%..v.K.|" +"2019-07-20 02:40:07.366 UTC [msp.identity] Verify -> DEBU 180f Verify: sig = 00000000 30 44 02 20 68 82 53 1c d9 3b 2c 2e a0 79 ec 11 |0D. h.S..;,..y..| +00000010 ec 2f d5 58 98 b9 1f de 94 04 05 19 9e 95 f6 94 |./.X............| +00000020 3d b3 48 6e 02 20 19 5a 3d 37 bc 13 93 03 49 4b |=.Hn. .Z=7....IK| +00000030 e8 10 46 6b 7a f1 a2 2b 74 55 96 04 95 17 34 4b |..Fkz..+tU....4K| +00000040 e4 f9 7b ba 1c fa |..{...|" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1810 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1811 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1812 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1813 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1814 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 1815 Exiting" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 1816 Exiting" +"2019-07-20 02:40:07.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Exiting" +"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1818 Obtaining identity" +"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 1819 Obtaining identity" +"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181a Obtaining identity" +"2019-07-20 02:40:07.367 UTC [gossip.comm] Send -> DEBU 181b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:07.367 UTC [msp] DeserializeIdentity -> DEBU 181c Obtaining identity" +"2019-07-20 02:40:07.368 UTC [gossip.comm] Send -> DEBU 181d Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 181f Exiting" +"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1820 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.368 UTC [gossip.comm] sendToEndpoint -> DEBU 1821 Exiting" +"2019-07-20 02:40:07.369 UTC [gossip.comm] func1 -> DEBU 1822 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.369 UTC [gossip.gossip] handleMessage -> DEBU 1823 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.370 UTC [gossip.gossip] handleMessage -> DEBU 1824 Exiting" +"2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1825 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1826 Exiting" +"2019-07-20 02:40:07.375 UTC [gossip.comm] func1 -> DEBU 1827 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1828 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.375 UTC [gossip.gossip] handleMessage -> DEBU 1829 Exiting" +"2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182b Exiting" +"2019-07-20 02:40:07.543 UTC [gossip.comm] func1 -> DEBU 182c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.543 UTC [gossip.gossip] handleMessage -> DEBU 182e Exiting" +"2019-07-20 02:40:07.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 182f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.544 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1830 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:07.544 UTC [msp] DeserializeIdentity -> DEBU 1831 Obtaining identity" +"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1832 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1833 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:07.544 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1834 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1836 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:07.544 UTC [policies] Evaluate -> DEBU 1837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:07.544 UTC [cauthdsl] func1 -> DEBU 1838 0xc0037cfbc0 gate 1563590407544965200 evaluation starts" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1839 0xc0037cfbc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183a 0xc0037cfbc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183b 0xc0037cfbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 183c 0xc0037cfbc0 principal evaluation fails" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 183d 0xc0037cfbc0 gate 1563590407544965200 evaluation fails" +"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:07.545 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1841 0xc003dda400 gate 1563590407545389000 evaluation starts" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1842 0xc003dda400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1843 0xc003dda400 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1844 0xc003dda400 principal matched by identity 0" +"2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1845 Verify: digest = 00000000 89 ef ec b6 d9 de 0e eb ae 8e 81 ef af 84 9e ee |................| +00000010 36 ac a6 04 33 0e 2b 52 4d b9 2c 34 25 7e 0a 7c |6...3.+RM.,4%~.||" +"2019-07-20 02:40:07.545 UTC [msp.identity] Verify -> DEBU 1846 Verify: sig = 00000000 30 45 02 21 00 ce e7 5e 5d de 20 4b c4 44 7d 85 |0E.!...^]. K.D}.| +00000010 7a a7 49 0c 59 30 fe f8 b8 99 6b 30 a8 dd de 6a |z.I.Y0....k0...j| +00000020 eb 3f 63 a1 7b 02 20 4b 7d d1 a3 68 c7 5b e9 06 |.?c.{. K}..h.[..| +00000030 e1 73 36 2b 25 f4 4e a5 b0 84 a6 e8 65 63 83 b1 |.s6+%.N.....ec..| +00000040 c6 dc 03 7b 71 3b a0 |...{q;.|" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func2 -> DEBU 1847 0xc003dda400 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:07.545 UTC [cauthdsl] func1 -> DEBU 1848 0xc003dda400 gate 1563590407545389000 evaluation succeeds" +"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 1849 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:07.546 UTC [policies] Evaluate -> DEBU 184c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:07.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 184d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:07.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 184f updating membership: timestamp: " +"2019-07-20 02:40:07.548 UTC [gossip.comm] func1 -> DEBU 1850 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.548 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1852 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1853 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:07.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 1854 Exiting" +"2019-07-20 02:40:07.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1855 Exiting" +"2019-07-20 02:40:07.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1856 Exiting" +"2019-07-20 02:40:07.549 UTC [gossip.gossip] handleMessage -> DEBU 1857 Exiting" +"2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1858 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1859 Exiting" +"2019-07-20 02:40:07.557 UTC [gossip.comm] func1 -> DEBU 185a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.558 UTC [gossip.gossip] handleMessage -> DEBU 185c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.559 UTC [gossip.gossip] handleMessage -> DEBU 185d Exiting" +"2019-07-20 02:40:07.557 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" +"2019-07-20 02:40:07.569 UTC [msp] DeserializeIdentity -> DEBU 185e Obtaining identity" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 185f Obtaining identity" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1860 Obtaining identity" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1861 Obtaining identity" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" +"2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1863 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1864 Obtaining identity" +"2019-07-20 02:40:07.570 UTC [msp] DeserializeIdentity -> DEBU 1865 Obtaining identity" +"2019-07-20 02:40:07.570 UTC [gossip.comm] Send -> DEBU 1866 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1867 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.570 UTC [gossip.comm] sendToEndpoint -> DEBU 1868 Exiting" +"2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 1869 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.571 UTC [gossip.comm] sendToEndpoint -> DEBU 186a Exiting" +"2019-07-20 02:40:07.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:07.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 186c Exiting" +"2019-07-20 02:40:07.915 UTC [gossip.comm] func1 -> DEBU 186d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.916 UTC [gossip.gossip] handleMessage -> DEBU 186f Exiting" +"2019-07-20 02:40:07.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1870 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1871 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:07.916 UTC [msp] DeserializeIdentity -> DEBU 1872 Obtaining identity" +"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1873 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1874 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:07.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1875 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1876 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:07.916 UTC [policies] Evaluate -> DEBU 1877 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1879 0xc0004f5660 gate 1563590407917042800 evaluation starts" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187a 0xc0004f5660 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187b 0xc0004f5660 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187c 0xc0004f5660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 187d 0xc0004f5660 principal evaluation fails" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 187e 0xc0004f5660 gate 1563590407917042800 evaluation fails" +"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 187f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 1881 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1882 0xc0004f5ea0 gate 1563590407917520700 evaluation starts" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1883 0xc0004f5ea0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1884 0xc0004f5ea0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1885 0xc0004f5ea0 principal matched by identity 0" +"2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1886 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| +00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" +"2019-07-20 02:40:07.917 UTC [msp.identity] Verify -> DEBU 1887 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| +00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| +00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| +00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| +00000040 bf 3b 9d dd 7b 8e |.;..{.|" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func2 -> DEBU 1888 0xc0004f5ea0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:07.917 UTC [cauthdsl] func1 -> DEBU 1889 0xc0004f5ea0 gate 1563590407917520700 evaluation succeeds" +"2019-07-20 02:40:07.917 UTC [policies] Evaluate -> DEBU 188a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:07.918 UTC [policies] Evaluate -> DEBU 188d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 188e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 188f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1890 updating membership: timestamp: " +"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1891 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1892 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1893 Exiting" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 1894 Exiting" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1895 Exiting" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 1896 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" +"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" +"2019-07-20 02:40:07.918 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" +"2019-07-20 02:40:07.918 UTC [gossip.comm] Send -> DEBU 189a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:07.918 UTC [gossip.discovery] sendMemResponse -> DEBU 189b Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\035" signature:"0D\002 h\202S\034\331;,.\240y\354\021\354/\325X\230\271\037\336\224\004\005\031\236\225\366\224=\263Hn\002 \031Z=7\274\023\223\003IK\350\020Fkz\361\242+tU\226\004\225\0274K\344\371{\272\034\372" > alive: " +"2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.919 UTC [gossip.comm] sendToEndpoint -> DEBU 189d Exiting" +"2019-07-20 02:40:07.923 UTC [gossip.comm] func1 -> DEBU 189e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.923 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.924 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a1 Obtaining identity" +"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a2 Obtaining identity" +"2019-07-20 02:40:07.924 UTC [msp] DeserializeIdentity -> DEBU 18a3 Obtaining identity" +"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a4 Obtaining identity" +"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a5 Obtaining identity" +"2019-07-20 02:40:07.925 UTC [msp] DeserializeIdentity -> DEBU 18a6 Obtaining identity" +"2019-07-20 02:40:07.925 UTC [gossip.pull] SendDigest -> DEBU 18a7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:07.926 UTC [gossip.gossip] handleMessage -> DEBU 18a8 Exiting" +"2019-07-20 02:40:08.242 UTC [gossip.pull] Hello -> DEBU 18a9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:08.242 UTC [gossip.comm] Send -> DEBU 18aa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.242 UTC [gossip.comm] sendToEndpoint -> DEBU 18ac Exiting" +"2019-07-20 02:40:08.243 UTC [gossip.pull] Hello -> DEBU 18ad Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:08.243 UTC [gossip.comm] Send -> DEBU 18ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +"2019-07-20 02:40:08.245 UTC [gossip.comm] func1 -> DEBU 18b1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.246 UTC [gossip.gossip] handleMessage -> DEBU 18b3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.247 UTC [gossip.pull] HandleMessage -> DEBU 18b4 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.246 UTC [gossip.comm] func1 -> DEBU 18b2 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.244 UTC [gossip.pull] Hello -> DEBU 18b5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:08.248 UTC [gossip.comm] Send -> DEBU 18b6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.248 UTC [gossip.gossip] handleMessage -> DEBU 18b7 Exiting" +"2019-07-20 02:40:08.248 UTC [gossip.comm] sendToEndpoint -> DEBU 18b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.249 UTC [gossip.comm] sendToEndpoint -> DEBU 18b9 Exiting" +"2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18ba Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.249 UTC [gossip.pull] HandleMessage -> DEBU 18bb GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.250 UTC [gossip.comm] func1 -> DEBU 18bc Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.249 UTC [gossip.gossip] handleMessage -> DEBU 18bd Exiting" +"2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18be Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.251 UTC [gossip.pull] HandleMessage -> DEBU 18bf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.251 UTC [gossip.gossip] handleMessage -> DEBU 18c0 Exiting" +"2019-07-20 02:40:08.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c1 Obtaining default signing identity" +"2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101A " +"2019-07-20 02:40:08.281 UTC [msp.identity] Sign -> DEBU 18c3 Sign: digest: 15F5DB7AEF8341246A2BBC7FC964B30DB177647422188189177BD277A67DE900 " +"2019-07-20 02:40:08.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 18c4 Obtaining default signing identity" +"2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:08.282 UTC [msp.identity] Sign -> DEBU 18c6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:08.283 UTC [gossip.comm] Send -> DEBU 18c7 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.284 UTC [gossip.comm] sendToEndpoint -> DEBU 18c9 Exiting" +"2019-07-20 02:40:08.284 UTC [msp] DeserializeIdentity -> DEBU 18ca Obtaining identity" +"2019-07-20 02:40:08.285 UTC [gossip.comm] Send -> DEBU 18cb Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.285 UTC [msp] DeserializeIdentity -> DEBU 18cc Obtaining identity" +"2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.286 UTC [gossip.comm] sendToEndpoint -> DEBU 18ce Exiting" +"2019-07-20 02:40:08.287 UTC [gossip.comm] func1 -> DEBU 18cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.287 UTC [gossip.gossip] handleMessage -> DEBU 18d1 Exiting" +"2019-07-20 02:40:08.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18d3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d4 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +"2019-07-20 02:40:08.289 UTC [msp.identity] Verify -> DEBU 18d5 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +00000040 57 8d 5b 84 9d 85 |W.[...|" +"2019-07-20 02:40:08.290 UTC [gossip.comm] Send -> DEBU 18d6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.290 UTC [gossip.comm] sendToEndpoint -> DEBU 18d8 Exiting" +"2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18d9 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:08.291 UTC [msp.identity] Verify -> DEBU 18da Verify: sig = 00000000 30 44 02 20 74 eb 3c 0c 7c c3 90 9e 45 15 01 99 |0D. t.<.|...E...| +00000010 dd 06 cc c3 60 41 fa 97 b9 82 48 9d f4 11 28 00 |....`A....H...(.| +00000020 b5 48 cc 08 02 20 5a 13 df a9 89 2f b2 65 11 ea |.H... Z..../.e..| +00000030 a4 39 33 13 0d 1b ba ac 0e 2a 1d 37 dc e0 c6 4d |.93......*.7...M| +00000040 d5 14 8c 44 a2 85 |...D..|" +"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:08.293 UTC [gossip.discovery] isSentByMe -> DEBU 18dd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleAliveMessage -> DEBU 18de Exiting" +"2019-07-20 02:40:08.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Exiting" +"2019-07-20 02:40:08.293 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.294 UTC [gossip.gossip] handleMessage -> DEBU 18e1 Exiting" +"2019-07-20 02:40:08.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:08.294 UTC [gossip.comm] func1 -> DEBU 18e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.294 UTC [msp.identity] Verify -> DEBU 18e5 Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +"2019-07-20 02:40:08.295 UTC [msp.identity] Verify -> DEBU 18e6 Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +00000040 57 8d 5b 84 9d 85 |W.[...|" +"2019-07-20 02:40:08.295 UTC [gossip.gossip] handleMessage -> DEBU 18e7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:08.295 UTC [gossip.discovery] isSentByMe -> DEBU 18e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 18ea Exiting" +"2019-07-20 02:40:08.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18eb Exiting" +"2019-07-20 02:40:08.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.296 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ed Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:08.296 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.297 UTC [policies] Evaluate -> DEBU 18f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.297 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Exiting" +"2019-07-20 02:40:08.297 UTC [cauthdsl] func1 -> DEBU 18f6 0xc0039e1d20 gate 1563590408297550800 evaluation starts" +"2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f7 0xc0039e1d20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.297 UTC [cauthdsl] func2 -> DEBU 18f8 0xc0039e1d20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18f9 0xc0039e1d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.298 UTC [cauthdsl] func2 -> DEBU 18fa 0xc0039e1d20 principal evaluation fails" +"2019-07-20 02:40:08.298 UTC [cauthdsl] func1 -> DEBU 18fb 0xc0039e1d20 gate 1563590408297550800 evaluation fails" +"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.298 UTC [policies] Evaluate -> DEBU 18fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.299 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003b9a560 gate 1563590408299015200 evaluation starts" +"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1900 0xc003b9a560 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1901 0xc003b9a560 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.299 UTC [cauthdsl] func2 -> DEBU 1902 0xc003b9a560 principal matched by identity 0" +"2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1903 Verify: digest = 00000000 90 ad 86 40 6a f3 ad 1a e8 ec 59 b7 18 e6 d4 14 |...@j.....Y.....| +00000010 db 33 79 7f 58 75 39 c1 a1 15 89 cb 0f b2 1c 31 |.3y.Xu9........1|" +"2019-07-20 02:40:08.299 UTC [msp.identity] Verify -> DEBU 1904 Verify: sig = 00000000 30 44 02 20 07 ac d3 01 f1 a2 2b 72 7a 68 40 68 |0D. ......+rzh@h| +00000010 76 d0 4d 51 aa 3b de 04 f8 e4 f6 ec 54 82 4f 1b |v.MQ.;......T.O.| +00000020 9f e2 c8 4d 02 20 1d 0e 06 07 f2 ad 93 6b 14 69 |...M. .......k.i| +00000030 bd 8c d8 14 2c fe 35 53 de 54 b8 27 65 b9 78 cf |....,.5S.T.'e.x.| +00000040 bf 3b 9d dd 7b 8e |.;..{.|" +"2019-07-20 02:40:08.300 UTC [cauthdsl] func2 -> DEBU 1905 0xc003b9a560 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.300 UTC [cauthdsl] func1 -> DEBU 1906 0xc003b9a560 gate 1563590408299015200 evaluation succeeds" +"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1907 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1908 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 1909 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.300 UTC [policies] Evaluate -> DEBU 190a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:08.301 UTC [gossip.discovery] handleAliveMessage -> DEBU 190c Exiting" +"2019-07-20 02:40:08.301 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 190d Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 15 f5 db 7a ef 83 41 24 6a 2b bc 7f c9 64 b3 0d |...z..A$j+...d..| +00000010 b1 77 64 74 22 18 81 89 17 7b d2 77 a6 7d e9 00 |.wdt"....{.w.}..|" +"2019-07-20 02:40:08.304 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 44 02 20 6a 22 b6 88 17 07 ee 4d 2e a1 4d c9 |0D. j".....M..M.| +00000010 7e fc 68 7a 0f c1 2c 0e 68 70 ee c4 69 72 e6 21 |~.hz..,.hp..ir.!| +00000020 10 98 b4 41 02 20 6f 2e 62 f8 ad 8b 7d 7d d3 0b |...A. o.b...}}..| +00000030 f7 87 ab 70 eb 29 32 3f a9 43 30 63 01 e9 b4 db |...p.)2?.C0c....| +00000040 57 8d 5b 84 9d 85 |W.[...|" +"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1910 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:08.304 UTC [gossip.discovery] isSentByMe -> DEBU 1911 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1912 Exiting" +"2019-07-20 02:40:08.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1913 Exiting" +"2019-07-20 02:40:08.363 UTC [gossip.comm] func1 -> DEBU 1914 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.363 UTC [gossip.gossip] handleMessage -> DEBU 1915 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.364 UTC [gossip.pull] HandleMessage -> DEBU 1916 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.365 UTC [gossip.pull] SendDigest -> DEBU 1917 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:08.365 UTC [gossip.gossip] handleMessage -> DEBU 1918 Exiting" +"2019-07-20 02:40:08.367 UTC [gossip.comm] func1 -> DEBU 1919 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.367 UTC [gossip.gossip] handleMessage -> DEBU 191b Exiting" +"2019-07-20 02:40:08.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 191d Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191e Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +"2019-07-20 02:40:08.369 UTC [msp.identity] Verify -> DEBU 191f Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +00000040 d6 7b d1 42 f8 2d |.{.B.-|" +"2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1920 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:08.370 UTC [msp.identity] Verify -> DEBU 1921 Verify: sig = 00000000 30 45 02 21 00 83 3b 64 33 c2 24 ca 8f 63 e9 05 |0E.!..;d3.$..c..| +00000010 e8 18 37 56 ba a0 c0 14 82 44 d6 2d 8b 04 25 94 |..7V.....D.-..%.| +00000020 71 1d a3 86 33 02 20 51 61 00 a2 7a 14 09 e7 60 |q...3. Qa..z...`| +00000030 3e c7 9d 10 99 cb 0d 88 9d 11 94 58 4e 25 ef e5 |>..........XN%..| +00000040 0b 09 5f c7 9c 27 cb |.._..'.|" +"2019-07-20 02:40:08.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 1922 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1923 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:08.371 UTC [gossip.discovery] learnExistingMembers -> DEBU 1924 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1925 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1926 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:08.372 UTC [gossip.discovery] learnExistingMembers -> DEBU 1927 Exiting" +"2019-07-20 02:40:08.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 1928 Exiting" +"2019-07-20 02:40:08.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1929 Exiting" +"2019-07-20 02:40:08.374 UTC [gossip.discovery] sendMemResponse -> DEBU 192a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:08.374 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" +"2019-07-20 02:40:08.375 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +"2019-07-20 02:40:08.375 UTC [gossip.comm] Send -> DEBU 192d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.375 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.376 UTC [gossip.comm] sendToEndpoint -> DEBU 192f Exiting" +"2019-07-20 02:40:08.376 UTC [gossip.discovery] sendMemResponse -> DEBU 1930 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" secret_envelope:\307\235\020\231\313\r\210\235\021\224XN%\357\345\013\t_\307\234'\313" > > alive: " +"2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1931 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.552 UTC [gossip.comm] func1 -> DEBU 1932 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1933 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.552 UTC [gossip.gossip] handleMessage -> DEBU 1934 Exiting" +"2019-07-20 02:40:08.553 UTC [gossip.gossip] handleMessage -> DEBU 1935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.553 UTC [gossip.pull] HandleMessage -> DEBU 1937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1938 Obtaining identity" +"2019-07-20 02:40:08.553 UTC [msp] DeserializeIdentity -> DEBU 1939 Obtaining identity" +"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" +"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193b Obtaining identity" +"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193c Obtaining identity" +"2019-07-20 02:40:08.554 UTC [msp] DeserializeIdentity -> DEBU 193d Obtaining identity" +"2019-07-20 02:40:08.553 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1936 Got message: GossipMessage: tag:EMPTY mem_req:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.554 UTC [gossip.pull] SendDigest -> DEBU 193e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:08.555 UTC [gossip.gossip] handleMessage -> DEBU 193f Exiting" +"2019-07-20 02:40:08.554 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1940 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:08.555 UTC [msp] DeserializeIdentity -> DEBU 1941 Obtaining identity" +"2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1942 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1943 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.556 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1944 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1945 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1946 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.556 UTC [policies] Evaluate -> DEBU 1947 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.557 UTC [cauthdsl] func1 -> DEBU 1948 0xc00377da70 gate 1563590408557288200 evaluation starts" +"2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 1949 0xc00377da70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.557 UTC [cauthdsl] func2 -> DEBU 194a 0xc00377da70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194b 0xc00377da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.558 UTC [cauthdsl] func2 -> DEBU 194c 0xc00377da70 principal evaluation fails" +"2019-07-20 02:40:08.558 UTC [cauthdsl] func1 -> DEBU 194d 0xc00377da70 gate 1563590408557288200 evaluation fails" +"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.559 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.559 UTC [cauthdsl] func1 -> DEBU 1951 0xc002a002b0 gate 1563590408559753700 evaluation starts" +"2019-07-20 02:40:08.559 UTC [cauthdsl] func2 -> DEBU 1952 0xc002a002b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1953 0xc002a002b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.560 UTC [cauthdsl] func2 -> DEBU 1954 0xc002a002b0 principal matched by identity 0" +"2019-07-20 02:40:08.560 UTC [msp.identity] Verify -> DEBU 1955 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| +00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" +"2019-07-20 02:40:08.561 UTC [msp.identity] Verify -> DEBU 1956 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| +00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| +00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| +00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| +00000040 73 b2 78 be 11 5f 01 |s.x.._.|" +"2019-07-20 02:40:08.561 UTC [cauthdsl] func2 -> DEBU 1957 0xc002a002b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.561 UTC [cauthdsl] func1 -> DEBU 1958 0xc002a002b0 gate 1563590408559753700 evaluation succeeds" +"2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 1959 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.562 UTC [policies] Evaluate -> DEBU 195a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.563 UTC [policies] Evaluate -> DEBU 195c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 195f updating membership: timestamp: " +"2019-07-20 02:40:08.564 UTC [gossip.discovery] learnExistingMembers -> DEBU 1960 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1961 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:08.565 UTC [gossip.discovery] learnExistingMembers -> DEBU 1962 Exiting" +"2019-07-20 02:40:08.565 UTC [gossip.discovery] handleAliveMessage -> DEBU 1963 Exiting" +"2019-07-20 02:40:08.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1964 Exiting" +"2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 1965 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" +"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" +"2019-07-20 02:40:08.566 UTC [msp] DeserializeIdentity -> DEBU 1968 Obtaining identity" +"2019-07-20 02:40:08.566 UTC [gossip.comm] Send -> DEBU 1969 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.566 UTC [gossip.discovery] sendMemResponse -> DEBU 196a Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " +"2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.567 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Exiting" +"2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196d Obtaining identity" +"2019-07-20 02:40:08.718 UTC [msp] DeserializeIdentity -> DEBU 196e Obtaining identity" +"2019-07-20 02:40:08.719 UTC [gossip.comm] Send -> DEBU 196f Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1970 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1971 Exiting" +"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1972 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1973 Exiting" +"2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1974 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.720 UTC [gossip.comm] sendToEndpoint -> DEBU 1975 Exiting" +"2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1976 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.722 UTC [gossip.gossip] handleMessage -> DEBU 1979 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.721 UTC [gossip.comm] func1 -> DEBU 1977 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.722 UTC [gossip.comm] func1 -> DEBU 1978 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.723 UTC [msp.identity] Verify -> DEBU 197a Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:08.724 UTC [msp.identity] Verify -> DEBU 197b Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197c Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:08.728 UTC [msp.identity] Verify -> DEBU 197d Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197e Obtaining identity" +"2019-07-20 02:40:08.729 UTC [msp] DeserializeIdentity -> DEBU 197f Obtaining identity" +"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1980 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1981 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1982 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.730 UTC [policies] Evaluate -> DEBU 1984 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.731 UTC [policies] Evaluate -> DEBU 1985 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.731 UTC [cauthdsl] func1 -> DEBU 1986 0xc0034afbb0 gate 1563590408731275000 evaluation starts" +"2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1987 0xc0034afbb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.731 UTC [cauthdsl] func2 -> DEBU 1988 0xc0034afbb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 1989 0xc0034afbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.732 UTC [cauthdsl] func2 -> DEBU 198a 0xc0034afbb0 principal evaluation fails" +"2019-07-20 02:40:08.732 UTC [cauthdsl] func1 -> DEBU 198b 0xc0034afbb0 gate 1563590408731275000 evaluation fails" +"2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.733 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.734 UTC [policies] Evaluate -> DEBU 198e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.734 UTC [cauthdsl] func1 -> DEBU 198f 0xc0039d43f0 gate 1563590408734954700 evaluation starts" +"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1990 0xc0039d43f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1991 0xc0039d43f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.735 UTC [msp] DeserializeIdentity -> DEBU 1992 Obtaining identity" +"2019-07-20 02:40:08.735 UTC [cauthdsl] func2 -> DEBU 1993 0xc0039d43f0 principal matched by identity 0" +"2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1994 Obtaining identity" +"2019-07-20 02:40:08.736 UTC [gossip.pull] Hello -> DEBU 1995 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:08.736 UTC [msp.identity] Verify -> DEBU 1998 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:08.736 UTC [msp] DeserializeIdentity -> DEBU 1997 Obtaining identity" +"2019-07-20 02:40:08.737 UTC [msp] DeserializeIdentity -> DEBU 1999 Obtaining identity" +"2019-07-20 02:40:08.738 UTC [gossip.comm] Send -> DEBU 199a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.738 UTC [cauthdsl] func2 -> DEBU 199c 0xc0039d43f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.738 UTC [cauthdsl] func1 -> DEBU 199d 0xc0039d43f0 gate 1563590408734954700 evaluation succeeds" +"2019-07-20 02:40:08.739 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.738 UTC [gossip.comm] sendToEndpoint -> DEBU 199e Exiting" +"2019-07-20 02:40:08.740 UTC [gossip.comm] func1 -> DEBU 19a1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.740 UTC [policies] Evaluate -> DEBU 19a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.742 UTC [policies] Evaluate -> DEBU 19a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.742 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +"2019-07-20 02:40:08.743 UTC [msp] DeserializeIdentity -> DEBU 19a5 Obtaining identity" +"2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.745 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.746 UTC [cauthdsl] func1 -> DEBU 19ac 0xc0039d5be0 gate 1563590408746044200 evaluation starts" +"2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0039d5be0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.746 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0039d5be0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.749 UTC [cauthdsl] func2 -> DEBU 19af 0xc0039d5be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.750 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0039d5be0 principal evaluation fails" +"2019-07-20 02:40:08.750 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0039d5be0 gate 1563590408746044200 evaluation fails" +"2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.750 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.751 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.751 UTC [cauthdsl] func1 -> DEBU 19b5 0xc002940420 gate 1563590408751898400 evaluation starts" +"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b6 0xc002940420 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b7 0xc002940420 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.752 UTC [cauthdsl] func2 -> DEBU 19b8 0xc002940420 principal matched by identity 0" +"2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19b9 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:08.752 UTC [msp.identity] Verify -> DEBU 19ba Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:08.753 UTC [cauthdsl] func2 -> DEBU 19bb 0xc002940420 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.753 UTC [cauthdsl] func1 -> DEBU 19bc 0xc002940420 gate 1563590408751898400 evaluation succeeds" +"2019-07-20 02:40:08.753 UTC [policies] Evaluate -> DEBU 19bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19bf Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.754 UTC [policies] Evaluate -> DEBU 19c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c1 Exiting" +"2019-07-20 02:40:08.754 UTC [gossip.gossip] handleMessage -> DEBU 19c2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c3 Obtaining identity" +"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c4 Obtaining identity" +"2019-07-20 02:40:08.755 UTC [msp] DeserializeIdentity -> DEBU 19c5 Obtaining identity" +"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.757 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.757 UTC [cauthdsl] func1 -> DEBU 19cc 0xc002941f30 gate 1563590408757681600 evaluation starts" +"2019-07-20 02:40:08.757 UTC [cauthdsl] func2 -> DEBU 19cd 0xc002941f30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19ce 0xc002941f30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19cf 0xc002941f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.758 UTC [cauthdsl] func2 -> DEBU 19d0 0xc002941f30 principal evaluation fails" +"2019-07-20 02:40:08.758 UTC [cauthdsl] func1 -> DEBU 19d1 0xc002941f30 gate 1563590408757681600 evaluation fails" +"2019-07-20 02:40:08.758 UTC [policies] Evaluate -> DEBU 19d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.759 UTC [policies] Evaluate -> DEBU 19d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.759 UTC [cauthdsl] func1 -> DEBU 19d5 0xc002a7c770 gate 1563590408759598600 evaluation starts" +"2019-07-20 02:40:08.759 UTC [cauthdsl] func2 -> DEBU 19d6 0xc002a7c770 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d7 0xc002a7c770 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.760 UTC [cauthdsl] func2 -> DEBU 19d8 0xc002a7c770 principal matched by identity 0" +"2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19d9 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:08.760 UTC [msp.identity] Verify -> DEBU 19da Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:08.762 UTC [cauthdsl] func2 -> DEBU 19db 0xc002a7c770 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.762 UTC [cauthdsl] func1 -> DEBU 19dc 0xc002a7c770 gate 1563590408759598600 evaluation succeeds" +"2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.763 UTC [policies] Evaluate -> DEBU 19de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.764 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e1 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:08.764 UTC [msp.identity] Verify -> DEBU 19e2 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:08.765 UTC [msp.identity] Verify -> DEBU 19e3 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:08.768 UTC [msp.identity] Verify -> DEBU 19e4 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:08.768 UTC [msp] DeserializeIdentity -> DEBU 19e5 Obtaining identity" +"2019-07-20 02:40:08.769 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" +"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.770 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.771 UTC [cauthdsl] func1 -> DEBU 19ed 0xc002ef4d80 gate 1563590408771180700 evaluation starts" +"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ee 0xc002ef4d80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19ef 0xc002ef4d80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.771 UTC [cauthdsl] func2 -> DEBU 19f0 0xc002ef4d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.772 UTC [cauthdsl] func2 -> DEBU 19f1 0xc002ef4d80 principal evaluation fails" +"2019-07-20 02:40:08.772 UTC [cauthdsl] func1 -> DEBU 19f2 0xc002ef4d80 gate 1563590408771180700 evaluation fails" +"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.772 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.773 UTC [cauthdsl] func1 -> DEBU 19f6 0xc002ef55c0 gate 1563590408773095200 evaluation starts" +"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f7 0xc002ef55c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f8 0xc002ef55c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.773 UTC [cauthdsl] func2 -> DEBU 19f9 0xc002ef55c0 principal matched by identity 0" +"2019-07-20 02:40:08.773 UTC [msp.identity] Verify -> DEBU 19fa Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:08.774 UTC [msp.identity] Verify -> DEBU 19fb Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:08.774 UTC [cauthdsl] func2 -> DEBU 19fc 0xc002ef55c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.774 UTC [cauthdsl] func1 -> DEBU 19fd 0xc002ef55c0 gate 1563590408773095200 evaluation succeeds" +"2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.774 UTC [policies] Evaluate -> DEBU 19ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a00 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.775 UTC [policies] Evaluate -> DEBU 1a01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a02 Exiting" +"2019-07-20 02:40:08.775 UTC [gossip.gossip] handleMessage -> DEBU 1a03 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.775 UTC [msp] DeserializeIdentity -> DEBU 1a04 Obtaining identity" +"2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a05 Obtaining identity" +"2019-07-20 02:40:08.776 UTC [msp] DeserializeIdentity -> DEBU 1a06 Obtaining identity" +"2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a08 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a09 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.777 UTC [policies] Evaluate -> DEBU 1a0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a0d 0xc0038b70d0 gate 1563590408779421800 evaluation starts" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0038b70d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0038b70d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a10 0xc0038b70d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func2 -> DEBU 1a11 0xc0038b70d0 principal evaluation fails" +"2019-07-20 02:40:08.779 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0038b70d0 gate 1563590408779421800 evaluation fails" +"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a13 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.779 UTC [policies] Evaluate -> DEBU 1a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a16 0xc0038b7910 gate 1563590408780043400 evaluation starts" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a17 0xc0038b7910 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a18 0xc0038b7910 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a19 0xc0038b7910 principal matched by identity 0" +"2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1a Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:08.780 UTC [msp.identity] Verify -> DEBU 1a1b Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0038b7910 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.780 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc0038b7910 gate 1563590408780043400 evaluation succeeds" +"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a20 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.780 UTC [policies] Evaluate -> DEBU 1a21 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:08.784 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:08.784 UTC [msp] DeserializeIdentity -> DEBU 1a24 Obtaining identity" +"2019-07-20 02:40:08.785 UTC [msp] DeserializeIdentity -> DEBU 1a25 Obtaining identity" +"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a26 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a27 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.786 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a28 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:08.787 UTC [policies] Evaluate -> DEBU 1a2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:08.788 UTC [cauthdsl] func1 -> DEBU 1a2c 0xc003b1b800 gate 1563590408787939000 evaluation starts" +"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2d 0xc003b1b800 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2e 0xc003b1b800 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.788 UTC [cauthdsl] func2 -> DEBU 1a2f 0xc003b1b800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:08.789 UTC [cauthdsl] func2 -> DEBU 1a30 0xc003b1b800 principal evaluation fails" +"2019-07-20 02:40:08.789 UTC [cauthdsl] func1 -> DEBU 1a31 0xc003b1b800 gate 1563590408787939000 evaluation fails" +"2019-07-20 02:40:08.789 UTC [policies] Evaluate -> DEBU 1a32 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:08.790 UTC [policies] Evaluate -> DEBU 1a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:08.790 UTC [cauthdsl] func1 -> DEBU 1a35 0xc003c2c040 gate 1563590408790644700 evaluation starts" +"2019-07-20 02:40:08.790 UTC [cauthdsl] func2 -> DEBU 1a36 0xc003c2c040 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003c2c040 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:08.791 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003c2c040 principal matched by identity 0" +"2019-07-20 02:40:08.791 UTC [msp.identity] Verify -> DEBU 1a39 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:08.792 UTC [msp.identity] Verify -> DEBU 1a3a Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:08.792 UTC [cauthdsl] func2 -> DEBU 1a3b 0xc003c2c040 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:08.792 UTC [cauthdsl] func1 -> DEBU 1a3c 0xc003c2c040 gate 1563590408790644700 evaluation succeeds" +"2019-07-20 02:40:08.792 UTC [policies] Evaluate -> DEBU 1a3d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:08.795 UTC [policies] Evaluate -> DEBU 1a3f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:08.796 UTC [policies] Evaluate -> DEBU 1a40 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:08.796 UTC [msp.identity] Verify -> DEBU 1a41 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:08.797 UTC [msp.identity] Verify -> DEBU 1a42 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:08.797 UTC [gossip.gossip] handleMessage -> DEBU 1a43 Exiting" +"2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.798 UTC [gossip.pull] HandleMessage -> DEBU 1a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.798 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Exiting" +"2019-07-20 02:40:08.880 UTC [gossip.comm] func1 -> DEBU 1a47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.880 UTC [gossip.gossip] handleMessage -> DEBU 1a48 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" +"2019-07-20 02:40:08.880 UTC [msp] DeserializeIdentity -> DEBU 1a4a Obtaining identity" +"2019-07-20 02:40:08.881 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Exiting" +"2019-07-20 02:40:08.898 UTC [gossip.comm] func1 -> DEBU 1a4c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.898 UTC [gossip.gossip] handleMessage -> DEBU 1a4d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.899 UTC [gossip.pull] HandleMessage -> DEBU 1a4e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:08.899 UTC [gossip.pull] SendDigest -> DEBU 1a4f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:08.899 UTC [gossip.gossip] handleMessage -> DEBU 1a50 Exiting" +"2019-07-20 02:40:09.042 UTC [gossip.comm] func1 -> DEBU 1a51 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:09.042 UTC [gossip.gossip] handleMessage -> DEBU 1a52 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a53 Obtaining identity" +"2019-07-20 02:40:09.043 UTC [msp] DeserializeIdentity -> DEBU 1a54 Obtaining identity" +"2019-07-20 02:40:09.044 UTC [msp] DeserializeIdentity -> DEBU 1a55 Obtaining identity" +"2019-07-20 02:40:09.044 UTC [gossip.gossip] handleMessage -> DEBU 1a56 Exiting" +"2019-07-20 02:40:09.181 UTC [gossip.comm] func1 -> DEBU 1a57 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:09.181 UTC [gossip.gossip] handleMessage -> DEBU 1a58 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a59 Obtaining identity" +"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5a Obtaining identity" +"2019-07-20 02:40:09.185 UTC [msp] DeserializeIdentity -> DEBU 1a5b Obtaining identity" +"2019-07-20 02:40:09.186 UTC [gossip.gossip] handleMessage -> DEBU 1a5c Exiting" +"2019-07-20 02:40:11.757 UTC [gossip.election] waitForInterrupt -> DEBU 1a5d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:11.757 UTC [gossip.election] IsLeader -> DEBU 1a5e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:11.758 UTC [msp] GetDefaultSigningIdentity -> DEBU 1a5f Obtaining default signing identity" +"2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a60 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510071801 " +"2019-07-20 02:40:11.758 UTC [msp.identity] Sign -> DEBU 1a61 Sign: digest: F32453B093A8FCF0DB1ACDFCB1A2A453D65AA6A20827F5C70258714B6F5C027F " +"2019-07-20 02:40:11.759 UTC [gossip.election] waitForInterrupt -> DEBU 1a62 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:11.760 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" +"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" +"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" +"2019-07-20 02:40:11.761 UTC [msp] DeserializeIdentity -> DEBU 1a66 Obtaining identity" +"2019-07-20 02:40:11.762 UTC [gossip.comm] Send -> DEBU 1a67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a68 Obtaining identity" +"2019-07-20 02:40:11.762 UTC [msp] DeserializeIdentity -> DEBU 1a69 Obtaining identity" +"2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.763 UTC [gossip.comm] sendToEndpoint -> DEBU 1a6b Exiting" +"2019-07-20 02:40:11.918 UTC [gossip.comm] func1 -> DEBU 1a6c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.919 UTC [gossip.comm] func1 -> DEBU 1a6d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.919 UTC [gossip.gossip] handleMessage -> DEBU 1a6e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a6f Exiting" +"2019-07-20 02:40:11.920 UTC [gossip.gossip] handleMessage -> DEBU 1a70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a71 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:11.921 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" +"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a75 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:11.922 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a76 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:11.923 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:11.924 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0007176f0 gate 1563590411924029300 evaluation starts" +"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0007176f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0007176f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0007176f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:11.924 UTC [cauthdsl] func2 -> DEBU 1a7e 0xc0007176f0 principal evaluation fails" +"2019-07-20 02:40:11.925 UTC [cauthdsl] func1 -> DEBU 1a7f 0xc0007176f0 gate 1563590411924029300 evaluation fails" +"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:11.925 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:11.926 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000717f30 gate 1563590411925987300 evaluation starts" +"2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a84 0xc000717f30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:11.926 UTC [cauthdsl] func2 -> DEBU 1a85 0xc000717f30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:11.927 UTC [cauthdsl] func2 -> DEBU 1a86 0xc000717f30 principal matched by identity 0" +"2019-07-20 02:40:11.927 UTC [msp.identity] Verify -> DEBU 1a87 Verify: digest = 00000000 50 6e 7f af 28 57 0b 0c 11 6e 47 2f e1 0f dc 57 |Pn..(W...nG/...W| +00000010 cc 63 30 d8 ae 7d 4d b3 63 dc 69 a5 59 4b 3d 58 |.c0..}M.c.i.YK=X|" +"2019-07-20 02:40:11.928 UTC [msp.identity] Verify -> DEBU 1a88 Verify: sig = 00000000 30 44 02 20 30 3b da be 0a 27 22 9d b7 14 c7 49 |0D. 0;...'"....I| +00000010 2f 7c 84 d0 d8 8b 25 f3 7c 6d 8a 46 4b 3a 47 97 |/|....%.|m.FK:G.| +00000020 f1 91 20 77 02 20 7e 62 fe 43 56 ab 37 87 cd bf |.. w. ~b.CV.7...| +00000030 21 7b d2 24 5e 56 76 9a d9 b2 c7 19 33 8b 6c 46 |!{.$^Vv.....3.lF| +00000040 e2 11 bc 09 bb 1a |......|" +"2019-07-20 02:40:11.931 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000717f30 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:11.931 UTC [cauthdsl] func1 -> DEBU 1a8a 0xc000717f30 gate 1563590411925987300 evaluation succeeds" +"2019-07-20 02:40:11.931 UTC [policies] Evaluate -> DEBU 1a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:11.932 UTC [policies] Evaluate -> DEBU 1a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:11.932 UTC [gossip.comm] func1 -> DEBU 1a8d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.933 UTC [gossip.comm] func1 -> DEBU 1a8e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a8f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:11.933 UTC [policies] Evaluate -> DEBU 1a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:11.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a91 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a92 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a93 updating membership: timestamp: " +"2019-07-20 02:40:11.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a94 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a95 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:11.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a96 Exiting" +"2019-07-20 02:40:11.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a97 Exiting" +"2019-07-20 02:40:11.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a98 Exiting" +"2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a99 Exiting" +"2019-07-20 02:40:11.936 UTC [gossip.gossip] handleMessage -> DEBU 1a9a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a9b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.937 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a9c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:11.938 UTC [gossip.comm] func1 -> DEBU 1a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.937 UTC [msp] DeserializeIdentity -> DEBU 1a9e Obtaining identity" +"2019-07-20 02:40:11.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:11.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1aa1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:11.940 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:11.941 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:11.942 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:11.943 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000745fe0 gate 1563590411943047600 evaluation starts" +"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000745fe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000745fe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:11.943 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000745fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:11.944 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000745fe0 principal evaluation fails" +"2019-07-20 02:40:11.944 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000745fe0 gate 1563590411943047600 evaluation fails" +"2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:11.945 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aad Obtaining identity" +"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aae Obtaining identity" +"2019-07-20 02:40:11.946 UTC [msp] DeserializeIdentity -> DEBU 1aaf Obtaining identity" +"2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" +"2019-07-20 02:40:11.947 UTC [msp] DeserializeIdentity -> DEBU 1ab1 Obtaining identity" +"2019-07-20 02:40:11.948 UTC [msp] DeserializeIdentity -> DEBU 1ab2 Obtaining identity" +"2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab3 Obtaining identity" +"2019-07-20 02:40:11.951 UTC [gossip.comm] Send -> DEBU 1ab4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:11.951 UTC [policies] Evaluate -> DEBU 1ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:11.951 UTC [msp] DeserializeIdentity -> DEBU 1ab6 Obtaining identity" +"2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.952 UTC [gossip.comm] sendToEndpoint -> DEBU 1ab9 Exiting" +"2019-07-20 02:40:11.952 UTC [gossip.comm] Send -> DEBU 1aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:11.953 UTC [gossip.comm] sendToEndpoint -> DEBU 1abb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.952 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0028aa820 gate 1563590411952008400 evaluation starts" +"2019-07-20 02:40:11.954 UTC [gossip.comm] sendToEndpoint -> DEBU 1abc Exiting" +"2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0028aa820 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:11.954 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0028aa820 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:11.955 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0028aa820 principal matched by identity 0" +"2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| +00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" +"2019-07-20 02:40:11.955 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| +00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| +00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| +00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| +00000040 86 a4 e1 59 be af ec |...Y...|" +"2019-07-20 02:40:11.956 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0028aa820 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:11.956 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0028aa820 gate 1563590411952008400 evaluation succeeds" +"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:11.956 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:11.958 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca updating membership: timestamp: " +"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acb Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] learnExistingMembers -> DEBU 1acd Exiting" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ace Exiting" +"2019-07-20 02:40:11.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acf Exiting" +"2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.960 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad1 Exiting" +"2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad2 Exiting" +"2019-07-20 02:40:11.960 UTC [gossip.discovery] sendMemResponse -> DEBU 1ad3 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:11.961 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" +"2019-07-20 02:40:11.960 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad6 Exiting" +"2019-07-20 02:40:11.961 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ad8 Obtaining identity" +"2019-07-20 02:40:11.962 UTC [gossip.pull] HandleMessage -> DEBU 1ad9 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ada Obtaining identity" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adb Obtaining identity" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1adc Obtaining identity" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1add Obtaining identity" +"2019-07-20 02:40:11.962 UTC [msp] DeserializeIdentity -> DEBU 1ade Obtaining identity" +"2019-07-20 02:40:11.963 UTC [gossip.comm] Send -> DEBU 1adf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae0 Obtaining identity" +"2019-07-20 02:40:11.963 UTC [msp] DeserializeIdentity -> DEBU 1ae1 Obtaining identity" +"2019-07-20 02:40:11.964 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\036" signature:"0D\002 l.\251G\244\341-\363\251/\311(7\316\000\025\330|J\211\324\233j\006'c\263\026F\227\235y\002 ~\021\334x%\3518\337\313a\252a\331\337\nn\3116\234\376\215L9\272\203\216\326{\321B\370-" > alive:\3144\356\377.|vp\r\216\317K\370(\223[\321\232\347\237C\310-\206\224\240\002 9\017\215\320\342\217D\033\356(\204S\372\217E\201\307>_Q\364F\354y\316s\262x\276\021_\001" > alive: alive: " +"2019-07-20 02:40:11.964 UTC [gossip.pull] SendDigest -> DEBU 1ae3 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:11.964 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:11.973 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae6 Exiting" +"2019-07-20 02:40:11.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:11.973 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae7 Exiting" +"2019-07-20 02:40:11.969 UTC [gossip.gossip] handleMessage -> DEBU 1ae8 Exiting" +"2019-07-20 02:40:12.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ae9 Obtaining default signing identity" +"2019-07-20 02:40:12.234 UTC [msp.identity] Sign -> DEBU 1aea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101B " +"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aeb Sign: digest: CE2B4F1AA88EC06B4B4F6D52277AAB84EFF3B9035584D68F654AC7DBFF895133 " +"2019-07-20 02:40:12.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1aec Obtaining default signing identity" +"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aed Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:12.235 UTC [msp.identity] Sign -> DEBU 1aee Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:12.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1aef Sleeping 5s" +"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af0 Obtaining identity" +"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af1 Obtaining identity" +"2019-07-20 02:40:12.241 UTC [msp] DeserializeIdentity -> DEBU 1af2 Obtaining identity" +"2019-07-20 02:40:12.241 UTC [gossip.comm] Send -> DEBU 1af3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.242 UTC [msp] DeserializeIdentity -> DEBU 1af4 Obtaining identity" +"2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.242 UTC [gossip.comm] Send -> DEBU 1af6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af8 Exiting" +"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1af9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afa Exiting" +"2019-07-20 02:40:12.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1afb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1afc Exiting" +"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1afd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1aff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.249 UTC [gossip.pull] Hello -> DEBU 1b01 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:12.249 UTC [gossip.comm] Send -> DEBU 1b02 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" +"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Exiting" +"2019-07-20 02:40:12.250 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.251 UTC [gossip.comm] sendToEndpoint -> DEBU 1b08 Exiting" +"2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b09 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.252 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.253 UTC [gossip.pull] HandleMessage -> DEBU 1b0d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.251 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.252 UTC [gossip.comm] func1 -> DEBU 1b0b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.254 UTC [gossip.gossip] handleMessage -> DEBU 1b0e Exiting" +"2019-07-20 02:40:12.255 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.255 UTC [gossip.pull] HandleMessage -> DEBU 1b10 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b11 Exiting" +"2019-07-20 02:40:12.256 UTC [gossip.gossip] handleMessage -> DEBU 1b12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.257 UTC [gossip.pull] HandleMessage -> DEBU 1b13 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.257 UTC [gossip.gossip] handleMessage -> DEBU 1b14 Exiting" +"2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b15 Obtaining default signing identity" +"2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101C " +"2019-07-20 02:40:12.290 UTC [msp.identity] Sign -> DEBU 1b17 Sign: digest: C3F5706A375F12EA1C08F465EF91D9C4D06CEAE01B18956347B9FBEA6DE181AD " +"2019-07-20 02:40:12.290 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b18 Obtaining default signing identity" +"2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b19 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:12.291 UTC [msp.identity] Sign -> DEBU 1b1a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1b Obtaining identity" +"2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.291 UTC [msp] DeserializeIdentity -> DEBU 1b1d Obtaining identity" +"2019-07-20 02:40:12.291 UTC [gossip.comm] Send -> DEBU 1b1e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.292 UTC [gossip.comm] Send -> DEBU 1b1f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b21 Exiting" +"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.292 UTC [gossip.comm] sendToEndpoint -> DEBU 1b23 Exiting" +"2019-07-20 02:40:12.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b27 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.294 UTC [gossip.gossip] handleMessage -> DEBU 1b28 Exiting" +"2019-07-20 02:40:12.294 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b2a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2b Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +"2019-07-20 02:40:12.295 UTC [msp.identity] Verify -> DEBU 1b2c Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +00000040 7f 1e c1 c8 ad 63 |.....c|" +"2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.295 UTC [gossip.discovery] isSentByMe -> DEBU 1b2e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b2f Exiting" +"2019-07-20 02:40:12.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b30 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:12.295 UTC [msp] DeserializeIdentity -> DEBU 1b31 Obtaining identity" +"2019-07-20 02:40:12.294 UTC [gossip.comm] sendToEndpoint -> DEBU 1b32 Exiting" +"2019-07-20 02:40:12.295 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b34 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.296 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b35 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b36 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.297 UTC [gossip.comm] func1 -> DEBU 1b37 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.297 UTC [gossip.gossip] handleMessage -> DEBU 1b38 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.297 UTC [policies] Evaluate -> DEBU 1b39 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.294 UTC [gossip.comm] func1 -> DEBU 1b25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.298 UTC [policies] Evaluate -> DEBU 1b3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.298 UTC [cauthdsl] func1 -> DEBU 1b3b 0xc003719970 gate 1563590412298571800 evaluation starts" +"2019-07-20 02:40:12.298 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc003719970 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc003719970 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc003719970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.299 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc003719970 principal evaluation fails" +"2019-07-20 02:40:12.299 UTC [cauthdsl] func1 -> DEBU 1b40 0xc003719970 gate 1563590412298571800 evaluation fails" +"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.300 UTC [policies] Evaluate -> DEBU 1b43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.301 UTC [cauthdsl] func1 -> DEBU 1b44 0xc002a0a1b0 gate 1563590412300947700 evaluation starts" +"2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b45 0xc002a0a1b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.301 UTC [cauthdsl] func2 -> DEBU 1b46 0xc002a0a1b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.302 UTC [cauthdsl] func2 -> DEBU 1b47 0xc002a0a1b0 principal matched by identity 0" +"2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b48 Verify: digest = 00000000 9b 11 f7 ad fc d3 ff 01 32 75 4a e1 30 0a b5 4a |........2uJ.0..J| +00000010 7d 75 ac e0 57 ae 2d bc 93 54 5e 39 8a 31 d0 d2 |}u..W.-..T^9.1..|" +"2019-07-20 02:40:12.302 UTC [msp.identity] Verify -> DEBU 1b49 Verify: sig = 00000000 30 45 02 21 00 89 70 53 2d 1c 3e cc 34 ee ff 2e |0E.!..pS-.>.4...| +00000010 7c 76 70 0d 8e cf 4b f8 28 93 5b d1 9a e7 9f 43 ||vp...K.(.[....C| +00000020 c8 2d 86 94 a0 02 20 39 0f 8d d0 e2 8f 44 1b ee |.-.... 9.....D..| +00000030 28 84 53 fa 8f 45 81 c7 3e 5f 51 f4 46 ec 79 ce |(.S..E..>_Q.F.y.| +00000040 73 b2 78 be 11 5f 01 |s.x.._.|" +"2019-07-20 02:40:12.303 UTC [cauthdsl] func2 -> DEBU 1b4a 0xc002a0a1b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.303 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc002a0a1b0 gate 1563590412300947700 evaluation succeeds" +"2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.303 UTC [policies] Evaluate -> DEBU 1b4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.304 UTC [policies] Evaluate -> DEBU 1b4f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b50 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b51 Exiting" +"2019-07-20 02:40:12.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b52 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:12.305 UTC [msp.identity] Verify -> DEBU 1b53 Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +"2019-07-20 02:40:12.306 UTC [msp.identity] Verify -> DEBU 1b54 Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +00000040 d6 7b d1 42 f8 2d |.{.B.-|" +"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b55 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b56 Exiting" +"2019-07-20 02:40:12.306 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b57 Exiting" +"2019-07-20 02:40:12.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Exiting" +"2019-07-20 02:40:12.307 UTC [gossip.gossip] handleMessage -> DEBU 1b5b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b5a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5c Verify: digest = 00000000 e1 e9 58 69 d8 3b 70 ea 2d 2b 80 ca a6 ac ba 97 |..Xi.;p.-+......| +00000010 6d 6f f6 9a 99 c6 7b 0c c3 28 dd cd a9 14 bc 69 |mo....{..(.....i|" +"2019-07-20 02:40:12.308 UTC [msp.identity] Verify -> DEBU 1b5d Verify: sig = 00000000 30 44 02 20 6c 2e a9 47 a4 e1 2d f3 a9 2f c9 28 |0D. l..G..-../.(| +00000010 37 ce 00 15 d8 7c 4a 89 d4 9b 6a 06 27 63 b3 16 |7....|J...j.'c..| +00000020 46 97 9d 79 02 20 7e 11 dc 78 25 e9 38 df cb 61 |F..y. ~..x%.8..a| +00000030 aa 61 d9 df 0a 6e c9 36 9c fe 8d 4c 39 ba 83 8e |.a...n.6...L9...| +00000040 d6 7b d1 42 f8 2d |.{.B.-|" +"2019-07-20 02:40:12.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.309 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5f Exiting" +"2019-07-20 02:40:12.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b60 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:12.309 UTC [msp.identity] Verify -> DEBU 1b61 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +"2019-07-20 02:40:12.310 UTC [msp.identity] Verify -> DEBU 1b62 Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +00000040 7f 1e c1 c8 ad 63 |.....c|" +"2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.311 UTC [gossip.discovery] isSentByMe -> DEBU 1b64 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:12.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b65 Exiting" +"2019-07-20 02:40:12.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b66 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:12.312 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" +"2019-07-20 02:40:12.312 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b69 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b6a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.313 UTC [policies] Evaluate -> DEBU 1b6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.314 UTC [cauthdsl] func1 -> DEBU 1b6e 0xc00354dc50 gate 1563590412314160000 evaluation starts" +"2019-07-20 02:40:12.314 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00354dc50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b70 0xc00354dc50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b71 0xc00354dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.315 UTC [cauthdsl] func2 -> DEBU 1b72 0xc00354dc50 principal evaluation fails" +"2019-07-20 02:40:12.316 UTC [cauthdsl] func1 -> DEBU 1b73 0xc00354dc50 gate 1563590412314160000 evaluation fails" +"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.316 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.317 UTC [cauthdsl] func1 -> DEBU 1b77 0xc00357a490 gate 1563590412317137700 evaluation starts" +"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b78 0xc00357a490 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b79 0xc00357a490 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.317 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc00357a490 principal matched by identity 0" +"2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7b Verify: digest = 00000000 96 c8 c6 7e ce 1f c8 b1 ef b8 07 eb 56 d0 d7 aa |...~........V...| +00000010 4a 4a d9 74 ae 8e 75 a4 4b 4b 7d c5 9e dd c7 a7 |JJ.t..u.KK}.....|" +"2019-07-20 02:40:12.318 UTC [msp.identity] Verify -> DEBU 1b7c Verify: sig = 00000000 30 45 02 21 00 b3 a8 f4 fb e1 17 c4 eb e2 78 0e |0E.!..........x.| +00000010 4c ef 59 f9 64 c5 f6 79 6c 21 7b 4c 36 11 88 72 |L.Y.d..yl!{L6..r| +00000020 0c 88 fd c8 9c 02 20 4c f6 d0 cb 54 00 e3 9e e5 |...... L...T....| +00000030 1d 7e 07 44 9c 16 4b 16 be 15 31 f6 f8 f5 87 58 |.~.D..K...1....X| +00000040 86 a4 e1 59 be af ec |...Y...|" +"2019-07-20 02:40:12.318 UTC [cauthdsl] func2 -> DEBU 1b7d 0xc00357a490 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.318 UTC [cauthdsl] func1 -> DEBU 1b7e 0xc00357a490 gate 1563590412317137700 evaluation succeeds" +"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b7f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.319 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b83 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b84 Exiting" +"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b85 Exiting" +"2019-07-20 02:40:12.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.321 UTC [gossip.gossip] handleMessage -> DEBU 1b87 Exiting" +"2019-07-20 02:40:12.321 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b88 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:12.321 UTC [msp.identity] Verify -> DEBU 1b89 Verify: digest = 00000000 c3 f5 70 6a 37 5f 12 ea 1c 08 f4 65 ef 91 d9 c4 |..pj7_.....e....| +00000010 d0 6c ea e0 1b 18 95 63 47 b9 fb ea 6d e1 81 ad |.l.....cG...m...|" +"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8a Verify: sig = 00000000 30 44 02 20 69 d3 f5 06 88 46 8e 0f 8b 26 08 9b |0D. i....F...&..| +00000010 a1 76 10 ff ad 1c e4 b8 eb e6 b9 2c 7d 5e fb eb |.v.........,}^..| +00000020 c4 13 3d 04 02 20 7a 81 89 07 b7 0f b6 47 54 44 |..=.. z......GTD| +00000030 73 bf c9 12 84 c5 76 82 7c c9 68 f8 98 f8 9c a1 |s.....v.|.h.....| +00000040 7f 1e c1 c8 ad 63 |.....c|" +"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:12.322 UTC [msp.identity] Verify -> DEBU 1b8c Verify: sig = 00000000 30 44 02 20 54 2e 65 d6 93 d7 c1 d0 66 50 bb 01 |0D. T.e.....fP..| +00000010 53 9c 76 4e 3a a7 3d ea de 4f 2e 55 3f 96 b0 eb |S.vN:.=..O.U?...| +00000020 06 cb 91 62 02 20 16 5c 55 3b 21 dc e0 72 c6 fd |...b. .\U;!..r..| +00000030 b5 c0 af 55 79 1e f7 77 3d e7 90 d7 5a cb 4b 4a |...Uy..w=...Z.KJ| +00000040 1f 38 45 26 f6 1a |.8E&..|" +"2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:12.323 UTC [gossip.discovery] isSentByMe -> DEBU 1b8e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:12.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8f Exiting" +"2019-07-20 02:40:12.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b90 Exiting" +"2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b91 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.363 UTC [gossip.comm] func1 -> DEBU 1b92 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b93 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.364 UTC [gossip.pull] HandleMessage -> DEBU 1b94 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.364 UTC [gossip.pull] SendDigest -> DEBU 1b95 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b96 Exiting" +"2019-07-20 02:40:12.364 UTC [gossip.gossip] handleMessage -> DEBU 1b97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.365 UTC [gossip.gossip] handleMessage -> DEBU 1b98 Exiting" +"2019-07-20 02:40:12.366 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b99 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.366 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b9a Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9b Verify: digest = 00000000 23 57 6d cb 67 c3 2b 1d 54 04 2e 4e ff d1 34 7d |#Wm.g.+.T..N..4}| +00000010 d7 e7 66 fa 16 70 4b fa 68 e1 8c b2 cc 2a 6e fa |..f..pK.h....*n.|" +"2019-07-20 02:40:12.366 UTC [msp.identity] Verify -> DEBU 1b9c Verify: sig = 00000000 30 45 02 21 00 c8 5c 77 c3 da f1 17 ec 7e fc e2 |0E.!..\w.....~..| +00000010 d5 59 46 ce e0 e9 46 ac 65 e4 3b ee 86 b2 1a a9 |.YF...F.e.;.....| +00000020 0f 53 c5 f4 28 02 20 13 84 7b 1c bb 4a 9a ec d8 |.S..(. ..{..J...| +00000030 f6 85 ac 6d 5f 6a 69 59 cc bc b0 a3 b5 56 de 70 |...m_jiY.....V.p| +00000040 99 97 b9 75 f0 27 d7 |...u.'.|" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b9d Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9f updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba0 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba1 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba2 Exiting" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ba3 Exiting" +"2019-07-20 02:40:12.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba4 Exiting" +"2019-07-20 02:40:12.369 UTC [gossip.comm] func1 -> DEBU 1ba5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.369 UTC [gossip.gossip] handleMessage -> DEBU 1ba7 Exiting" +"2019-07-20 02:40:12.369 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba8 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.369 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1baa Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +"2019-07-20 02:40:12.370 UTC [msp.identity] Verify -> DEBU 1bab Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +00000040 29 a8 53 68 a7 11 7c |).Sh..||" +"2019-07-20 02:40:12.371 UTC [msp.identity] Verify -> DEBU 1bac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:12.373 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 44 02 20 7a 2f 52 da 3d 89 6f 10 c3 4f de e2 |0D. z/R.=.o..O..| +00000010 0b 43 6f c1 1f 1f ec b9 c8 f5 85 ce c8 0f f8 16 |.Co.............| +00000020 ee 50 27 2b 02 20 06 b4 ca fc 1f a1 09 20 95 71 |.P'+. ....... .q| +00000030 9e 98 3d 8d 6b 01 1b d5 c0 cc 02 26 78 e3 c3 66 |..=.k......&x..f| +00000040 ee 82 e2 40 c7 fe |...@..|" +"2019-07-20 02:40:12.374 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb1 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1bad Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.374 UTC [gossip.gossip] handleMessage -> DEBU 1bb2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.372 UTC [msp] DeserializeIdentity -> DEBU 1bae Obtaining identity" +"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb3 Obtaining identity" +"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb4 Obtaining identity" +"2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.375 UTC [msp] DeserializeIdentity -> DEBU 1bb6 Obtaining identity" +"2019-07-20 02:40:12.375 UTC [gossip.comm] Send -> DEBU 1bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.375 UTC [gossip.comm] sendToEndpoint -> DEBU 1bb9 Exiting" +"2019-07-20 02:40:12.373 UTC [gossip.comm] func1 -> DEBU 1baf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.376 UTC [gossip.comm] sendToEndpoint -> DEBU 1bbb Exiting" +"2019-07-20 02:40:12.376 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbd updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbe Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:12.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bc0 Exiting" +"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc2 Exiting" +"2019-07-20 02:40:12.377 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc4 Exiting" +"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc5 Exiting" +"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.378 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Exiting" +"2019-07-20 02:40:12.378 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:12.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bc9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.379 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bca Exiting" +"2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" +"2019-07-20 02:40:12.379 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +"2019-07-20 02:40:12.380 UTC [gossip.comm] Send -> DEBU 1bcd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.385 UTC [gossip.discovery] sendMemResponse -> DEBU 1bce Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" secret_envelope: > alive: " +"2019-07-20 02:40:12.385 UTC [gossip.comm] sendToEndpoint -> DEBU 1bcf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.386 UTC [gossip.comm] sendToEndpoint -> DEBU 1bd0 Exiting" +"2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd1 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.552 UTC [gossip.comm] func1 -> DEBU 1bd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd4 Exiting" +"2019-07-20 02:40:12.552 UTC [gossip.gossip] handleMessage -> DEBU 1bd5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.552 UTC [gossip.pull] HandleMessage -> DEBU 1bd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.552 UTC [msp] DeserializeIdentity -> DEBU 1bd7 Obtaining identity" +"2019-07-20 02:40:12.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd8 Got message: GossipMessage: tag:EMPTY mem_req:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bda Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bdb Obtaining identity" +"2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.553 UTC [msp] DeserializeIdentity -> DEBU 1bd9 Obtaining identity" +"2019-07-20 02:40:12.554 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bdd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.555 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.556 UTC [policies] Evaluate -> DEBU 1be1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.555 UTC [gossip.comm] func1 -> DEBU 1bde Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.555 UTC [msp] DeserializeIdentity -> DEBU 1bdf Obtaining identity" +"2019-07-20 02:40:12.557 UTC [policies] Evaluate -> DEBU 1be2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.558 UTC [policies] Evaluate -> DEBU 1be3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.558 UTC [cauthdsl] func1 -> DEBU 1be4 0xc00055fac0 gate 1563590412558214000 evaluation starts" +"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be5 0xc00055fac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be6 0xc00055fac0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.558 UTC [msp] DeserializeIdentity -> DEBU 1be7 Obtaining identity" +"2019-07-20 02:40:12.558 UTC [cauthdsl] func2 -> DEBU 1be8 0xc00055fac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1be9 0xc00055fac0 principal evaluation fails" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bea 0xc00055fac0 gate 1563590412558214000 evaluation fails" +"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1beb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.559 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func1 -> DEBU 1bee 0xc003730300 gate 1563590412559502000 evaluation starts" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003730300 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003730300 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.559 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc003730300 principal matched by identity 0" +"2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| +00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" +"2019-07-20 02:40:12.559 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| +00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| +00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| +00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| +00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" +"2019-07-20 02:40:12.559 UTC [msp] DeserializeIdentity -> DEBU 1bf4 Obtaining identity" +"2019-07-20 02:40:12.560 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc003730300 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.560 UTC [cauthdsl] func1 -> DEBU 1bf7 0xc003730300 gate 1563590412559502000 evaluation succeeds" +"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.560 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.561 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bfc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:12.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bfe updating membership: timestamp: " +"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bff Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c00 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:12.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c01 Exiting" +"2019-07-20 02:40:12.560 UTC [msp] DeserializeIdentity -> DEBU 1bf6 Obtaining identity" +"2019-07-20 02:40:12.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c02 Exiting" +"2019-07-20 02:40:12.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c04 Exiting" +"2019-07-20 02:40:12.563 UTC [gossip.discovery] sendMemResponse -> DEBU 1c05 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c06 Obtaining identity" +"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c07 Obtaining identity" +"2019-07-20 02:40:12.564 UTC [msp] DeserializeIdentity -> DEBU 1c08 Obtaining identity" +"2019-07-20 02:40:12.565 UTC [gossip.comm] Send -> DEBU 1c09 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.565 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0a Exiting, replying with alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive: " +"2019-07-20 02:40:12.563 UTC [gossip.pull] SendDigest -> DEBU 1c03 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:12.566 UTC [gossip.comm] func1 -> DEBU 1c0c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.567 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0d Exiting" +"2019-07-20 02:40:12.568 UTC [gossip.comm] func1 -> DEBU 1c0e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.567 UTC [gossip.gossip] handleMessage -> DEBU 1c0f Exiting" +"2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c10 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.569 UTC [gossip.gossip] handleMessage -> DEBU 1c11 Exiting" +"2019-07-20 02:40:12.570 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c13 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c14 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:12.570 UTC [msp] DeserializeIdentity -> DEBU 1c15 Obtaining identity" +"2019-07-20 02:40:12.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c17 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.573 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.574 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.575 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc003353c60 gate 1563590412575447700 evaluation starts" +"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1d 0xc003353c60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003353c60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.576 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003353c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.577 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003353c60 principal evaluation fails" +"2019-07-20 02:40:12.578 UTC [cauthdsl] func1 -> DEBU 1c21 0xc003353c60 gate 1563590412575447700 evaluation fails" +"2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.578 UTC [policies] Evaluate -> DEBU 1c23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.579 UTC [policies] Evaluate -> DEBU 1c24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.579 UTC [cauthdsl] func1 -> DEBU 1c25 0xc003a0e4a0 gate 1563590412579715600 evaluation starts" +"2019-07-20 02:40:12.579 UTC [cauthdsl] func2 -> DEBU 1c26 0xc003a0e4a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003a0e4a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.580 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003a0e4a0 principal matched by identity 0" +"2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c29 Verify: digest = 00000000 66 b2 e9 33 b3 06 f3 39 07 4d 86 da 59 b0 71 77 |f..3...9.M..Y.qw| +00000010 7d 39 cd ea 94 b5 78 5d 7f cf 90 72 ef 81 fd 1b |}9....x]...r....|" +"2019-07-20 02:40:12.580 UTC [msp.identity] Verify -> DEBU 1c2a Verify: sig = 00000000 30 45 02 21 00 f6 4b 80 fe 8f dd 13 d4 75 98 e8 |0E.!..K......u..| +00000010 62 4c 0a 3f a4 40 ce 0e a6 37 f3 07 a8 12 7b 89 |bL.?.@...7....{.| +00000020 71 8e c3 08 97 02 20 68 c8 a5 95 a0 9a ea 4a b9 |q..... h......J.| +00000030 49 c3 90 cb d1 bc ea cc e4 de 8d aa 91 fd a0 ac |I...............| +00000040 4f 98 d6 d9 41 a2 3d |O...A.=|" +"2019-07-20 02:40:12.581 UTC [cauthdsl] func2 -> DEBU 1c2b 0xc003a0e4a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.581 UTC [cauthdsl] func1 -> DEBU 1c2c 0xc003a0e4a0 gate 1563590412579715600 evaluation succeeds" +"2019-07-20 02:40:12.581 UTC [policies] Evaluate -> DEBU 1c2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c2f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.582 UTC [policies] Evaluate -> DEBU 1c30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c32 endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" lastAliveTS: 1563590372570532900, 29 but got ts: inc_num:1563590372570532900 seq_num:28 " +"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Exiting" +"2019-07-20 02:40:12.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c34 Exiting" +"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c35 Exiting" +"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c37 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c36 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c38 Exiting" +"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3a Exiting" +"2019-07-20 02:40:12.586 UTC [gossip.gossip] handleMessage -> DEBU 1c3b Exiting" +"2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3c Obtaining identity" +"2019-07-20 02:40:12.588 UTC [msp] DeserializeIdentity -> DEBU 1c3d Obtaining identity" +"2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3e Obtaining identity" +"2019-07-20 02:40:12.589 UTC [msp] DeserializeIdentity -> DEBU 1c3f Obtaining identity" +"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c40 Obtaining identity" +"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c41 Obtaining identity" +"2019-07-20 02:40:12.590 UTC [msp] DeserializeIdentity -> DEBU 1c42 Obtaining identity" +"2019-07-20 02:40:12.591 UTC [gossip.comm] Send -> DEBU 1c43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.591 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" +"2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.591 UTC [gossip.comm] sendToEndpoint -> DEBU 1c46 Exiting" +"2019-07-20 02:40:12.592 UTC [gossip.comm] Send -> DEBU 1c47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c48 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:12.592 UTC [gossip.comm] sendToEndpoint -> DEBU 1c49 Exiting" +"2019-07-20 02:40:12.717 UTC [msp] DeserializeIdentity -> DEBU 1c4a Obtaining identity" +"2019-07-20 02:40:12.718 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +"2019-07-20 02:40:12.718 UTC [gossip.comm] Send -> DEBU 1c4c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4e Exiting" +"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c51 Exiting" +"2019-07-20 02:40:12.719 UTC [gossip.comm] sendToEndpoint -> DEBU 1c50 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.720 UTC [gossip.comm] func1 -> DEBU 1c52 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.722 UTC [gossip.comm] func1 -> DEBU 1c53 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" +"2019-07-20 02:40:12.722 UTC [gossip.gossip] handleMessage -> DEBU 1c55 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.722 UTC [msp] DeserializeIdentity -> DEBU 1c56 Obtaining identity" +"2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c57 Obtaining identity" +"2019-07-20 02:40:12.723 UTC [msp] DeserializeIdentity -> DEBU 1c58 Obtaining identity" +"2019-07-20 02:40:12.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c59 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c5b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.724 UTC [policies] Evaluate -> DEBU 1c5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c5f 0xc003be0760 gate 1563590412724456500 evaluation starts" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c60 0xc003be0760 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c61 0xc003be0760 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c62 0xc003be0760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func2 -> DEBU 1c63 0xc003be0760 principal evaluation fails" +"2019-07-20 02:40:12.724 UTC [cauthdsl] func1 -> DEBU 1c64 0xc003be0760 gate 1563590412724456500 evaluation fails" +"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c65 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.725 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.725 UTC [cauthdsl] func1 -> DEBU 1c68 0xc003be0fa0 gate 1563590412725972500 evaluation starts" +"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c69 0xc003be0fa0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc003be0fa0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.726 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc003be0fa0 principal matched by identity 0" +"2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6c Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:12.726 UTC [msp.identity] Verify -> DEBU 1c6d Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:12.727 UTC [cauthdsl] func2 -> DEBU 1c6e 0xc003be0fa0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.727 UTC [cauthdsl] func1 -> DEBU 1c6f 0xc003be0fa0 gate 1563590412725972500 evaluation succeeds" +"2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c70 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.727 UTC [policies] Evaluate -> DEBU 1c71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.729 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.729 UTC [msp.identity] Verify -> DEBU 1c74 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:12.730 UTC [msp.identity] Verify -> DEBU 1c76 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:12.730 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" +"2019-07-20 02:40:12.731 UTC [msp] DeserializeIdentity -> DEBU 1c78 Obtaining identity" +"2019-07-20 02:40:12.729 UTC [gossip.comm] func1 -> DEBU 1c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c79 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.732 UTC [policies] Evaluate -> DEBU 1c7c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.733 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.733 UTC [cauthdsl] func1 -> DEBU 1c7f 0xc000676470 gate 1563590412733754100 evaluation starts" +"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c80 0xc000676470 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c81 0xc000676470 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c82 0xc000676470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.734 UTC [cauthdsl] func2 -> DEBU 1c83 0xc000676470 principal evaluation fails" +"2019-07-20 02:40:12.734 UTC [cauthdsl] func1 -> DEBU 1c84 0xc000676470 gate 1563590412733754100 evaluation fails" +"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.735 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.735 UTC [cauthdsl] func1 -> DEBU 1c88 0xc000676cb0 gate 1563590412735845900 evaluation starts" +"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000676cb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8a 0xc000676cb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.736 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000676cb0 principal matched by identity 0" +"2019-07-20 02:40:12.736 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:12.737 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:12.737 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000676cb0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.737 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000676cb0 gate 1563590412735845900 evaluation succeeds" +"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c90 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c92 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.738 UTC [policies] Evaluate -> DEBU 1c93 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c94 Obtaining identity" +"2019-07-20 02:40:12.739 UTC [msp] DeserializeIdentity -> DEBU 1c95 Obtaining identity" +"2019-07-20 02:40:12.739 UTC [gossip.pull] Hello -> DEBU 1c96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c97 Obtaining identity" +"2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c98 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:12.740 UTC [msp] DeserializeIdentity -> DEBU 1c99 Obtaining identity" +"2019-07-20 02:40:12.740 UTC [gossip.comm] Send -> DEBU 1c9a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.741 UTC [gossip.comm] sendToEndpoint -> DEBU 1c9c Exiting" +"2019-07-20 02:40:12.742 UTC [gossip.comm] func1 -> DEBU 1c9d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.740 UTC [msp.identity] Verify -> DEBU 1c9e Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:12.743 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" +"2019-07-20 02:40:12.744 UTC [gossip.gossip] handleMessage -> DEBU 1ca0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:12.744 UTC [msp.identity] Verify -> DEBU 1ca2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca3 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:12.745 UTC [msp.identity] Verify -> DEBU 1ca4 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca5 Obtaining identity" +"2019-07-20 02:40:12.746 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" +"2019-07-20 02:40:12.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ca7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ca9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.747 UTC [policies] Evaluate -> DEBU 1caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.748 UTC [policies] Evaluate -> DEBU 1cac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.748 UTC [cauthdsl] func1 -> DEBU 1cad 0xc002ee5c20 gate 1563590412748635200 evaluation starts" +"2019-07-20 02:40:12.748 UTC [cauthdsl] func2 -> DEBU 1cae 0xc002ee5c20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1caf 0xc002ee5c20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb0 0xc002ee5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.749 UTC [cauthdsl] func2 -> DEBU 1cb1 0xc002ee5c20 principal evaluation fails" +"2019-07-20 02:40:12.749 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc002ee5c20 gate 1563590412748635200 evaluation fails" +"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.750 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.750 UTC [cauthdsl] func1 -> DEBU 1cb6 0xc003106460 gate 1563590412750893400 evaluation starts" +"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb7 0xc003106460 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc003106460 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.751 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc003106460 principal matched by identity 0" +"2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cba Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:12.752 UTC [msp.identity] Verify -> DEBU 1cbb Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:12.752 UTC [cauthdsl] func2 -> DEBU 1cbc 0xc003106460 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.753 UTC [cauthdsl] func1 -> DEBU 1cbd 0xc003106460 gate 1563590412750893400 evaluation succeeds" +"2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.753 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.754 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc2 Obtaining identity" +"2019-07-20 02:40:12.755 UTC [msp] DeserializeIdentity -> DEBU 1cc3 Obtaining identity" +"2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cc6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.756 UTC [policies] Evaluate -> DEBU 1cc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.757 UTC [cauthdsl] func1 -> DEBU 1cca 0xc003107c30 gate 1563590412757102400 evaluation starts" +"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc003107c30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc003107c30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.757 UTC [cauthdsl] func2 -> DEBU 1ccd 0xc003107c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.758 UTC [cauthdsl] func2 -> DEBU 1cce 0xc003107c30 principal evaluation fails" +"2019-07-20 02:40:12.758 UTC [cauthdsl] func1 -> DEBU 1ccf 0xc003107c30 gate 1563590412757102400 evaluation fails" +"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.758 UTC [policies] Evaluate -> DEBU 1cd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.759 UTC [cauthdsl] func1 -> DEBU 1cd3 0xc003202470 gate 1563590412759144400 evaluation starts" +"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd4 0xc003202470 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd5 0xc003202470 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.759 UTC [cauthdsl] func2 -> DEBU 1cd6 0xc003202470 principal matched by identity 0" +"2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:12.760 UTC [msp.identity] Verify -> DEBU 1cd8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:12.760 UTC [cauthdsl] func2 -> DEBU 1cd9 0xc003202470 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.761 UTC [cauthdsl] func1 -> DEBU 1cda 0xc003202470 gate 1563590412759144400 evaluation succeeds" +"2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.761 UTC [policies] Evaluate -> DEBU 1cdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cdd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.762 UTC [policies] Evaluate -> DEBU 1cde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Exiting" +"2019-07-20 02:40:12.762 UTC [gossip.gossip] handleMessage -> DEBU 1ce0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.762 UTC [msp] DeserializeIdentity -> DEBU 1ce1 Obtaining identity" +"2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce2 Obtaining identity" +"2019-07-20 02:40:12.763 UTC [msp] DeserializeIdentity -> DEBU 1ce3 Obtaining identity" +"2019-07-20 02:40:12.763 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ce4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ce6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.764 UTC [policies] Evaluate -> DEBU 1ce7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.765 UTC [policies] Evaluate -> DEBU 1ce9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.766 UTC [cauthdsl] func1 -> DEBU 1cea 0xc003203f80 gate 1563590412766367800 evaluation starts" +"2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc003203f80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.766 UTC [cauthdsl] func2 -> DEBU 1cec 0xc003203f80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1ced 0xc003203f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.767 UTC [cauthdsl] func2 -> DEBU 1cee 0xc003203f80 principal evaluation fails" +"2019-07-20 02:40:12.767 UTC [cauthdsl] func1 -> DEBU 1cef 0xc003203f80 gate 1563590412766367800 evaluation fails" +"2019-07-20 02:40:12.767 UTC [policies] Evaluate -> DEBU 1cf0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.768 UTC [policies] Evaluate -> DEBU 1cf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.768 UTC [cauthdsl] func1 -> DEBU 1cf3 0xc0032127c0 gate 1563590412768604100 evaluation starts" +"2019-07-20 02:40:12.768 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc0032127c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc0032127c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.769 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc0032127c0 principal matched by identity 0" +"2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf7 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:12.769 UTC [msp.identity] Verify -> DEBU 1cf8 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:12.770 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc0032127c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.770 UTC [cauthdsl] func1 -> DEBU 1cfa 0xc0032127c0 gate 1563590412768604100 evaluation succeeds" +"2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.771 UTC [policies] Evaluate -> DEBU 1cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.772 UTC [policies] Evaluate -> DEBU 1cfe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.772 UTC [msp.identity] Verify -> DEBU 1cff Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d00 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d01 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:12.773 UTC [msp.identity] Verify -> DEBU 1d02 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:12.774 UTC [msp] DeserializeIdentity -> DEBU 1d03 Obtaining identity" +"2019-07-20 02:40:12.775 UTC [msp] DeserializeIdentity -> DEBU 1d04 Obtaining identity" +"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d06 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d07 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:12.775 UTC [policies] Evaluate -> DEBU 1d08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:12.776 UTC [policies] Evaluate -> DEBU 1d0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:12.777 UTC [cauthdsl] func1 -> DEBU 1d0b 0xc003968dd0 gate 1563590412777229200 evaluation starts" +"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003968dd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0d 0xc003968dd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.777 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc003968dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:12.778 UTC [cauthdsl] func2 -> DEBU 1d0f 0xc003968dd0 principal evaluation fails" +"2019-07-20 02:40:12.778 UTC [cauthdsl] func1 -> DEBU 1d10 0xc003968dd0 gate 1563590412777229200 evaluation fails" +"2019-07-20 02:40:12.778 UTC [policies] Evaluate -> DEBU 1d11 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:12.779 UTC [policies] Evaluate -> DEBU 1d13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:12.779 UTC [cauthdsl] func1 -> DEBU 1d14 0xc003969610 gate 1563590412779480700 evaluation starts" +"2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d15 0xc003969610 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:12.779 UTC [cauthdsl] func2 -> DEBU 1d16 0xc003969610 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:12.780 UTC [cauthdsl] func2 -> DEBU 1d17 0xc003969610 principal matched by identity 0" +"2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d18 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:12.780 UTC [msp.identity] Verify -> DEBU 1d19 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:12.781 UTC [cauthdsl] func2 -> DEBU 1d1a 0xc003969610 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:12.781 UTC [cauthdsl] func1 -> DEBU 1d1b 0xc003969610 gate 1563590412779480700 evaluation succeeds" +"2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.781 UTC [policies] Evaluate -> DEBU 1d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:12.782 UTC [policies] Evaluate -> DEBU 1d1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d20 Exiting" +"2019-07-20 02:40:12.782 UTC [gossip.gossip] handleMessage -> DEBU 1d21 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.783 UTC [gossip.pull] HandleMessage -> DEBU 1d22 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.783 UTC [gossip.gossip] handleMessage -> DEBU 1d23 Exiting" +"2019-07-20 02:40:12.878 UTC [gossip.comm] func1 -> DEBU 1d24 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.879 UTC [gossip.gossip] handleMessage -> DEBU 1d25 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d26 Obtaining identity" +"2019-07-20 02:40:12.880 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" +"2019-07-20 02:40:12.880 UTC [gossip.gossip] handleMessage -> DEBU 1d28 Exiting" +"2019-07-20 02:40:12.899 UTC [gossip.comm] func1 -> DEBU 1d29 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.899 UTC [gossip.gossip] handleMessage -> DEBU 1d2a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.900 UTC [gossip.pull] HandleMessage -> DEBU 1d2b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:12.900 UTC [gossip.pull] SendDigest -> DEBU 1d2c Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:12.900 UTC [gossip.gossip] handleMessage -> DEBU 1d2d Exiting" +"2019-07-20 02:40:13.047 UTC [gossip.comm] func1 -> DEBU 1d2e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:13.047 UTC [gossip.gossip] handleMessage -> DEBU 1d2f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:13.047 UTC [msp] DeserializeIdentity -> DEBU 1d30 Obtaining identity" +"2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d31 Obtaining identity" +"2019-07-20 02:40:13.048 UTC [msp] DeserializeIdentity -> DEBU 1d32 Obtaining identity" +"2019-07-20 02:40:13.048 UTC [gossip.gossip] handleMessage -> DEBU 1d33 Exiting" +"2019-07-20 02:40:13.181 UTC [gossip.comm] func1 -> DEBU 1d34 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:13.184 UTC [gossip.gossip] handleMessage -> DEBU 1d35 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d36 Obtaining identity" +"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d37 Obtaining identity" +"2019-07-20 02:40:13.185 UTC [msp] DeserializeIdentity -> DEBU 1d38 Obtaining identity" +"2019-07-20 02:40:13.185 UTC [gossip.gossip] handleMessage -> DEBU 1d39 Exiting" +"2019-07-20 02:40:15.752 UTC [chaincode.platform.util] DockerBuild -> DEBU 1d3a Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-111193500/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-111193500/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +"2019-07-20 02:40:15.921 UTC [gossip.comm] func1 -> DEBU 1d3b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.922 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Exiting" +"2019-07-20 02:40:15.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d3e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d3f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:15.922 UTC [msp] DeserializeIdentity -> DEBU 1d40 Obtaining identity" +"2019-07-20 02:40:15.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d42 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:15.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d43 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d45 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:15.924 UTC [policies] Evaluate -> DEBU 1d46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:15.925 UTC [cauthdsl] func1 -> DEBU 1d47 0xc003fc5100 gate 1563590415925224500 evaluation starts" +"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d48 0xc003fc5100 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d49 0xc003fc5100 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:15.925 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc003fc5100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:15.926 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc003fc5100 principal evaluation fails" +"2019-07-20 02:40:15.926 UTC [cauthdsl] func1 -> DEBU 1d4c 0xc003fc5100 gate 1563590415925224500 evaluation fails" +"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:15.926 UTC [policies] Evaluate -> DEBU 1d4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:15.927 UTC [cauthdsl] func1 -> DEBU 1d50 0xc003fc5940 gate 1563590415927346400 evaluation starts" +"2019-07-20 02:40:15.927 UTC [cauthdsl] func2 -> DEBU 1d51 0xc003fc5940 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:15.929 UTC [cauthdsl] func2 -> DEBU 1d52 0xc003fc5940 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:15.931 UTC [cauthdsl] func2 -> DEBU 1d53 0xc003fc5940 principal matched by identity 0" +"2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d54 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| +00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" +"2019-07-20 02:40:15.931 UTC [msp.identity] Verify -> DEBU 1d55 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| +00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| +00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| +00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| +00000040 e1 ea 1b 14 b1 d0 68 |......h|" +"2019-07-20 02:40:15.932 UTC [cauthdsl] func2 -> DEBU 1d56 0xc003fc5940 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:15.932 UTC [cauthdsl] func1 -> DEBU 1d57 0xc003fc5940 gate 1563590415927346400 evaluation succeeds" +"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d58 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:15.932 UTC [policies] Evaluate -> DEBU 1d5b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:15.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5e updating membership: timestamp: " +"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5f Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:15.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d60 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:15.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d61 Exiting" +"2019-07-20 02:40:15.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d62 Exiting" +"2019-07-20 02:40:15.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d63 Exiting" +"2019-07-20 02:40:15.934 UTC [gossip.discovery] sendMemResponse -> DEBU 1d64 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:15.934 UTC [msp] DeserializeIdentity -> DEBU 1d65 Obtaining identity" +"2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d66 Obtaining identity" +"2019-07-20 02:40:15.935 UTC [msp] DeserializeIdentity -> DEBU 1d67 Obtaining identity" +"2019-07-20 02:40:15.935 UTC [gossip.comm] Send -> DEBU 1d68 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d69 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6a Exiting" +"2019-07-20 02:40:15.937 UTC [gossip.discovery] sendMemResponse -> DEBU 1d6b Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020 " signature:"0E\002!\000\371v]C\251\332\205\0333dE\367\r\004.\266\355Q\344\301[\344\006\2001f\313\252\344\377NQ\002 dL+\315\340\001t\2020@\262\r\017\235 \245*gG\032\177\215\2418\274)\250Sh\247\021|" > alive:\032\274\334\256\270\254\213\273\002 \007\224\021\\\033p\201\202=s\004Q\327\001\235\023\243\221\334\205Ja\037\356\216\205P/\251O\235\344" > alive: alive: " +"2019-07-20 02:40:15.939 UTC [gossip.comm] func1 -> DEBU 1d6c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.939 UTC [gossip.gossip] handleMessage -> DEBU 1d6d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.939 UTC [gossip.pull] HandleMessage -> DEBU 1d6e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d6f Obtaining identity" +"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d70 Obtaining identity" +"2019-07-20 02:40:15.939 UTC [msp] DeserializeIdentity -> DEBU 1d71 Obtaining identity" +"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d72 Obtaining identity" +"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d73 Obtaining identity" +"2019-07-20 02:40:15.940 UTC [msp] DeserializeIdentity -> DEBU 1d74 Obtaining identity" +"2019-07-20 02:40:15.940 UTC [gossip.pull] SendDigest -> DEBU 1d75 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:15.940 UTC [gossip.gossip] handleMessage -> DEBU 1d76 Exiting" +"2019-07-20 02:40:16.250 UTC [gossip.pull] Hello -> DEBU 1d77 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d78 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d79 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.251 UTC [gossip.pull] Hello -> DEBU 1d7b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:16.251 UTC [gossip.comm] Send -> DEBU 1d7c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7e Exiting" +"2019-07-20 02:40:16.252 UTC [gossip.comm] sendToEndpoint -> DEBU 1d7f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d80 Exiting" +"2019-07-20 02:40:16.253 UTC [gossip.comm] sendToEndpoint -> DEBU 1d81 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.254 UTC [gossip.comm] sendToEndpoint -> DEBU 1d82 Exiting" +"2019-07-20 02:40:16.255 UTC [gossip.comm] func1 -> DEBU 1d83 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.255 UTC [gossip.pull] HandleMessage -> DEBU 1d85 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.255 UTC [gossip.gossip] handleMessage -> DEBU 1d86 Exiting" +"2019-07-20 02:40:16.256 UTC [gossip.comm] func1 -> DEBU 1d87 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.256 UTC [gossip.gossip] handleMessage -> DEBU 1d88 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.256 UTC [gossip.pull] HandleMessage -> DEBU 1d89 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8a Exiting" +"2019-07-20 02:40:16.257 UTC [gossip.comm] func1 -> DEBU 1d8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.257 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.257 UTC [gossip.pull] HandleMessage -> DEBU 1d8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.258 UTC [gossip.gossip] handleMessage -> DEBU 1d8e Exiting" +"2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d8f Obtaining default signing identity" +"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d90 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101D " +"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d91 Sign: digest: EAF7A22AF5CA8E0579A0B66E67EF7FD85BB66BB3C7E606070BF191AB7011B33B " +"2019-07-20 02:40:16.292 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d92 Obtaining default signing identity" +"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:16.292 UTC [msp.identity] Sign -> DEBU 1d94 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:16.292 UTC [gossip.comm] Send -> DEBU 1d95 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.292 UTC [msp] DeserializeIdentity -> DEBU 1d96 Obtaining identity" +"2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d97 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.293 UTC [msp] DeserializeIdentity -> DEBU 1d98 Obtaining identity" +"2019-07-20 02:40:16.293 UTC [gossip.comm] Send -> DEBU 1d99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9b Exiting" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9d Exiting" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.293 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Exiting" +"2019-07-20 02:40:16.297 UTC [gossip.comm] func1 -> DEBU 1da0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.297 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" +"2019-07-20 02:40:16.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da4 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da5 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +"2019-07-20 02:40:16.298 UTC [msp.identity] Verify -> DEBU 1da6 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +00000040 ef b1 c2 24 bf d1 2d |...$..-|" +"2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.299 UTC [gossip.discovery] isSentByMe -> DEBU 1da8 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 1da9 Exiting" +"2019-07-20 02:40:16.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1daa Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:16.299 UTC [msp] DeserializeIdentity -> DEBU 1dab Obtaining identity" +"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dad Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.300 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dae Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1daf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.300 UTC [policies] Evaluate -> DEBU 1db0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.301 UTC [policies] Evaluate -> DEBU 1db1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db2 0xc003e15250 gate 1563590416301899900 evaluation starts" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db3 0xc003e15250 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db4 0xc003e15250 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db5 0xc003e15250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1db6 0xc003e15250 principal evaluation fails" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1db7 0xc003e15250 gate 1563590416301899900 evaluation fails" +"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.302 UTC [policies] Evaluate -> DEBU 1dba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func1 -> DEBU 1dbb 0xc003e15bc0 gate 1563590416302711000 evaluation starts" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbc 0xc003e15bc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbd 0xc003e15bc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.302 UTC [cauthdsl] func2 -> DEBU 1dbe 0xc003e15bc0 principal matched by identity 0" +"2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dbf Verify: digest = 00000000 93 35 0e c2 25 f8 8a 17 84 64 01 ba d1 61 30 28 |.5..%....d...a0(| +00000010 b5 d2 27 ff 33 d5 f1 4e b1 90 cd a3 fc 9b fc 89 |..'.3..N........|" +"2019-07-20 02:40:16.303 UTC [msp.identity] Verify -> DEBU 1dc0 Verify: sig = 00000000 30 45 02 21 00 97 1c 21 96 43 13 8c 1b a5 a6 8f |0E.!...!.C......| +00000010 b0 3b 1e c0 4c 6f cb e7 5d 45 3c a0 3e 1a bc dc |.;..Lo..]E<.>...| +00000020 ae b8 ac 8b bb 02 20 07 94 11 5c 1b 70 81 82 3d |...... ...\.p..=| +00000030 73 04 51 d7 01 9d 13 a3 91 dc 85 4a 61 1f ee 8e |s.Q........Ja...| +00000040 85 50 2f a9 4f 9d e4 |.P/.O..|" +"2019-07-20 02:40:16.303 UTC [cauthdsl] func2 -> DEBU 1dc1 0xc003e15bc0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.303 UTC [cauthdsl] func1 -> DEBU 1dc2 0xc003e15bc0 gate 1563590416302711000 evaluation succeeds" +"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.303 UTC [policies] Evaluate -> DEBU 1dc6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc8 Exiting" +"2019-07-20 02:40:16.304 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc9 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dca Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +"2019-07-20 02:40:16.304 UTC [msp.identity] Verify -> DEBU 1dcb Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +00000040 29 a8 53 68 a7 11 7c |).Sh..||" +"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcc Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcd Exiting" +"2019-07-20 02:40:16.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dce Exiting" +"2019-07-20 02:40:16.305 UTC [gossip.comm] func1 -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd0 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.305 UTC [gossip.gossip] handleMessage -> DEBU 1dd1 Exiting" +"2019-07-20 02:40:16.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd4 Verify: digest = 00000000 64 d7 c6 d0 f1 1c 0c 1e 78 29 b5 52 76 fc fa 48 |d.......x).Rv..H| +00000010 12 e1 61 f6 a9 22 d8 77 b3 d3 c6 51 36 df a2 ec |..a..".w...Q6...|" +"2019-07-20 02:40:16.306 UTC [msp.identity] Verify -> DEBU 1dd5 Verify: sig = 00000000 30 45 02 21 00 f9 76 5d 43 a9 da 85 1b 33 64 45 |0E.!..v]C....3dE| +00000010 f7 0d 04 2e b6 ed 51 e4 c1 5b e4 06 80 31 66 cb |......Q..[...1f.| +00000020 aa e4 ff 4e 51 02 20 64 4c 2b cd e0 01 74 82 30 |...NQ. dL+...t.0| +00000030 40 b2 0d 0f 9d 20 a5 2a 67 47 1a 7f 8d a1 38 bc |@.... .*gG....8.| +00000040 29 a8 53 68 a7 11 7c |).Sh..||" +"2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.306 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dd7 Exiting" +"2019-07-20 02:40:16.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dd9 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +"2019-07-20 02:40:16.307 UTC [msp.identity] Verify -> DEBU 1dda Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +00000040 ef b1 c2 24 bf d1 2d |...$..-|" +"2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.307 UTC [gossip.discovery] isSentByMe -> DEBU 1ddc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ddd Exiting" +"2019-07-20 02:40:16.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dde Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:16.308 UTC [msp] DeserializeIdentity -> DEBU 1ddf Obtaining identity" +"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.308 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.308 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.308 UTC [cauthdsl] func1 -> DEBU 1de6 0xc003dc1ac0 gate 1563590416308814200 evaluation starts" +"2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de7 0xc003dc1ac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.308 UTC [cauthdsl] func2 -> DEBU 1de8 0xc003dc1ac0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1de9 0xc003dc1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1dea 0xc003dc1ac0 principal evaluation fails" +"2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1deb 0xc003dc1ac0 gate 1563590416308814200 evaluation fails" +"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dec Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.309 UTC [policies] Evaluate -> DEBU 1dee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.309 UTC [cauthdsl] func1 -> DEBU 1def 0xc003d44300 gate 1563590416309552900 evaluation starts" +"2019-07-20 02:40:16.309 UTC [cauthdsl] func2 -> DEBU 1df0 0xc003d44300 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df1 0xc003d44300 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df2 0xc003d44300 principal matched by identity 0" +"2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df3 Verify: digest = 00000000 44 70 96 6d 08 eb 0e 01 af ca 46 e3 23 2e 6e 2a |Dp.m......F.#.n*| +00000010 74 22 20 a5 ee 9e 36 37 01 7a 39 01 b2 ef 07 a2 |t" ...67.z9.....|" +"2019-07-20 02:40:16.310 UTC [msp.identity] Verify -> DEBU 1df4 Verify: sig = 00000000 30 45 02 21 00 ae 53 71 0d e6 d6 d7 4e 55 75 7a |0E.!..Sq....NUuz| +00000010 1c 3a 1f f9 ea 9b 65 f2 db 7f 1d 5f d9 92 97 5f |.:....e...._..._| +00000020 ef 05 77 85 8b 02 20 1e 07 05 1f fc b7 b9 b6 e8 |..w... .........| +00000030 87 4f d1 44 d5 d4 00 14 5a 56 49 53 11 44 be 5f |.O.D....ZVIS.D._| +00000040 e1 ea 1b 14 b1 d0 68 |......h|" +"2019-07-20 02:40:16.310 UTC [cauthdsl] func2 -> DEBU 1df5 0xc003d44300 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.311 UTC [cauthdsl] func1 -> DEBU 1df6 0xc003d44300 gate 1563590416309552900 evaluation succeeds" +"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1df9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.311 UTC [policies] Evaluate -> DEBU 1dfa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:16.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dfc Exiting" +"2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dfd Exiting" +"2019-07-20 02:40:16.312 UTC [gossip.comm] func1 -> DEBU 1dfe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1dff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.312 UTC [gossip.gossip] handleMessage -> DEBU 1e00 Exiting" +"2019-07-20 02:40:16.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e01 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e02 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e03 Verify: digest = 00000000 ea f7 a2 2a f5 ca 8e 05 79 a0 b6 6e 67 ef 7f d8 |...*....y..ng...| +00000010 5b b6 6b b3 c7 e6 06 07 0b f1 91 ab 70 11 b3 3b |[.k.........p..;|" +"2019-07-20 02:40:16.313 UTC [msp.identity] Verify -> DEBU 1e04 Verify: sig = 00000000 30 45 02 21 00 f1 b2 7b e7 d5 c3 6a 5a ad c8 a3 |0E.!...{...jZ...| +00000010 ce df b0 ed 8a 9d 43 5e 93 78 47 9a f7 44 18 0d |......C^.xG..D..| +00000020 78 c3 12 fb 3d 02 20 05 a6 82 90 ae 6a 00 60 39 |x...=. .....j.`9| +00000030 f1 02 f2 b4 ef df 66 35 d2 79 f5 b2 b1 0e 9c 11 |......f5.y......| +00000040 ef b1 c2 24 bf d1 2d |...$..-|" +"2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e05 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:16.314 UTC [msp.identity] Verify -> DEBU 1e06 Verify: sig = 00000000 30 44 02 20 7f f1 98 24 6f 3d ca 92 29 ba d5 f2 |0D. ...$o=..)...| +00000010 f7 19 e4 f9 b8 9a 6d 7e 18 4c 64 f1 11 1b be 71 |......m~.Ld....q| +00000020 5f 69 1e ba 02 20 42 95 c2 21 f1 b1 c1 dd b2 5c |_i... B..!.....\| +00000030 5b ba f5 ff 92 bc f2 b8 98 ee 4d b5 db 17 fd 8c |[.........M.....| +00000040 22 a4 3f 78 a3 a7 |".?x..|" +"2019-07-20 02:40:16.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e07 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:16.315 UTC [gossip.discovery] isSentByMe -> DEBU 1e08 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:16.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e09 Exiting" +"2019-07-20 02:40:16.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0a Exiting" +"2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.373 UTC [gossip.comm] func1 -> DEBU 1e0c Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.374 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.374 UTC [gossip.pull] HandleMessage -> DEBU 1e0e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.375 UTC [gossip.pull] SendDigest -> DEBU 1e0f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e10 Exiting" +"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e11 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.375 UTC [gossip.gossip] handleMessage -> DEBU 1e12 Exiting" +"2019-07-20 02:40:16.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e13 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e14 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e15 Verify: digest = 00000000 d4 88 79 4c ab ef ec 5b 4c fc 3a 9e ed 6b 4d 0b |..yL...[L.:..kM.| +00000010 78 12 ce 61 78 05 ed 1e ea 74 26 40 4f 96 7f 21 |x..ax....t&@O..!|" +"2019-07-20 02:40:16.376 UTC [msp.identity] Verify -> DEBU 1e16 Verify: sig = 00000000 30 45 02 21 00 ff 6b 12 d9 6e bc fe cb 4e a6 87 |0E.!..k..n...N..| +00000010 1a a3 8c 53 e7 1b f2 4e 35 a5 5e fb 70 03 cf cd |...S...N5.^.p...| +00000020 df 98 12 fc 8c 02 20 6f 81 c0 48 ae 61 09 d7 fe |...... o..H.a...| +00000030 d2 5e eb 81 bd 02 12 a4 9e 76 ab d0 1d ed 52 40 |.^.......v....R@| +00000040 be 83 ab ee 51 8a e3 |....Q..|" +"2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e17 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:16.377 UTC [msp.identity] Verify -> DEBU 1e18 Verify: sig = 00000000 30 45 02 21 00 c5 1a 8f 3f 40 5f c4 67 33 2a eb |0E.!....?@_.g3*.| +00000010 ca 9d 80 53 5b a8 d3 3e 03 44 07 ca 3a 73 4e 75 |...S[..>.D..:sNu| +00000020 d4 02 79 a9 95 02 20 07 d6 08 69 cf f9 09 4e ab |..y... ...i...N.| +00000030 a8 83 77 48 68 7b e5 86 58 5c d3 b8 53 d1 0d 6f |..wHh{..X\..S..o| +00000040 67 44 ae d0 62 a0 d9 |gD..b..|" +"2019-07-20 02:40:16.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e19 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:16.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:16.381 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e1e Exiting" +"2019-07-20 02:40:16.381 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e1f Exiting" +"2019-07-20 02:40:16.382 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e20 Exiting" +"2019-07-20 02:40:16.382 UTC [gossip.discovery] sendMemResponse -> DEBU 1e21 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e22 Obtaining identity" +"2019-07-20 02:40:16.389 UTC [msp] DeserializeIdentity -> DEBU 1e23 Obtaining identity" +"2019-07-20 02:40:16.390 UTC [gossip.comm] Send -> DEBU 1e24 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.390 UTC [gossip.discovery] sendMemResponse -> DEBU 1e25 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " +"2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e26 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.390 UTC [gossip.comm] sendToEndpoint -> DEBU 1e27 Exiting" +"2019-07-20 02:40:16.551 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.554 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.554 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" +"2019-07-20 02:40:16.555 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" +"2019-07-20 02:40:16.555 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:16.555 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" +"2019-07-20 02:40:16.555 UTC [gossip.comm] func1 -> DEBU 1e33 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e34 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.556 UTC [gossip.gossip] handleMessage -> DEBU 1e35 Exiting" +"2019-07-20 02:40:16.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e36 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e37 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:16.556 UTC [msp] DeserializeIdentity -> DEBU 1e38 Obtaining identity" +"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e3b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.557 UTC [policies] Evaluate -> DEBU 1e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.557 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc003c5c0b0 gate 1563590416557187600 evaluation starts" +"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003c5c0b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e41 0xc003c5c0b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.557 UTC [cauthdsl] func2 -> DEBU 1e42 0xc003c5c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.558 UTC [cauthdsl] func2 -> DEBU 1e43 0xc003c5c0b0 principal evaluation fails" +"2019-07-20 02:40:16.558 UTC [cauthdsl] func1 -> DEBU 1e44 0xc003c5c0b0 gate 1563590416557187600 evaluation fails" +"2019-07-20 02:40:16.558 UTC [policies] Evaluate -> DEBU 1e45 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e47 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e48 0xc003c5c900 gate 1563590416559132400 evaluation starts" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e49 0xc003c5c900 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc003c5c900 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc003c5c900 principal matched by identity 0" +"2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4c Verify: digest = 00000000 61 a3 4c 02 09 c8 78 79 d5 52 cf cd c1 b5 88 0d |a.L...xy.R......| +00000010 9c 8e b8 05 37 19 ef af 13 62 ce ee 3d 5b f8 dd |....7....b..=[..|" +"2019-07-20 02:40:16.559 UTC [msp.identity] Verify -> DEBU 1e4d Verify: sig = 00000000 30 44 02 20 0f cb ae d7 9d 43 db d7 6b 83 72 5b |0D. .....C..k.r[| +00000010 30 9c ae d6 c3 a9 46 c1 82 2c 7e 40 77 7b c0 44 |0.....F..,~@w{.D| +00000020 62 c5 a3 ab 02 20 2b 76 9d f6 21 dd e2 da f0 c7 |b.... +v..!.....| +00000030 ea 69 d3 40 25 84 b9 cb 68 43 69 26 c2 39 b8 2e |.i.@%...hCi&.9..| +00000040 2a bb af f6 89 1e |*.....|" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc003c5c900 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.559 UTC [cauthdsl] func1 -> DEBU 1e4f 0xc003c5c900 gate 1563590416559132400 evaluation succeeds" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e50 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e52 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.559 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e54 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 updating membership: timestamp: " +"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:16.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:16.560 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e59 Exiting" +"2019-07-20 02:40:16.560 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e5a Exiting" +"2019-07-20 02:40:16.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Exiting" +"2019-07-20 02:40:16.561 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:16.561 UTC [msp] DeserializeIdentity -> DEBU 1e5d Obtaining identity" +"2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5e Obtaining identity" +"2019-07-20 02:40:16.562 UTC [msp] DeserializeIdentity -> DEBU 1e5f Obtaining identity" +"2019-07-20 02:40:16.562 UTC [gossip.comm] Send -> DEBU 1e60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.562 UTC [gossip.discovery] sendMemResponse -> DEBU 1e61 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: alive: " +"2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e62 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.562 UTC [gossip.comm] sendToEndpoint -> DEBU 1e63 Exiting" +"2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +"2019-07-20 02:40:16.721 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +"2019-07-20 02:40:16.721 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e68 Exiting" +"2019-07-20 02:40:16.721 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6a Exiting" +"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.722 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6c Exiting" +"2019-07-20 02:40:16.723 UTC [gossip.comm] func1 -> DEBU 1e6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.723 UTC [gossip.gossip] handleMessage -> DEBU 1e6e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e6f Obtaining identity" +"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e70 Obtaining identity" +"2019-07-20 02:40:16.723 UTC [msp] DeserializeIdentity -> DEBU 1e71 Obtaining identity" +"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e73 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e74 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e78 0xc003bb2470 gate 1563590416726517700 evaluation starts" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e79 0xc003bb2470 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc003bb2470 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc003bb2470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func2 -> DEBU 1e7c 0xc003bb2470 principal evaluation fails" +"2019-07-20 02:40:16.726 UTC [cauthdsl] func1 -> DEBU 1e7d 0xc003bb2470 gate 1563590416726517700 evaluation fails" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.726 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e81 0xc003bb2cd0 gate 1563590416727128300 evaluation starts" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e82 0xc003bb2cd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e83 0xc003bb2cd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e84 0xc003bb2cd0 principal matched by identity 0" +"2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e85 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:16.727 UTC [msp.identity] Verify -> DEBU 1e86 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func2 -> DEBU 1e87 0xc003bb2cd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.727 UTC [cauthdsl] func1 -> DEBU 1e88 0xc003bb2cd0 gate 1563590416727128300 evaluation succeeds" +"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.727 UTC [policies] Evaluate -> DEBU 1e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8d Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8e Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e8f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:16.728 UTC [msp.identity] Verify -> DEBU 1e90 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e91 Obtaining identity" +"2019-07-20 02:40:16.729 UTC [msp] DeserializeIdentity -> DEBU 1e92 Obtaining identity" +"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e94 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e95 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.729 UTC [policies] Evaluate -> DEBU 1e97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e99 0xc003b67400 gate 1563590416730027400 evaluation starts" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9a 0xc003b67400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9b 0xc003b67400 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc003b67400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1e9d 0xc003b67400 principal evaluation fails" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1e9e 0xc003b67400 gate 1563590416730027400 evaluation fails" +"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1e9f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.730 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func1 -> DEBU 1ea2 0xc003b67c40 gate 1563590416730842400 evaluation starts" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea3 0xc003b67c40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.730 UTC [cauthdsl] func2 -> DEBU 1ea4 0xc003b67c40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc003b67c40 principal matched by identity 0" +"2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea6 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:16.731 UTC [msp.identity] Verify -> DEBU 1ea7 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:16.731 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc003b67c40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.731 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc003b67c40 gate 1563590416730842400 evaluation succeeds" +"2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eaa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.731 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1eac Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.732 UTC [policies] Evaluate -> DEBU 1ead == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eae Exiting" +"2019-07-20 02:40:16.732 UTC [gossip.comm] func1 -> DEBU 1eaf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.732 UTC [gossip.gossip] handleMessage -> DEBU 1eb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.733 UTC [msp] DeserializeIdentity -> DEBU 1eb1 Obtaining identity" +"2019-07-20 02:40:16.736 UTC [msp] DeserializeIdentity -> DEBU 1eb2 Obtaining identity" +"2019-07-20 02:40:16.737 UTC [msp] DeserializeIdentity -> DEBU 1eb3 Obtaining identity" +"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eb4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eb6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.739 UTC [policies] Evaluate -> DEBU 1eb7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.741 UTC [policies] Evaluate -> DEBU 1eb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1eba 0xc003aa58d0 gate 1563590416742339500 evaluation starts" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebb 0xc003aa58d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebc 0xc003aa58d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebd 0xc003aa58d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func2 -> DEBU 1ebe 0xc003aa58d0 principal evaluation fails" +"2019-07-20 02:40:16.747 UTC [cauthdsl] func1 -> DEBU 1ebf 0xc003aa58d0 gate 1563590416742339500 evaluation fails" +"2019-07-20 02:40:16.747 UTC [policies] Evaluate -> DEBU 1ec0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.748 UTC [policies] Evaluate -> DEBU 1ec2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec3 Obtaining identity" +"2019-07-20 02:40:16.748 UTC [msp] DeserializeIdentity -> DEBU 1ec4 Obtaining identity" +"2019-07-20 02:40:16.749 UTC [gossip.pull] Hello -> DEBU 1ec5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" +"2019-07-20 02:40:16.749 UTC [msp] DeserializeIdentity -> DEBU 1ec7 Obtaining identity" +"2019-07-20 02:40:16.749 UTC [gossip.comm] Send -> DEBU 1ec8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1ec9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1eca Exiting" +"2019-07-20 02:40:16.749 UTC [gossip.comm] func1 -> DEBU 1ecb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.748 UTC [cauthdsl] func1 -> DEBU 1ecc 0xc003a8c110 gate 1563590416748113900 evaluation starts" +"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecd 0xc003a8c110 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ece 0xc003a8c110 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.749 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc003a8c110 principal matched by identity 0" +"2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:16.749 UTC [msp.identity] Verify -> DEBU 1ed1 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:16.750 UTC [cauthdsl] func2 -> DEBU 1ed2 0xc003a8c110 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.750 UTC [cauthdsl] func1 -> DEBU 1ed3 0xc003a8c110 gate 1563590416748113900 evaluation succeeds" +"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.750 UTC [policies] Evaluate -> DEBU 1ed7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed8 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:16.750 UTC [msp.identity] Verify -> DEBU 1ed9 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1eda Obtaining identity" +"2019-07-20 02:40:16.751 UTC [msp] DeserializeIdentity -> DEBU 1edb Obtaining identity" +"2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1edd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.755 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ede Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.755 UTC [policies] Evaluate -> DEBU 1edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.756 UTC [policies] Evaluate -> DEBU 1ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.756 UTC [cauthdsl] func1 -> DEBU 1ee2 0xc0039c2b00 gate 1563590416756518800 evaluation starts" +"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee3 0xc0039c2b00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee4 0xc0039c2b00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.757 UTC [cauthdsl] func2 -> DEBU 1ee5 0xc0039c2b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.758 UTC [cauthdsl] func2 -> DEBU 1ee6 0xc0039c2b00 principal evaluation fails" +"2019-07-20 02:40:16.758 UTC [cauthdsl] func1 -> DEBU 1ee7 0xc0039c2b00 gate 1563590416756518800 evaluation fails" +"2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.758 UTC [policies] Evaluate -> DEBU 1ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.759 UTC [policies] Evaluate -> DEBU 1eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.760 UTC [cauthdsl] func1 -> DEBU 1eeb 0xc0039c3340 gate 1563590416760566000 evaluation starts" +"2019-07-20 02:40:16.760 UTC [cauthdsl] func2 -> DEBU 1eec 0xc0039c3340 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eed 0xc0039c3340 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.761 UTC [cauthdsl] func2 -> DEBU 1eee 0xc0039c3340 principal matched by identity 0" +"2019-07-20 02:40:16.761 UTC [msp.identity] Verify -> DEBU 1eef Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:16.762 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:16.762 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc0039c3340 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.762 UTC [cauthdsl] func1 -> DEBU 1ef2 0xc0039c3340 gate 1563590416760566000 evaluation succeeds" +"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.762 UTC [policies] Evaluate -> DEBU 1ef6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef7 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:16.763 UTC [msp.identity] Verify -> DEBU 1ef8 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1ef9 Exiting" +"2019-07-20 02:40:16.765 UTC [gossip.gossip] handleMessage -> DEBU 1efa Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efb Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:16.766 UTC [msp.identity] Verify -> DEBU 1efc Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efd Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:16.767 UTC [msp.identity] Verify -> DEBU 1efe Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1eff Obtaining identity" +"2019-07-20 02:40:16.768 UTC [msp] DeserializeIdentity -> DEBU 1f00 Obtaining identity" +"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f02 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.769 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f03 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.770 UTC [policies] Evaluate -> DEBU 1f04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.772 UTC [policies] Evaluate -> DEBU 1f05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.773 UTC [policies] Evaluate -> DEBU 1f06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.774 UTC [cauthdsl] func1 -> DEBU 1f07 0xc0039382d0 gate 1563590416774009200 evaluation starts" +"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f08 0xc0039382d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f09 0xc0039382d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.774 UTC [cauthdsl] func2 -> DEBU 1f0a 0xc0039382d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f0b 0xc0039382d0 principal evaluation fails" +"2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f0c 0xc0039382d0 gate 1563590416774009200 evaluation fails" +"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.775 UTC [policies] Evaluate -> DEBU 1f0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.775 UTC [cauthdsl] func1 -> DEBU 1f10 0xc003938b10 gate 1563590416775804700 evaluation starts" +"2019-07-20 02:40:16.775 UTC [cauthdsl] func2 -> DEBU 1f11 0xc003938b10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f12 0xc003938b10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f13 0xc003938b10 principal matched by identity 0" +"2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f14 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:16.776 UTC [msp.identity] Verify -> DEBU 1f15 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:16.776 UTC [cauthdsl] func2 -> DEBU 1f16 0xc003938b10 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.776 UTC [cauthdsl] func1 -> DEBU 1f17 0xc003938b10 gate 1563590416775804700 evaluation succeeds" +"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.776 UTC [policies] Evaluate -> DEBU 1f1a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1c Obtaining identity" +"2019-07-20 02:40:16.777 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" +"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.777 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00392c2f0 gate 1563590416778246900 evaluation starts" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00392c2f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00392c2f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00392c2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00392c2f0 principal evaluation fails" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00392c2f0 gate 1563590416778246900 evaluation fails" +"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.778 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.778 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc00392cb40 gate 1563590416778963500 evaluation starts" +"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc00392cb40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc00392cb40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f30 0xc00392cb40 principal matched by identity 0" +"2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:16.779 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:16.779 UTC [cauthdsl] func2 -> DEBU 1f33 0xc00392cb40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.779 UTC [cauthdsl] func1 -> DEBU 1f34 0xc00392cb40 gate 1563590416778963500 evaluation succeeds" +"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.779 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.780 UTC [gossip.gossip] handleMessage -> DEBU 1f39 Exiting" +"2019-07-20 02:40:16.780 UTC [gossip.election] waitForInterrupt -> DEBU 1f3a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:16.781 UTC [gossip.election] IsLeader -> DEBU 1f3c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:16.781 UTC [msp] GetDefaultSigningIdentity -> DEBU 1f3d Obtaining default signing identity" +"2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510081801 " +"2019-07-20 02:40:16.782 UTC [msp.identity] Sign -> DEBU 1f3f Sign: digest: 72C061B50037B049C617D6280701E32A01DAC65D803A3817D50E2C07CBCF1128 " +"2019-07-20 02:40:16.783 UTC [gossip.election] waitForInterrupt -> DEBU 1f40 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:16.780 UTC [gossip.comm] func1 -> DEBU 1f3b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.783 UTC [gossip.gossip] handleMessage -> DEBU 1f41 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.783 UTC [gossip.pull] HandleMessage -> DEBU 1f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.784 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" +"2019-07-20 02:40:16.791 UTC [msp] DeserializeIdentity -> DEBU 1f44 Obtaining identity" +"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f45 Obtaining identity" +"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f46 Obtaining identity" +"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f47 Obtaining identity" +"2019-07-20 02:40:16.792 UTC [gossip.comm] Send -> DEBU 1f48 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f49 Obtaining identity" +"2019-07-20 02:40:16.792 UTC [msp] DeserializeIdentity -> DEBU 1f4a Obtaining identity" +"2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.793 UTC [gossip.comm] sendToEndpoint -> DEBU 1f4c Exiting" +"2019-07-20 02:40:16.881 UTC [gossip.comm] func1 -> DEBU 1f4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.881 UTC [gossip.gossip] handleMessage -> DEBU 1f4e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.881 UTC [msp] DeserializeIdentity -> DEBU 1f4f Obtaining identity" +"2019-07-20 02:40:16.882 UTC [msp] DeserializeIdentity -> DEBU 1f50 Obtaining identity" +"2019-07-20 02:40:16.882 UTC [gossip.gossip] handleMessage -> DEBU 1f51 Exiting" +"2019-07-20 02:40:16.900 UTC [gossip.comm] func1 -> DEBU 1f52 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f53 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.900 UTC [gossip.pull] HandleMessage -> DEBU 1f54 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.900 UTC [gossip.pull] SendDigest -> DEBU 1f55 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:16.900 UTC [gossip.gossip] handleMessage -> DEBU 1f56 Exiting" +"2019-07-20 02:40:16.916 UTC [gossip.comm] func1 -> DEBU 1f57 Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f58 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.916 UTC [gossip.gossip] handleMessage -> DEBU 1f59 Exiting" +"2019-07-20 02:40:16.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f5a Got message: GossipMessage: nonce:8464964237863176812 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\023" signature:"0D\002 \033\013\263\371(J!(\371\n\366\247kI\357\234\334>=x\347I\336\211U{\314\254@~\263B\002 \003U<\0222\nF\357\301>v\211\330\037\304!oA2\332\211\333@\230\016\031\203\254r\330\336\032" secret_envelope: > > , Envelope: 280 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f5b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5c Verify: digest = 00000000 cc 35 f5 ac a4 a9 a4 14 67 4a 65 c3 39 7e 1b 4c |.5......gJe.9~.L| +00000010 b4 ca 28 e0 ed 43 61 87 bf c3 02 2b dc 47 31 8b |..(..Ca....+.G1.|" +"2019-07-20 02:40:16.917 UTC [msp.identity] Verify -> DEBU 1f5d Verify: sig = 00000000 30 44 02 20 1b 0b b3 f9 28 4a 21 28 f9 0a f6 a7 |0D. ....(J!(....| +00000010 6b 49 ef 9c dc 3e 3d 78 e7 49 de 89 55 7b cc ac |kI...>=x.I..U{..| +00000020 40 7e b3 42 02 20 03 55 3c 12 32 0a 46 ef c1 3e |@~.B. .U<.2.F..>| +00000030 76 89 d8 1f c4 21 6f 41 32 da 89 db 40 98 0e 19 |v....!oA2...@...| +00000040 83 ac 72 d8 de 1a |..r...|" +"2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:16.918 UTC [msp.identity] Verify -> DEBU 1f5f Verify: sig = 00000000 30 44 02 20 59 aa 69 60 a2 b7 28 11 ed 8e c6 e0 |0D. Y.i`..(.....| +00000010 9d 39 d7 71 f5 7a 50 15 2e ff 79 5b 2c 82 76 c3 |.9.q.zP...y[,.v.| +00000020 44 9d 41 10 02 20 08 02 8e a9 c9 63 76 d1 a3 9b |D.A.. .....cv...| +00000030 1d d8 aa ff c3 c1 1d 85 be 4a 0b 7b ad 3d 2b f2 |.........J.{.=+.| +00000040 f0 a1 ae 0e d6 80 |......|" +"2019-07-20 02:40:16.918 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f60 Exiting" +"2019-07-20 02:40:16.919 UTC [gossip.discovery] sendMemResponse -> DEBU 1f61 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f62 Obtaining identity" +"2019-07-20 02:40:16.920 UTC [msp] DeserializeIdentity -> DEBU 1f63 Obtaining identity" +"2019-07-20 02:40:16.921 UTC [gossip.comm] Send -> DEBU 1f64 Entering, sending GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:16.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1f65 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" secret_envelope:\003D\007\312:sNu\324\002y\251\225\002 \007\326\010i\317\371\tN\253\250\203wHh{\345\206X\\\323\270S\321\rogD\256\320b\240\331" > > alive: " +"2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f66 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 8464964237863176812, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" +"2019-07-20 02:40:16.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1f67 Exiting" +"2019-07-20 02:40:16.923 UTC [gossip.comm] func1 -> DEBU 1f68 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.923 UTC [gossip.gossip] handleMessage -> DEBU 1f69 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.924 UTC [gossip.gossip] handleMessage -> DEBU 1f6a Exiting" +"2019-07-20 02:40:16.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6c Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:16.924 UTC [msp] DeserializeIdentity -> DEBU 1f6d Obtaining identity" +"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.924 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f70 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:16.924 UTC [policies] Evaluate -> DEBU 1f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f74 0xc0037d9190 gate 1563590416925101500 evaluation starts" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f75 0xc0037d9190 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f76 0xc0037d9190 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f77 0xc0037d9190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func2 -> DEBU 1f78 0xc0037d9190 principal evaluation fails" +"2019-07-20 02:40:16.925 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0037d9190 gate 1563590416925101500 evaluation fails" +"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:16.925 UTC [policies] Evaluate -> DEBU 1f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f7d 0xc0037d9b00 gate 1563590416926021500 evaluation starts" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0037d9b00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f7f 0xc0037d9b00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f80 0xc0037d9b00 principal matched by identity 0" +"2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f81 Verify: digest = 00000000 6f 20 d1 54 54 e5 8d cd 14 6f 29 8a b0 8d 95 d0 |o .TT....o).....| +00000010 79 06 49 40 e2 b7 79 61 a1 4e e7 45 b0 b6 63 94 |y.I@..ya.N.E..c.|" +"2019-07-20 02:40:16.926 UTC [msp.identity] Verify -> DEBU 1f82 Verify: sig = 00000000 30 44 02 20 0d fd 3d 30 79 8b 3f 71 79 fe 7e c4 |0D. ..=0y.?qy.~.| +00000010 f5 8b 90 0f 6d 3d ba cb dd 7e 38 02 35 f8 00 7c |....m=...~8.5..|| +00000020 44 13 d1 5a 02 20 2d 08 29 5e 88 60 a5 df 74 42 |D..Z. -.)^.`..tB| +00000030 d5 86 92 f6 b4 c1 56 80 49 14 fe 08 f8 5d ac 40 |......V.I....].@| +00000040 58 94 67 ac 1a 38 |X.g..8|" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func2 -> DEBU 1f83 0xc0037d9b00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:16.926 UTC [cauthdsl] func1 -> DEBU 1f84 0xc0037d9b00 gate 1563590416926021500 evaluation succeeds" +"2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.926 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f87 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:16.927 UTC [policies] Evaluate -> DEBU 1f88 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:16.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f89 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8b updating membership: timestamp: " +"2019-07-20 02:40:16.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8c Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:16.928 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f8e Exiting" +"2019-07-20 02:40:16.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8f Exiting" +"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f90 Exiting" +"2019-07-20 02:40:16.929 UTC [gossip.comm] func1 -> DEBU 1f91 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f92 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.929 UTC [gossip.gossip] handleMessage -> DEBU 1f93 Exiting" +"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f95 Exiting" +"2019-07-20 02:40:16.930 UTC [gossip.comm] func1 -> DEBU 1f96 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f97 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.930 UTC [gossip.gossip] handleMessage -> DEBU 1f98 Exiting" +"2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f99 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9a Exiting" +"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9b Obtaining identity" +"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9c Obtaining identity" +"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9d Obtaining identity" +"2019-07-20 02:40:16.932 UTC [msp] DeserializeIdentity -> DEBU 1f9e Obtaining identity" +"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1f9f Obtaining identity" +"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa0 Obtaining identity" +"2019-07-20 02:40:16.933 UTC [msp] DeserializeIdentity -> DEBU 1fa1 Obtaining identity" +"2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:16.934 UTC [msp] DeserializeIdentity -> DEBU 1fa3 Obtaining identity" +"2019-07-20 02:40:16.934 UTC [gossip.comm] Send -> DEBU 1fa4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa6 Exiting" +"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:16.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa8 Exiting" +"2019-07-20 02:40:17.057 UTC [gossip.comm] func1 -> DEBU 1fa9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.058 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.058 UTC [msp] DeserializeIdentity -> DEBU 1fab Obtaining identity" +"2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fac Obtaining identity" +"2019-07-20 02:40:17.059 UTC [msp] DeserializeIdentity -> DEBU 1fad Obtaining identity" +"2019-07-20 02:40:17.060 UTC [gossip.gossip] handleMessage -> DEBU 1fae Exiting" +"2019-07-20 02:40:17.182 UTC [gossip.comm] func1 -> DEBU 1faf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.182 UTC [gossip.gossip] handleMessage -> DEBU 1fb0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" +"2019-07-20 02:40:17.182 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" +"2019-07-20 02:40:17.183 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +"2019-07-20 02:40:17.183 UTC [gossip.gossip] handleMessage -> DEBU 1fb4 Exiting" +"2019-07-20 02:40:17.198 UTC [gossip.comm] func1 -> DEBU 1fb5 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.198 UTC [gossip.gossip] handleMessage -> DEBU 1fb7 Exiting" +"2019-07-20 02:40:17.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb8 Got message: GossipMessage: nonce:9439307332943569821 tag:EMPTY mem_req:\374\343\245\002 \\\305\005o\033\376\344\270Wh+\213*\361]K\256\334\3775\201\207&!\377\327\032\017\340\302N\327" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fb9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:17.198 UTC [msp] DeserializeIdentity -> DEBU 1fba Obtaining identity" +"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fbb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fbd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fbf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:17.199 UTC [policies] Evaluate -> DEBU 1fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc1 0xc0036c4420 gate 1563590417199586800 evaluation starts" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc2 0xc0036c4420 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc3 0xc0036c4420 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc4 0xc0036c4420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func2 -> DEBU 1fc5 0xc0036c4420 principal evaluation fails" +"2019-07-20 02:40:17.199 UTC [cauthdsl] func1 -> DEBU 1fc6 0xc0036c4420 gate 1563590417199586800 evaluation fails" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fca 0xc0036c4c70 gate 1563590417200134700 evaluation starts" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcb 0xc0036c4c70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcc 0xc0036c4c70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fcd 0xc0036c4c70 principal matched by identity 0" +"2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fce Verify: digest = 00000000 ed 7b 4d 70 98 46 1b c4 26 38 67 46 2b e8 f7 ee |.{Mp.F..&8gF+...| +00000010 e9 fe bf f7 97 9c fb 5c 5d 41 75 7d 10 21 3c 16 |.......\]Au}.!<.|" +"2019-07-20 02:40:17.200 UTC [msp.identity] Verify -> DEBU 1fcf Verify: sig = 00000000 30 45 02 21 00 ee 7f 00 3b f4 4c 90 d6 03 4f 4e |0E.!....;.L...ON| +00000010 e3 33 89 44 c6 7d 49 6d 81 e2 5c f4 e6 f4 f6 0d |.3.D.}Im..\.....| +00000020 5f 3e fc e3 a5 02 20 5c c5 05 6f 1b fe e4 b8 57 |_>.... \..o....W| +00000030 68 2b 8b 2a f1 5d 4b ae dc ff 35 81 87 26 21 ff |h+.*.]K...5..&!.| +00000040 d7 1a 0f e0 c2 4e d7 |.....N.|" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func2 -> DEBU 1fd0 0xc0036c4c70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:17.200 UTC [cauthdsl] func1 -> DEBU 1fd1 0xc0036c4c70 gate 1563590417200134700 evaluation succeeds" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.200 UTC [policies] Evaluate -> DEBU 1fd4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:17.201 UTC [policies] Evaluate -> DEBU 1fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:17.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fd6 Exiting" +"2019-07-20 02:40:17.201 UTC [gossip.discovery] sendMemResponse -> DEBU 1fd7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd8 Obtaining identity" +"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fd9 Obtaining identity" +"2019-07-20 02:40:17.201 UTC [msp] DeserializeIdentity -> DEBU 1fda Obtaining identity" +"2019-07-20 02:40:17.201 UTC [gossip.comm] Send -> DEBU 1fdb Entering, sending GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:17.202 UTC [gossip.discovery] sendMemResponse -> DEBU 1fdc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020!" signature:"0E\002!\000\377k\022\331n\274\376\313N\246\207\032\243\214S\347\033\362N5\245^\373p\003\317\315\337\230\022\374\214\002 o\201\300H\256a\t\327\376\322^\353\201\275\002\022\244\236v\253\320\035\355R@\276\203\253\356Q\212\343" > alive: alive: " +"2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9439307332943569821, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fde Exiting" +"2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fdf Obtaining default signing identity" +"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101E " +"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe1 Sign: digest: AAF36FAB600E8E5D6DFD21332E6C75166CB3FE373AC44A50CD1CD54E3F06C093 " +"2019-07-20 02:40:17.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fe2 Obtaining default signing identity" +"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:17.237 UTC [msp.identity] Sign -> DEBU 1fe4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:17.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fe5 Sleeping 5s" +"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe6 Obtaining identity" +"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe7 Obtaining identity" +"2019-07-20 02:40:17.244 UTC [msp] DeserializeIdentity -> DEBU 1fe8 Obtaining identity" +"2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fe9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:17.244 UTC [gossip.comm] Send -> DEBU 1fea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:17.245 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" +"2019-07-20 02:40:17.245 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fed Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Exiting" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff0 Exiting" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff2 Exiting" +"2019-07-20 02:40:17.361 UTC [gossip.comm] func1 -> DEBU 1ff3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.362 UTC [gossip.gossip] handleMessage -> DEBU 1ff5 Exiting" +"2019-07-20 02:40:17.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ff6 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.362 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ff7 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 0d 6e 69 b8 fb 0f 8c 32 85 95 ab 75 32 b2 e4 bd |.ni....2...u2...| +00000010 a6 9a b4 b6 36 ad d9 a8 a4 ee 55 fe 0a 63 f2 0c |....6.....U..c..|" +"2019-07-20 02:40:17.362 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 44 02 20 5d 4e 0e 9a cf 91 95 00 ca 60 15 91 |0D. ]N.......`..| +00000010 1d 35 18 08 83 81 13 37 91 87 8b 8a 37 f9 b6 67 |.5.....7....7..g| +00000020 aa 87 e5 47 02 20 07 17 ea 01 93 e6 d3 27 36 b2 |...G. .......'6.| +00000030 b8 ee 42 d4 15 f0 35 a9 88 dc 8f 89 73 5e 14 46 |..B...5.....s^.F| +00000040 a4 f9 c8 ec 3e 2e |....>.|" +"2019-07-20 02:40:17.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ffa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ffe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:17.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fff Exiting" +"2019-07-20 02:40:17.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 2000 Exiting" +"2019-07-20 02:40:17.364 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2001 Exiting" +"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2002 Obtaining identity" +"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2003 Obtaining identity" +"2019-07-20 02:40:17.368 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" +"2019-07-20 02:40:17.369 UTC [gossip.comm] Send -> DEBU 2005 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:17.369 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" +"2019-07-20 02:40:17.370 UTC [gossip.comm] Send -> DEBU 2007 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:17.370 UTC [gossip.comm] sendToEndpoint -> DEBU 2008 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.371 UTC [gossip.comm] sendToEndpoint -> DEBU 2009 Exiting" +"2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.372 UTC [gossip.comm] sendToEndpoint -> DEBU 200b Exiting" +"2019-07-20 02:40:17.372 UTC [gossip.comm] func1 -> DEBU 200c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.373 UTC [gossip.gossip] handleMessage -> DEBU 200e Exiting" +"2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2010 Exiting" +"2019-07-20 02:40:17.374 UTC [gossip.comm] func1 -> DEBU 2011 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2012 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.375 UTC [gossip.gossip] handleMessage -> DEBU 2013 Exiting" +"2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2014 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:17.376 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2015 Exiting" +"2019-07-20 02:40:17.408 UTC [gossip.comm] func1 -> DEBU 2016 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2017 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.408 UTC [gossip.gossip] handleMessage -> DEBU 2018 Exiting" +"2019-07-20 02:40:17.408 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2019 Got message: GossipMessage: nonce:15329209394983020561 tag:EMPTY mem_req:\230#\014]'\301;P4\267\232\\\032\360f3Q-\360\240\246}\361\311:^\002 w\350\3200\327\206I\203\213\223\224\026\371]\312\270\356B\334W$\265\231\377R\331\337q\370\301\272\211" > > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.408 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 201a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:17.408 UTC [msp] DeserializeIdentity -> DEBU 201b Obtaining identity" +"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 201c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 201e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 201f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2020 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:17.409 UTC [policies] Evaluate -> DEBU 2021 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:17.410 UTC [cauthdsl] func1 -> DEBU 2022 0xc003687320 gate 1563590417410060500 evaluation starts" +"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2023 0xc003687320 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2024 0xc003687320 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.410 UTC [cauthdsl] func2 -> DEBU 2025 0xc003687320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:17.411 UTC [cauthdsl] func2 -> DEBU 2026 0xc003687320 principal evaluation fails" +"2019-07-20 02:40:17.411 UTC [cauthdsl] func1 -> DEBU 2027 0xc003687320 gate 1563590417410060500 evaluation fails" +"2019-07-20 02:40:17.411 UTC [policies] Evaluate -> DEBU 2028 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.412 UTC [policies] Evaluate -> DEBU 2029 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.413 UTC [policies] Evaluate -> DEBU 202a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:17.413 UTC [cauthdsl] func1 -> DEBU 202b 0xc003687b60 gate 1563590417413050900 evaluation starts" +"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202c 0xc003687b60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202d 0xc003687b60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.413 UTC [cauthdsl] func2 -> DEBU 202e 0xc003687b60 principal matched by identity 0" +"2019-07-20 02:40:17.413 UTC [msp.identity] Verify -> DEBU 202f Verify: digest = 00000000 8a 2b f9 43 5b 7a ef 10 f4 24 ff a7 f6 54 4d af |.+.C[z...$...TM.| +00000010 ae 4b 85 11 6d 31 72 f5 50 32 2c 76 c5 a6 bb 21 |.K..m1r.P2,v...!|" +"2019-07-20 02:40:17.414 UTC [msp.identity] Verify -> DEBU 2030 Verify: sig = 00000000 30 45 02 21 00 bf f5 f2 c7 b0 3e 98 23 0c 5d 27 |0E.!......>.#.]'| +00000010 c1 3b 50 34 b7 9a 5c 1a f0 66 33 51 2d f0 a0 a6 |.;P4..\..f3Q-...| +00000020 7d f1 c9 3a 5e 02 20 77 e8 d0 30 d7 86 49 83 8b |}..:^. w..0..I..| +00000030 93 94 16 f9 5d ca b8 ee 42 dc 57 24 b5 99 ff 52 |....]...B.W$...R| +00000040 d9 df 71 f8 c1 ba 89 |..q....|" +"2019-07-20 02:40:17.414 UTC [cauthdsl] func2 -> DEBU 2031 0xc003687b60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:17.414 UTC [cauthdsl] func1 -> DEBU 2032 0xc003687b60 gate 1563590417413050900 evaluation succeeds" +"2019-07-20 02:40:17.414 UTC [policies] Evaluate -> DEBU 2033 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2034 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2035 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:17.415 UTC [policies] Evaluate -> DEBU 2036 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:17.415 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Exiting" +"2019-07-20 02:40:17.415 UTC [gossip.discovery] sendMemResponse -> DEBU 2038 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:17.415 UTC [msp] DeserializeIdentity -> DEBU 2039 Obtaining identity" +"2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203a Obtaining identity" +"2019-07-20 02:40:17.416 UTC [msp] DeserializeIdentity -> DEBU 203b Obtaining identity" +"2019-07-20 02:40:17.416 UTC [gossip.comm] Send -> DEBU 203c Entering, sending GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:17.416 UTC [gossip.discovery] sendMemResponse -> DEBU 203d Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: " +"2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15329209394983020561, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-07-20 02:40:17.417 UTC [gossip.comm] sendToEndpoint -> DEBU 203f Exiting" +"2019-07-20 02:40:17.571 UTC [gossip.comm] func1 -> DEBU 2040 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2041 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.571 UTC [gossip.gossip] handleMessage -> DEBU 2042 Exiting" +"2019-07-20 02:40:17.571 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2043 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.571 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2044 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:17.571 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" +"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2046 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2047 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2048 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 2049 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:17.571 UTC [policies] Evaluate -> DEBU 204b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 204c 0xc003652100 gate 1563590417571983300 evaluation starts" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204d 0xc003652100 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204e 0xc003652100 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 204f 0xc003652100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2050 0xc003652100 principal evaluation fails" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2051 0xc003652100 gate 1563590417571983300 evaluation fails" +"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2052 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2053 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:17.572 UTC [policies] Evaluate -> DEBU 2054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func1 -> DEBU 2055 0xc003652980 gate 1563590417572451200 evaluation starts" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2056 0xc003652980 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2057 0xc003652980 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:17.572 UTC [cauthdsl] func2 -> DEBU 2058 0xc003652980 principal matched by identity 0" +"2019-07-20 02:40:17.572 UTC [msp.identity] Verify -> DEBU 2059 Verify: digest = 00000000 3c 58 51 70 7b 27 28 b6 1f 1d e5 56 0b 6e 05 a9 | DEBU 205a Verify: sig = 00000000 30 45 02 21 00 e8 5b a8 e3 61 3d 94 a3 0b 9b b7 |0E.!..[..a=.....| +00000010 c4 11 ff a2 e6 01 24 1a 00 42 ff e1 9d 2e 83 b5 |......$..B......| +00000020 94 91 d1 45 fb 02 20 63 c4 6d 0d df 72 21 dc 83 |...E.. c.m..r!..| +00000030 97 7e 46 bc 53 2a 98 fb 9e da 35 8e 5c 85 0d 16 |.~F.S*....5.\...| +00000040 a6 b4 c2 b2 f8 a4 45 |......E|" +"2019-07-20 02:40:17.573 UTC [cauthdsl] func2 -> DEBU 205b 0xc003652980 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:17.573 UTC [cauthdsl] func1 -> DEBU 205c 0xc003652980 gate 1563590417572451200 evaluation succeeds" +"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 205f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:17.573 UTC [policies] Evaluate -> DEBU 2060 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:17.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2061 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2062 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2063 updating membership: timestamp: " +"2019-07-20 02:40:17.573 UTC [gossip.discovery] learnExistingMembers -> DEBU 2064 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2065 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:17.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2066 Exiting" +"2019-07-20 02:40:17.574 UTC [gossip.discovery] handleAliveMessage -> DEBU 2067 Exiting" +"2019-07-20 02:40:17.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2068 Exiting" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206c Obtaining identity" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206d Obtaining identity" +"2019-07-20 02:40:17.580 UTC [msp] DeserializeIdentity -> DEBU 206e Obtaining identity" +"2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 206f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2070 Obtaining identity" +"2019-07-20 02:40:17.581 UTC [msp] DeserializeIdentity -> DEBU 2071 Obtaining identity" +"2019-07-20 02:40:17.581 UTC [gossip.comm] Send -> DEBU 2072 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2073 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2074 Exiting" +"2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2075 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.582 UTC [gossip.comm] sendToEndpoint -> DEBU 2076 Exiting" +"2019-07-20 02:40:17.582 UTC [gossip.comm] func1 -> DEBU 2077 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2078 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.582 UTC [gossip.gossip] handleMessage -> DEBU 2079 Exiting" +"2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207b Exiting" +"2019-07-20 02:40:17.583 UTC [gossip.comm] func1 -> DEBU 207c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.583 UTC [gossip.gossip] handleMessage -> DEBU 207d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.584 UTC [gossip.gossip] handleMessage -> DEBU 207e Exiting" +"2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 207f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:17.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2080 Exiting" +"2019-07-20 02:40:19.640 UTC [dockercontroller] deployImage -> DEBU 2081 Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +"2019-07-20 02:40:19.640 UTC [dockercontroller] createContainer -> DEBU 2082 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:40:19.640 UTC [dockercontroller] getDockerHostConfig -> DEBU 2083 docker container hostconfig NetworkMode: hlf_net" +"2019-07-20 02:40:19.758 UTC [dockercontroller] createContainer -> DEBU 2084 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-07-20 02:40:19.926 UTC [gossip.comm] func1 -> DEBU 2085 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2086 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.926 UTC [gossip.gossip] handleMessage -> DEBU 2087 Exiting" +"2019-07-20 02:40:19.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2088 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2089 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:19.928 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" +"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:19.929 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:19.930 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:19.931 UTC [cauthdsl] func1 -> DEBU 2091 0xc003510770 gate 1563590419930912600 evaluation starts" +"2019-07-20 02:40:19.931 UTC [cauthdsl] func2 -> DEBU 2092 0xc003510770 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2093 0xc003510770 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2094 0xc003510770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:19.932 UTC [cauthdsl] func2 -> DEBU 2095 0xc003510770 principal evaluation fails" +"2019-07-20 02:40:19.933 UTC [cauthdsl] func1 -> DEBU 2096 0xc003510770 gate 1563590419930912600 evaluation fails" +"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:19.934 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:19.934 UTC [cauthdsl] func1 -> DEBU 209a 0xc003510fb0 gate 1563590419934803200 evaluation starts" +"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209b 0xc003510fb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209c 0xc003510fb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:19.935 UTC [cauthdsl] func2 -> DEBU 209d 0xc003510fb0 principal matched by identity 0" +"2019-07-20 02:40:19.935 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| +00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" +"2019-07-20 02:40:19.936 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| +00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| +00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| +00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| +00000040 2b 6e 18 e1 a9 c6 |+n....|" +"2019-07-20 02:40:19.936 UTC [cauthdsl] func2 -> DEBU 20a0 0xc003510fb0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:19.936 UTC [cauthdsl] func1 -> DEBU 20a1 0xc003510fb0 gate 1563590419934803200 evaluation succeeds" +"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:19.937 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:19.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 20a6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:19.938 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a8 updating membership: timestamp: " +"2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20a9 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:19.939 UTC [gossip.discovery] learnExistingMembers -> DEBU 20aa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:19.944 UTC [gossip.comm] func1 -> DEBU 20ab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.944 UTC [gossip.gossip] handleMessage -> DEBU 20ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.944 UTC [gossip.pull] HandleMessage -> DEBU 20ad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.945 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" +"2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" +"2019-07-20 02:40:19.946 UTC [gossip.discovery] learnExistingMembers -> DEBU 20b0 Exiting" +"2019-07-20 02:40:19.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 20b1 Exiting" +"2019-07-20 02:40:19.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20b2 Exiting" +"2019-07-20 02:40:19.946 UTC [msp] DeserializeIdentity -> DEBU 20b3 Obtaining identity" +"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b4 Obtaining identity" +"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b5 Obtaining identity" +"2019-07-20 02:40:19.947 UTC [msp] DeserializeIdentity -> DEBU 20b6 Obtaining identity" +"2019-07-20 02:40:19.947 UTC [gossip.pull] SendDigest -> DEBU 20b8 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:19.947 UTC [gossip.gossip] handleMessage -> DEBU 20b9 Exiting" +"2019-07-20 02:40:19.947 UTC [gossip.discovery] sendMemResponse -> DEBU 20b7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bb Obtaining identity" +"2019-07-20 02:40:19.948 UTC [msp] DeserializeIdentity -> DEBU 20bc Obtaining identity" +"2019-07-20 02:40:19.949 UTC [gossip.comm] Send -> DEBU 20bd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:19.949 UTC [gossip.discovery] sendMemResponse -> DEBU 20be Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020\"" signature:"0D\002 ]N\016\232\317\221\225\000\312`\025\221\0355\030\010\203\201\0237\221\207\213\2127\371\266g\252\207\345G\002 \007\027\352\001\223\346\323'6\262\270\356B\324\025\3605\251\210\334\217\211s^\024F\244\371\310\354>." > alive: alive: alive: " +"2019-07-20 02:40:19.949 UTC [gossip.comm] sendToEndpoint -> DEBU 20bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:19.950 UTC [gossip.comm] sendToEndpoint -> DEBU 20c0 Exiting" +"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:20.252 UTC [gossip.comm] Send -> DEBU 20c4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.252 UTC [gossip.pull] Hello -> DEBU 20c5 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:20.253 UTC [gossip.comm] Send -> DEBU 20c6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c8 Exiting" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20c9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20ca Exiting" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.253 UTC [gossip.comm] sendToEndpoint -> DEBU 20cc Exiting" +"2019-07-20 02:40:20.254 UTC [gossip.comm] func1 -> DEBU 20cd Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20cf GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d0 Exiting" +"2019-07-20 02:40:20.255 UTC [gossip.comm] func1 -> DEBU 20d1 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.255 UTC [gossip.gossip] handleMessage -> DEBU 20d2 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.255 UTC [gossip.pull] HandleMessage -> DEBU 20d3 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d4 Exiting" +"2019-07-20 02:40:20.256 UTC [gossip.comm] func1 -> DEBU 20d5 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.256 UTC [gossip.pull] HandleMessage -> DEBU 20d7 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.256 UTC [gossip.gossip] handleMessage -> DEBU 20d8 Exiting" +"2019-07-20 02:40:20.293 UTC [msp] GetDefaultSigningIdentity -> DEBU 20d9 Obtaining default signing identity" +"2019-07-20 02:40:20.293 UTC [msp.identity] Sign -> DEBU 20da Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915101F " +"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20db Sign: digest: 504B6EC17B1E1B1D8BBAD474EBAC421C80C37F85D67DE2002BF8519639289328 " +"2019-07-20 02:40:20.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 20dc Obtaining default signing identity" +"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20dd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:20.294 UTC [msp.identity] Sign -> DEBU 20de Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20df Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.294 UTC [msp] DeserializeIdentity -> DEBU 20e2 Obtaining identity" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e4 Exiting" +"2019-07-20 02:40:20.294 UTC [gossip.comm] Send -> DEBU 20e5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e7 Exiting" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.294 UTC [gossip.comm] sendToEndpoint -> DEBU 20e9 Exiting" +"2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20eb Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20ec Exiting" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ee Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20ef Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20f0 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +00000040 12 14 a9 de 14 fb |......|" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] isSentByMe -> DEBU 20f2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleAliveMessage -> DEBU 20f3 Exiting" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f4 Exiting" +"2019-07-20 02:40:20.297 UTC [gossip.comm] func1 -> DEBU 20f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] handleMessage -> DEBU 20f7 Exiting" +"2019-07-20 02:40:20.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.297 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20f9 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:20.297 UTC [msp.identity] Verify -> DEBU 20fa Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +"2019-07-20 02:40:20.298 UTC [msp.identity] Verify -> DEBU 20fb Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +00000040 12 14 a9 de 14 fb |......|" +"2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.298 UTC [gossip.discovery] isSentByMe -> DEBU 20fd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.298 UTC [gossip.discovery] handleAliveMessage -> DEBU 20fe Exiting" +"2019-07-20 02:40:20.298 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20ff Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:20.298 UTC [msp] DeserializeIdentity -> DEBU 2100 Obtaining identity" +"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2101 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2102 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.298 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2103 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2105 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.298 UTC [policies] Evaluate -> DEBU 2106 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.298 UTC [cauthdsl] func1 -> DEBU 2107 0xc0033b32f0 gate 1563590420298565800 evaluation starts" +"2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2108 0xc0033b32f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.298 UTC [cauthdsl] func2 -> DEBU 2109 0xc0033b32f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.300 UTC [gossip.comm] func1 -> DEBU 210a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.300 UTC [gossip.gossip] handleMessage -> DEBU 210b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210c 0xc0033b32f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.300 UTC [cauthdsl] func2 -> DEBU 210d 0xc0033b32f0 principal evaluation fails" +"2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 210e 0xc0033b32f0 gate 1563590420298565800 evaluation fails" +"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 210f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2110 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.300 UTC [policies] Evaluate -> DEBU 2111 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.300 UTC [cauthdsl] func1 -> DEBU 2112 0xc0033b3b30 gate 1563590420300966200 evaluation starts" +"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2113 0xc0033b3b30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2114 0xc0033b3b30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2115 0xc0033b3b30 principal matched by identity 0" +"2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2116 Verify: digest = 00000000 69 15 c1 32 fe 05 00 01 e0 ca cb 9e 0d 07 0e b4 |i..2............| +00000010 0a d6 75 ad dd b3 2a 43 0b 9e cd a0 66 88 7a a6 |..u...*C....f.z.|" +"2019-07-20 02:40:20.301 UTC [msp.identity] Verify -> DEBU 2117 Verify: sig = 00000000 30 44 02 20 7b b0 f7 de 15 b6 9c 02 4e 80 5a ca |0D. {.......N.Z.| +00000010 11 09 d2 35 ab b0 f2 9b 92 67 af 53 8c 13 81 27 |...5.....g.S...'| +00000020 41 03 12 9b 02 20 40 93 4a 0c 63 6f e1 d7 8a 87 |A.... @.J.co....| +00000030 06 22 2d 9f e4 94 d6 cf 63 60 4c db e6 c5 78 f5 |."-.....c`L...x.| +00000040 2b 6e 18 e1 a9 c6 |+n....|" +"2019-07-20 02:40:20.301 UTC [cauthdsl] func2 -> DEBU 2118 0xc0033b3b30 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.301 UTC [cauthdsl] func1 -> DEBU 2119 0xc0033b3b30 gate 1563590420300966200 evaluation succeeds" +"2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.301 UTC [policies] Evaluate -> DEBU 211b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.302 UTC [policies] Evaluate -> DEBU 211d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleAliveMessage -> DEBU 211f Exiting" +"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2120 Exiting" +"2019-07-20 02:40:20.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.305 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2122 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2123 Verify: digest = 00000000 50 4b 6e c1 7b 1e 1b 1d 8b ba d4 74 eb ac 42 1c |PKn.{......t..B.| +00000010 80 c3 7f 85 d6 7d e2 00 2b f8 51 96 39 28 93 28 |.....}..+.Q.9(.(|" +"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2124 Verify: sig = 00000000 30 44 02 20 68 7b 72 b1 00 9d fc fc 78 25 70 1a |0D. h{r.....x%p.| +00000010 f2 34 d5 51 46 c5 5e 73 23 72 fc 29 30 b2 25 16 |.4.QF.^s#r.)0.%.| +00000020 78 e0 63 c0 02 20 31 c1 ed ca f6 f3 53 25 e5 96 |x.c.. 1.....S%..| +00000030 bb ee 7e 44 92 d9 fa de 44 50 f3 6e ef f5 9c 54 |..~D....DP.n...T| +00000040 12 14 a9 de 14 fb |......|" +"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2125 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:20.305 UTC [msp.identity] Verify -> DEBU 2126 Verify: sig = 00000000 30 44 02 20 2d ba 51 f4 8a 64 9d 24 9e 51 64 d0 |0D. -.Q..d.$.Qd.| +00000010 43 09 85 6d e2 51 b3 cb 56 0c 62 ba 3c 11 f8 03 |C..m.Q..V.b.<...| +00000020 d6 72 b4 ef 02 20 7f 19 2b ab 8c e3 a1 5a 6b f0 |.r... ..+....Zk.| +00000030 58 b0 bc d6 1a b0 46 0e 6c 40 a3 8e 54 73 5a 63 |X.....F.l@..TsZc| +00000040 e3 11 28 fd 0a 7d |..(..}|" +"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2127 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:20.305 UTC [gossip.discovery] isSentByMe -> DEBU 2128 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleAliveMessage -> DEBU 2129 Exiting" +"2019-07-20 02:40:20.305 UTC [gossip.gossip] handleMessage -> DEBU 212a Exiting" +"2019-07-20 02:40:20.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 212b Exiting" +"2019-07-20 02:40:20.367 UTC [gossip.comm] func1 -> DEBU 212c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.368 UTC [gossip.gossip] handleMessage -> DEBU 212d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.368 UTC [gossip.pull] HandleMessage -> DEBU 212e GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.369 UTC [gossip.pull] SendDigest -> DEBU 212f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:20.369 UTC [gossip.gossip] handleMessage -> DEBU 2130 Exiting" +"2019-07-20 02:40:20.371 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.371 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.372 UTC [gossip.gossip] handleMessage -> DEBU 2133 Exiting" +"2019-07-20 02:40:20.372 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2134 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.372 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2135 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2136 Verify: digest = 00000000 c7 31 e2 19 58 a3 f6 b8 be 34 34 a8 ec 5c e8 9d |.1..X....44..\..| +00000010 48 9d ae 36 36 cd ca 8e b1 2f 46 d6 54 bc 3f 26 |H..66..../F.T.?&|" +"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2137 Verify: sig = 00000000 30 44 02 20 06 ca bf c0 84 51 4e 9b 01 3e ed 97 |0D. .....QN..>..| +00000010 a9 b1 1e c9 d4 6d ea ea d7 71 9d 86 c9 c3 31 f7 |.....m...q....1.| +00000020 a5 48 b6 4b 02 20 4c 13 b3 73 b7 34 1f 9c 7d 04 |.H.K. L..s.4..}.| +00000030 96 e1 6a c7 90 c8 3f 1d 94 1a 87 9e 1f 17 ef 0d |..j...?.........| +00000040 30 2a 69 1a 73 9b |0*i.s.|" +"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2138 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:20.372 UTC [msp.identity] Verify -> DEBU 2139 Verify: sig = 00000000 30 44 02 20 29 a2 f3 b7 4d 89 32 2f 55 be 24 6b |0D. )...M.2/U.$k| +00000010 a0 8f 76 7a 42 fe 14 ea 54 38 0c ce ec 7f 15 f8 |..vzB...T8......| +00000020 77 fa a1 66 02 20 2f 1e f8 f2 a5 dd 0e a0 98 bd |w..f. /.........| +00000030 9f 8d 04 a3 0f 45 ec 8f ca ce 47 dd d1 40 75 05 |.....E....G..@u.| +00000040 dc b3 82 63 e5 b7 |...c..|" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 213a Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213c updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213d Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213e Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] learnExistingMembers -> DEBU 213f Exiting" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleAliveMessage -> DEBU 2140 Exiting" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" +"2019-07-20 02:40:20.373 UTC [gossip.discovery] sendMemResponse -> DEBU 2142 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" +"2019-07-20 02:40:20.373 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" +"2019-07-20 02:40:20.373 UTC [gossip.comm] Send -> DEBU 2145 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.374 UTC [gossip.discovery] sendMemResponse -> DEBU 2146 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" secret_envelope: > alive: " +"2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2147 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.374 UTC [gossip.comm] sendToEndpoint -> DEBU 2148 Exiting" +"2019-07-20 02:40:20.554 UTC [gossip.comm] func1 -> DEBU 2149 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.554 UTC [gossip.gossip] handleMessage -> DEBU 214a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.554 UTC [gossip.pull] HandleMessage -> DEBU 214b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214c Obtaining identity" +"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214d Obtaining identity" +"2019-07-20 02:40:20.555 UTC [msp] DeserializeIdentity -> DEBU 214e Obtaining identity" +"2019-07-20 02:40:20.556 UTC [msp] DeserializeIdentity -> DEBU 214f Obtaining identity" +"2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2150 Obtaining identity" +"2019-07-20 02:40:20.557 UTC [msp] DeserializeIdentity -> DEBU 2151 Obtaining identity" +"2019-07-20 02:40:20.557 UTC [gossip.pull] SendDigest -> DEBU 2152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:20.560 UTC [gossip.gossip] handleMessage -> DEBU 2153 Exiting" +"2019-07-20 02:40:20.561 UTC [gossip.comm] func1 -> DEBU 2154 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2155 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.561 UTC [gossip.gossip] handleMessage -> DEBU 2156 Exiting" +"2019-07-20 02:40:20.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2157 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.562 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2158 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:20.562 UTC [msp] DeserializeIdentity -> DEBU 2159 Obtaining identity" +"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 215a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 215c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.563 UTC [policies] Evaluate -> DEBU 215d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.564 UTC [policies] Evaluate -> DEBU 215f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.564 UTC [cauthdsl] func1 -> DEBU 2160 0xc0033afa80 gate 1563590420564792700 evaluation starts" +"2019-07-20 02:40:20.564 UTC [cauthdsl] func2 -> DEBU 2161 0xc0033afa80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2162 0xc0033afa80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2163 0xc0033afa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.565 UTC [cauthdsl] func2 -> DEBU 2164 0xc0033afa80 principal evaluation fails" +"2019-07-20 02:40:20.565 UTC [cauthdsl] func1 -> DEBU 2165 0xc0033afa80 gate 1563590420564792700 evaluation fails" +"2019-07-20 02:40:20.565 UTC [policies] Evaluate -> DEBU 2166 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2167 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.566 UTC [policies] Evaluate -> DEBU 2168 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.567 UTC [cauthdsl] func1 -> DEBU 2169 0xc0031ba2c0 gate 1563590420566867700 evaluation starts" +"2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216a 0xc0031ba2c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.568 UTC [cauthdsl] func2 -> DEBU 216b 0xc0031ba2c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.570 UTC [cauthdsl] func2 -> DEBU 216c 0xc0031ba2c0 principal matched by identity 0" +"2019-07-20 02:40:20.570 UTC [msp.identity] Verify -> DEBU 216d Verify: digest = 00000000 4d fc 0e 77 db 69 88 31 38 93 68 0f 5b 04 f2 09 |M..w.i.18.h.[...| +00000010 32 12 51 3d 70 3f 48 33 49 68 c7 26 13 26 87 d2 |2.Q=p?H3Ih.&.&..|" +"2019-07-20 02:40:20.571 UTC [msp.identity] Verify -> DEBU 216e Verify: sig = 00000000 30 44 02 20 37 87 1a 84 16 b7 93 5f e8 af ad 0a |0D. 7......_....| +00000010 f4 b9 98 82 65 c0 32 e7 28 d3 08 27 11 4b e5 5f |....e.2.(..'.K._| +00000020 3b 36 e7 6d 02 20 4f 3c 7b cf 53 62 27 64 57 33 |;6.m. O<{.Sb'dW3| +00000030 b6 77 3a b7 1e f7 19 4a 9c 09 0b 4d dd c7 f1 f0 |.w:....J...M....| +00000040 0a e3 d1 be 6e f3 |....n.|" +"2019-07-20 02:40:20.571 UTC [cauthdsl] func2 -> DEBU 216f 0xc0031ba2c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.572 UTC [cauthdsl] func1 -> DEBU 2170 0xc0031ba2c0 gate 1563590420566867700 evaluation succeeds" +"2019-07-20 02:40:20.572 UTC [policies] Evaluate -> DEBU 2171 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2172 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2173 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.573 UTC [policies] Evaluate -> DEBU 2174 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.573 UTC [gossip.discovery] handleAliveMessage -> DEBU 2175 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2176 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:20.574 UTC [gossip.discovery] learnExistingMembers -> DEBU 2177 updating membership: timestamp: " +"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2178 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 2179 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:20.576 UTC [gossip.discovery] learnExistingMembers -> DEBU 217a Exiting" +"2019-07-20 02:40:20.576 UTC [gossip.discovery] handleAliveMessage -> DEBU 217b Exiting" +"2019-07-20 02:40:20.578 UTC [gossip.discovery] sendMemResponse -> DEBU 217c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217d Obtaining identity" +"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217e Obtaining identity" +"2019-07-20 02:40:20.579 UTC [msp] DeserializeIdentity -> DEBU 217f Obtaining identity" +"2019-07-20 02:40:20.580 UTC [gossip.comm] Send -> DEBU 2180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2181 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020#" signature:"0D\002 \006\312\277\300\204QN\233\001>\355\227\251\261\036\311\324m\352\352\327q\235\206\311\3031\367\245H\266K\002 L\023\263s\2674\037\234}\004\226\341j\307\220\310?\035\224\032\207\236\037\027\357\r0*i\032s\233" > alive: alive: alive: " +"2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2183 Exiting" +"2019-07-20 02:40:20.580 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2184 Exiting" +"2019-07-20 02:40:20.676 UTC [dockercontroller] Start -> DEBU 2185 Started container dev-peer0.org1.example.com-exp02-1.0" +"2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2186 container lock deleted(exp02-1.0)" +"2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2187 waiting for container(exp02-1.0) lock" +"2019-07-20 02:40:20.676 UTC [container] lockContainer -> DEBU 2188 got container (exp02-1.0) lock" +"2019-07-20 02:40:20.676 UTC [container] unlockContainer -> DEBU 2189 container lock deleted(exp02-1.0)" +"2019-07-20 02:40:20.717 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +"2019-07-20 02:40:20.719 UTC [msp] DeserializeIdentity -> DEBU 218b Obtaining identity" +"2019-07-20 02:40:20.720 UTC [gossip.comm] Send -> DEBU 218c Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:20.720 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.721 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" +"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 218f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2190 Exiting" +"2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2191 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.729 UTC [gossip.gossip] handleMessage -> DEBU 2194 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.728 UTC [gossip.comm] func1 -> DEBU 2192 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.722 UTC [gossip.comm] sendToEndpoint -> DEBU 2193 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.729 UTC [msp] DeserializeIdentity -> DEBU 2195 Obtaining identity" +"2019-07-20 02:40:20.731 UTC [msp] DeserializeIdentity -> DEBU 2197 Obtaining identity" +"2019-07-20 02:40:20.732 UTC [msp] DeserializeIdentity -> DEBU 2199 Obtaining identity" +"2019-07-20 02:40:20.730 UTC [gossip.comm] sendToEndpoint -> DEBU 2196 Exiting" +"2019-07-20 02:40:20.732 UTC [gossip.comm] func1 -> DEBU 2198 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.735 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 219a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.743 UTC [policies] Evaluate -> DEBU 219f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.743 UTC [cauthdsl] func1 -> DEBU 21a0 0xc003125d80 gate 1563590420743984900 evaluation starts" +"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a1 0xc003125d80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a2 0xc003125d80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a3 0xc003125d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.744 UTC [cauthdsl] func2 -> DEBU 21a4 0xc003125d80 principal evaluation fails" +"2019-07-20 02:40:20.744 UTC [cauthdsl] func1 -> DEBU 21a5 0xc003125d80 gate 1563590420743984900 evaluation fails" +"2019-07-20 02:40:20.744 UTC [policies] Evaluate -> DEBU 21a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.745 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.745 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0031165c0 gate 1563590420745495300 evaluation starts" +"2019-07-20 02:40:20.745 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0031165c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0031165c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.746 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0031165c0 principal matched by identity 0" +"2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ad Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:20.746 UTC [msp.identity] Verify -> DEBU 21ae Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:20.747 UTC [cauthdsl] func2 -> DEBU 21af 0xc0031165c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.747 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0031165c0 gate 1563590420745495300 evaluation succeeds" +"2019-07-20 02:40:20.747 UTC [policies] Evaluate -> DEBU 21b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.748 UTC [policies] Evaluate -> DEBU 21b3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.749 UTC [policies] Evaluate -> DEBU 21b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.749 UTC [msp] DeserializeIdentity -> DEBU 21b5 Obtaining identity" +"2019-07-20 02:40:20.750 UTC [msp] DeserializeIdentity -> DEBU 21b6 Obtaining identity" +"2019-07-20 02:40:20.751 UTC [gossip.pull] Hello -> DEBU 21b7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:20.752 UTC [msp] DeserializeIdentity -> DEBU 21b8 Obtaining identity" +"2019-07-20 02:40:20.753 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" +"2019-07-20 02:40:20.754 UTC [gossip.comm] Send -> DEBU 21ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bb Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:20.756 UTC [msp.identity] Verify -> DEBU 21bc Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:20.756 UTC [gossip.comm] sendToEndpoint -> DEBU 21bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.758 UTC [gossip.comm] sendToEndpoint -> DEBU 21be Exiting" +"2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21bf Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:20.759 UTC [msp.identity] Verify -> DEBU 21c0 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:20.760 UTC [gossip.comm] func1 -> DEBU 21c1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c2 Obtaining identity" +"2019-07-20 02:40:20.761 UTC [msp] DeserializeIdentity -> DEBU 21c3 Obtaining identity" +"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21c6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.765 UTC [policies] Evaluate -> DEBU 21c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.766 UTC [cauthdsl] func1 -> DEBU 21ca 0xc0030f3a30 gate 1563590420766558700 evaluation starts" +"2019-07-20 02:40:20.766 UTC [cauthdsl] func2 -> DEBU 21cb 0xc0030f3a30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cc 0xc0030f3a30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21cd 0xc0030f3a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.767 UTC [cauthdsl] func2 -> DEBU 21ce 0xc0030f3a30 principal evaluation fails" +"2019-07-20 02:40:20.767 UTC [cauthdsl] func1 -> DEBU 21cf 0xc0030f3a30 gate 1563590420766558700 evaluation fails" +"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.768 UTC [policies] Evaluate -> DEBU 21d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.768 UTC [cauthdsl] func1 -> DEBU 21d3 0xc0030da2c0 gate 1563590420768941600 evaluation starts" +"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d4 0xc0030da2c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d5 0xc0030da2c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.769 UTC [cauthdsl] func2 -> DEBU 21d6 0xc0030da2c0 principal matched by identity 0" +"2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d7 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:20.769 UTC [msp.identity] Verify -> DEBU 21d8 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:20.770 UTC [cauthdsl] func2 -> DEBU 21d9 0xc0030da2c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.770 UTC [cauthdsl] func1 -> DEBU 21da 0xc0030da2c0 gate 1563590420768941600 evaluation succeeds" +"2019-07-20 02:40:20.770 UTC [policies] Evaluate -> DEBU 21db Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21dd Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.771 UTC [policies] Evaluate -> DEBU 21de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21df Exiting" +"2019-07-20 02:40:20.771 UTC [gossip.gossip] handleMessage -> DEBU 21e0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:20.772 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:20.776 UTC [chaincode.accesscontrol] authenticate -> DEBU 21e3 Chaincode exp02:1.0 's authentication is authorized" +"2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e4 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:20.776 UTC [msp.identity] Verify -> DEBU 21e5 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:20.776 UTC [chaincode] handleMessage -> DEBU 21e6 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" +"2019-07-20 02:40:20.777 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" +"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21ea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21eb Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.777 UTC [chaincode] HandleRegister -> DEBU 21e9 Received REGISTER in state created" +"2019-07-20 02:40:20.777 UTC [chaincode] Register -> DEBU 21ed registered handler complete for chaincode exp02:1.0" +"2019-07-20 02:40:20.777 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21ec Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.778 UTC [chaincode] HandleRegister -> DEBU 21ef Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.778 UTC [policies] Evaluate -> DEBU 21f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f2 0xc003046bc0 gate 1563590420779005600 evaluation starts" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f3 0xc003046bc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f4 0xc003046bc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f5 0xc003046bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func2 -> DEBU 21f6 0xc003046bc0 principal evaluation fails" +"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21f7 0xc003046bc0 gate 1563590420779005600 evaluation fails" +"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.779 UTC [chaincode] HandleRegister -> DEBU 21f9 Changed state to established for name:"exp02:1.0" " +"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.779 UTC [policies] Evaluate -> DEBU 21fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.779 UTC [chaincode] sendReady -> DEBU 21fc sending READY for chaincode name:"exp02:1.0" " +"2019-07-20 02:40:20.780 UTC [chaincode] sendReady -> DEBU 21fe Changed to state ready for chaincode name:"exp02:1.0" " +"2019-07-20 02:40:20.779 UTC [cauthdsl] func1 -> DEBU 21fd 0xc003047400 gate 1563590420779979600 evaluation starts" +"2019-07-20 02:40:20.780 UTC [cauthdsl] func2 -> DEBU 21ff 0xc003047400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2200 0xc003047400 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.781 UTC [cauthdsl] func2 -> DEBU 2202 0xc003047400 principal matched by identity 0" +"2019-07-20 02:40:20.781 UTC [chaincode] Launch -> DEBU 2201 launch complete" +"2019-07-20 02:40:20.781 UTC [chaincode] Execute -> DEBU 2203 Entry" +"2019-07-20 02:40:20.781 UTC [msp.identity] Verify -> DEBU 2204 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:20.782 UTC [msp.identity] Verify -> DEBU 2205 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:20.782 UTC [cauthdsl] func2 -> DEBU 2206 0xc003047400 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.782 UTC [cauthdsl] func1 -> DEBU 2207 0xc003047400 gate 1563590420779979600 evaluation succeeds" +"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 2209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.783 UTC [policies] Evaluate -> DEBU 220a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 220b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220c Obtaining identity" +"2019-07-20 02:40:20.784 UTC [msp] DeserializeIdentity -> DEBU 220d Obtaining identity" +"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 220e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 220f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2210 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2211 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2212 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.784 UTC [policies] Evaluate -> DEBU 2213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.784 UTC [cauthdsl] func1 -> DEBU 2214 0xc002fe9900 gate 1563590420784745900 evaluation starts" +"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2215 0xc002fe9900 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2216 0xc002fe9900 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2217 0xc002fe9900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.784 UTC [cauthdsl] func2 -> DEBU 2218 0xc002fe9900 principal evaluation fails" +"2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 2219 0xc002fe9900 gate 1563590420784745900 evaluation fails" +"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.785 UTC [policies] Evaluate -> DEBU 221c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.785 UTC [cauthdsl] func1 -> DEBU 221d 0xc002fae140 gate 1563590420785168500 evaluation starts" +"2019-07-20 02:40:20.785 UTC [cauthdsl] func2 -> DEBU 221e 0xc002fae140 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 221f 0xc002fae140 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.786 UTC [cauthdsl] func2 -> DEBU 2220 0xc002fae140 principal matched by identity 0" +"2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2221 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:20.786 UTC [msp.identity] Verify -> DEBU 2222 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:20.787 UTC [chaincode] handleMessage -> DEBU 2223 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2224 [79f74fa3] handling PUT_STATE from chaincode" +"2019-07-20 02:40:20.788 UTC [chaincode] HandleTransaction -> DEBU 2225 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:20.790 UTC [cauthdsl] func2 -> DEBU 2226 0xc002fae140 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.791 UTC [chaincode] handleMessage -> DEBU 2227 [79f74fa3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:20.791 UTC [cauthdsl] func1 -> DEBU 2228 0xc002fae140 gate 1563590420785168500 evaluation succeeds" +"2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 2229 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.792 UTC [policies] Evaluate -> DEBU 222a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.793 UTC [policies] Evaluate -> DEBU 222c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222d Exiting" +"2019-07-20 02:40:20.794 UTC [gossip.gossip] handleMessage -> DEBU 222f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.793 UTC [chaincode] HandleTransaction -> DEBU 222e [79f74fa3] handling PUT_STATE from chaincode" +"2019-07-20 02:40:20.794 UTC [chaincode] HandleTransaction -> DEBU 2230 [79f74fa3] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:20.794 UTC [msp] DeserializeIdentity -> DEBU 2231 Obtaining identity" +"2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2232 Obtaining identity" +"2019-07-20 02:40:20.795 UTC [msp] DeserializeIdentity -> DEBU 2233 Obtaining identity" +"2019-07-20 02:40:20.796 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2235 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.796 UTC [chaincode] handleMessage -> DEBU 2234 [79f74fa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:20.796 UTC [chaincode] Notify -> DEBU 2236 [79f74fa3] notifying Txid:79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, channelID:businesschannel" +"2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2237 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.797 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2239 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 223a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.797 UTC [chaincode] Execute -> DEBU 2238 Exit" +"2019-07-20 02:40:20.798 UTC [endorser] callChaincode -> INFO 223b [businesschannel][79f74fa3] Exit chaincode: name:"lscc" (30079ms)" +"2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 223c Simulation completed, getting simulation results" +"2019-07-20 02:40:20.799 UTC [lockbasedtxmgr] Done -> DEBU 223d Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +"2019-07-20 02:40:20.800 UTC [endorser] SimulateProposal -> DEBU 223e [businesschannel][79f74fa3] Exit" +"2019-07-20 02:40:20.800 UTC [endorser] endorseProposal -> DEBU 223f [businesschannel][79f74fa3] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:20.801 UTC [endorser] endorseProposal -> DEBU 2240 [businesschannel][79f74fa3] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:20.802 UTC [endorser] EndorseWithPlugin -> DEBU 2241 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" +"2019-07-20 02:40:20.798 UTC [policies] Evaluate -> DEBU 2242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.802 UTC [policies] Evaluate -> DEBU 2243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.802 UTC [cauthdsl] func1 -> DEBU 2244 0xc002f89090 gate 1563590420802657900 evaluation starts" +"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2245 0xc002f89090 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2246 0xc002f89090 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2247 Sign: plaintext: 0A204790835E071B71CF339AE73C7888...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:20.803 UTC [msp.identity] Sign -> DEBU 2248 Sign: digest: 37DFF638163BF053F0A202081D973D9C0328932F16905D7CA07D4DFD41588ED9 " +"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 2249 0xc002f89090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.803 UTC [cauthdsl] func2 -> DEBU 224a 0xc002f89090 principal evaluation fails" +"2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 224c 0xc002f89090 gate 1563590420802657900 evaluation fails" +"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.804 UTC [policies] Evaluate -> DEBU 224f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.804 UTC [cauthdsl] func1 -> DEBU 2250 0xc002f898d0 gate 1563590420804830700 evaluation starts" +"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2251 0xc002f898d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2252 0xc002f898d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.805 UTC [cauthdsl] func2 -> DEBU 2253 0xc002f898d0 principal matched by identity 0" +"2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2254 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:20.805 UTC [msp.identity] Verify -> DEBU 2255 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:20.804 UTC [endorser] EndorseWithPlugin -> DEBU 224b Exiting {plugin: escc, channel: businesschannel, tx: 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, chaincode: lscc}" +"2019-07-20 02:40:20.805 UTC [endorser] endorseProposal -> DEBU 2256 [businesschannel][79f74fa3] Exit" +"2019-07-20 02:40:20.806 UTC [cauthdsl] func2 -> DEBU 2257 0xc002f898d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.806 UTC [cauthdsl] func1 -> DEBU 2258 0xc002f898d0 gate 1563590420804830700 evaluation succeeds" +"2019-07-20 02:40:20.806 UTC [lockbasedtxmgr] Done -> DEBU 2259 Done with transaction simulation / query execution [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +"2019-07-20 02:40:20.806 UTC [endorser] func1 -> DEBU 225b Exit: request from 172.18.0.9:58342" +"2019-07-20 02:40:20.806 UTC [policies] Evaluate -> DEBU 225a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.808 UTC [comm.grpc.server] 1 -> INFO 225c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58342 grpc.code=OK grpc.call_duration=30.0944849s +"2019-07-20 02:40:20.808 UTC [policies] Evaluate -> DEBU 225d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.809 UTC [policies] Evaluate -> DEBU 225f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2260 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:20.809 UTC [msp.identity] Verify -> DEBU 2261 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" +"2019-07-20 02:40:20.810 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" +"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.810 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:20.810 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:20.810 UTC [cauthdsl] func1 -> DEBU 226a 0xc002f5d760 gate 1563590420810881700 evaluation starts" +"2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226b 0xc002f5d760 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.810 UTC [cauthdsl] func2 -> DEBU 226c 0xc002f5d760 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226d 0xc002f5d760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 226e 0xc002f5d760 principal evaluation fails" +"2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 226f 0xc002f5d760 gate 1563590420810881700 evaluation fails" +"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2270 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:20.811 UTC [policies] Evaluate -> DEBU 2272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:20.811 UTC [cauthdsl] func1 -> DEBU 2273 0xc002f5dfa0 gate 1563590420811537400 evaluation starts" +"2019-07-20 02:40:20.811 UTC [cauthdsl] func2 -> DEBU 2274 0xc002f5dfa0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2275 0xc002f5dfa0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:20.812 UTC [cauthdsl] func2 -> DEBU 2276 0xc002f5dfa0 principal matched by identity 0" +"2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2277 Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:20.812 UTC [msp.identity] Verify -> DEBU 2278 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:20.813 UTC [cauthdsl] func2 -> DEBU 2279 0xc002f5dfa0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:20.813 UTC [cauthdsl] func1 -> DEBU 227a 0xc002f5dfa0 gate 1563590420811537400 evaluation succeeds" +"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:20.813 UTC [policies] Evaluate -> DEBU 227d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:20.814 UTC [policies] Evaluate -> DEBU 227e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 227f Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:20.814 UTC [msp.identity] Verify -> DEBU 2280 Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:20.820 UTC [gossip.gossip] handleMessage -> DEBU 2281 Exiting" +"2019-07-20 02:40:20.822 UTC [gossip.gossip] handleMessage -> DEBU 2282 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.823 UTC [gossip.pull] HandleMessage -> DEBU 2283 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.823 UTC [gossip.gossip] handleMessage -> DEBU 2284 Exiting" +"2019-07-20 02:40:20.842 UTC [grpc] infof -> DEBU 2286 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:20.834 UTC [grpc] infof -> DEBU 2285 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:20.878 UTC [gossip.comm] func1 -> DEBU 2287 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.878 UTC [gossip.gossip] handleMessage -> DEBU 2288 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +"2019-07-20 02:40:20.879 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +"2019-07-20 02:40:20.879 UTC [gossip.gossip] handleMessage -> DEBU 228b Exiting" +"2019-07-20 02:40:20.908 UTC [gossip.comm] func1 -> DEBU 228c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.908 UTC [gossip.gossip] handleMessage -> DEBU 228d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.908 UTC [gossip.pull] HandleMessage -> DEBU 228e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:20.909 UTC [gossip.pull] SendDigest -> DEBU 228f Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:20.909 UTC [gossip.gossip] handleMessage -> DEBU 2290 Exiting" +"2019-07-20 02:40:21.998 UTC [gossip.election] waitForInterrupt -> DEBU 2291 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:21.999 UTC [gossip.election] IsLeader -> DEBU 2292 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:21.999 UTC [msp] GetDefaultSigningIdentity -> DEBU 2293 Obtaining default signing identity" +"2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2294 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510091801 " +"2019-07-20 02:40:21.999 UTC [msp.identity] Sign -> DEBU 2295 Sign: digest: CE53D14C8BDD185163EA86423928464BF5E2185940EB5A7C1CC04771A58293DC " +"2019-07-20 02:40:21.999 UTC [gossip.election] waitForInterrupt -> DEBU 2296 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2297 Obtaining identity" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2298 Obtaining identity" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 2299 Obtaining identity" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229a Obtaining identity" +"2019-07-20 02:40:21.999 UTC [gossip.comm] Send -> DEBU 229b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229c Obtaining identity" +"2019-07-20 02:40:21.999 UTC [msp] DeserializeIdentity -> DEBU 229d Obtaining identity" +"2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.000 UTC [gossip.comm] sendToEndpoint -> DEBU 229f Exiting" +"2019-07-20 02:40:22.021 UTC [gossip.comm] func1 -> DEBU 22a0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a2 Obtaining identity" +"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a3 Obtaining identity" +"2019-07-20 02:40:22.021 UTC [msp] DeserializeIdentity -> DEBU 22a4 Obtaining identity" +"2019-07-20 02:40:22.021 UTC [gossip.gossip] handleMessage -> DEBU 22a5 Exiting" +"2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:22.022 UTC [gossip.comm] func1 -> DEBU 22a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22a8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22a9 Obtaining identity" +"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22aa Obtaining identity" +"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22ab Obtaining identity" +"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ac Exiting" +"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.022 UTC [gossip.gossip] handleMessage -> DEBU 22ae Exiting" +"2019-07-20 02:40:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.022 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 22b0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:22.022 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" +"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22b4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:22.022 UTC [policies] Evaluate -> DEBU 22b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:22.022 UTC [cauthdsl] func1 -> DEBU 22b8 0xc002a63060 gate 1563590422022870600 evaluation starts" +"2019-07-20 02:40:22.022 UTC [cauthdsl] func2 -> DEBU 22b9 0xc002a63060 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22ba 0xc002a63060 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bb 0xc002a63060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22bc 0xc002a63060 principal evaluation fails" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22bd 0xc002a63060 gate 1563590422022870600 evaluation fails" +"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:22.023 UTC [policies] Evaluate -> DEBU 22c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func1 -> DEBU 22c1 0xc002a638a0 gate 1563590422023224000 evaluation starts" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c2 0xc002a638a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c3 0xc002a638a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c4 0xc002a638a0 principal matched by identity 0" +"2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c5 Verify: digest = 00000000 f1 6e e7 89 d4 c4 bf 8c dc 6f 4c f9 de 91 05 dc |.n.......oL.....| +00000010 be 94 5d 61 2b 3b 79 e7 74 d5 f4 43 28 c3 69 87 |..]a+;y.t..C(.i.|" +"2019-07-20 02:40:22.023 UTC [msp.identity] Verify -> DEBU 22c6 Verify: sig = 00000000 30 45 02 21 00 db 8d bb 55 89 30 0e f0 d8 88 d0 |0E.!....U.0.....| +00000010 5f 43 0c 7e e3 ea fb 4e 5b 9f 9b 55 57 38 ac 77 |_C.~...N[..UW8.w| +00000020 a3 2c 55 96 b0 02 20 46 95 b9 cd af 51 5b b0 41 |.,U... F....Q[.A| +00000030 07 0c e5 83 af e3 f8 89 b4 12 34 97 80 00 64 f7 |..........4...d.| +00000040 e2 79 b7 7e 3c 11 19 |.y.~<..|" +"2019-07-20 02:40:22.023 UTC [cauthdsl] func2 -> DEBU 22c7 0xc002a638a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.024 UTC [cauthdsl] func1 -> DEBU 22c8 0xc002a638a0 gate 1563590422023224000 evaluation succeeds" +"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cb Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:22.024 UTC [policies] Evaluate -> DEBU 22cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22cf updating membership: timestamp: " +"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d0 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 22d2 Exiting" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleAliveMessage -> DEBU 22d3 Exiting" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22d4 Exiting" +"2019-07-20 02:40:22.024 UTC [gossip.comm] func1 -> DEBU 22d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d6 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d7 Obtaining identity" +"2019-07-20 02:40:22.024 UTC [gossip.gossip] handleMessage -> DEBU 22d8 Exiting" +"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22d9 Obtaining identity" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22da Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22db Exiting" +"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" +"2019-07-20 02:40:22.024 UTC [msp] DeserializeIdentity -> DEBU 22dd Obtaining identity" +"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22de Obtaining identity" +"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22df Obtaining identity" +"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e0 Obtaining identity" +"2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.025 UTC [msp] DeserializeIdentity -> DEBU 22e2 Obtaining identity" +"2019-07-20 02:40:22.025 UTC [gossip.comm] Send -> DEBU 22e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e5 Exiting" +"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.025 UTC [gossip.comm] sendToEndpoint -> DEBU 22e7 Exiting" +"2019-07-20 02:40:22.028 UTC [gossip.comm] func1 -> DEBU 22e8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22e9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.029 UTC [gossip.gossip] handleMessage -> DEBU 22ea Exiting" +"2019-07-20 02:40:22.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ec Exiting" +"2019-07-20 02:40:22.227 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 22ed Sleeping 25s" +"2019-07-20 02:40:22.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 22ee Obtaining default signing identity" +"2019-07-20 02:40:22.238 UTC [msp.identity] Sign -> DEBU 22ef Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151020 " +"2019-07-20 02:40:22.239 UTC [msp.identity] Sign -> DEBU 22f0 Sign: digest: EBDDB8E92477E63EEFA2BA9C61E1DAD7F517C2858787E52C7D65FB4EDC778900 " +"2019-07-20 02:40:22.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 22f1 Obtaining default signing identity" +"2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:22.240 UTC [msp.identity] Sign -> DEBU 22f3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:22.241 UTC [gossip.discovery] periodicalSendAlive -> DEBU 22f4 Sleeping 5s" +"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f5 Obtaining identity" +"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f6 Obtaining identity" +"2019-07-20 02:40:22.243 UTC [msp] DeserializeIdentity -> DEBU 22f7 Obtaining identity" +"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.244 UTC [msp] DeserializeIdentity -> DEBU 22fa Obtaining identity" +"2019-07-20 02:40:22.244 UTC [gossip.comm] Send -> DEBU 22fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.244 UTC [gossip.comm] sendToEndpoint -> DEBU 22fd Exiting" +"2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.245 UTC [gossip.comm] sendToEndpoint -> DEBU 22ff Exiting" +"2019-07-20 02:40:22.246 UTC [gossip.comm] sendToEndpoint -> DEBU 2300 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.247 UTC [gossip.comm] sendToEndpoint -> DEBU 2301 Exiting" +"2019-07-20 02:40:22.342 UTC [endorser] ProcessProposal -> DEBU 2302 Entering: request from 172.18.0.9:58352" +"2019-07-20 02:40:22.342 UTC [protoutils] ValidateProposalMessage -> DEBU 2303 ValidateProposalMessage starts for signed proposal 0xc003370280" +"2019-07-20 02:40:22.342 UTC [protoutils] validateChannelHeader -> DEBU 2304 validateChannelHeader info: header type 3" +"2019-07-20 02:40:22.342 UTC [protoutils] checkSignatureFromCreator -> DEBU 2305 begin" +"2019-07-20 02:40:22.343 UTC [msp] GetManagerForChain -> DEBU 2306 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2307 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:22.343 UTC [protoutils] checkSignatureFromCreator -> DEBU 2308 creator is valid" +"2019-07-20 02:40:22.343 UTC [msp.identity] Verify -> DEBU 2309 Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| +00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" +"2019-07-20 02:40:22.344 UTC [msp.identity] Verify -> DEBU 230a Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| +00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| +00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| +00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| +00000040 b6 15 f0 b9 47 21 01 |....G!.|" +"2019-07-20 02:40:22.344 UTC [protoutils] checkSignatureFromCreator -> DEBU 230b exits successfully" +"2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230c validateChaincodeProposalMessage starts for proposal 0xc0005b4460, header 0xc003370690" +"2019-07-20 02:40:22.344 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 230d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:22.344 UTC [endorser] preProcess -> DEBU 230e [businesschannel][862a1339] processing txid: 862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457" +"2019-07-20 02:40:22.345 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 230f retrieveTransactionByID() - txId = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +"2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2310 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:22.345 UTC [aclmgmt] CheckACL -> DEBU 2311 acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2312 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2313 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:22.345 UTC [policies] Evaluate -> DEBU 2314 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:22.345 UTC [cauthdsl] func1 -> DEBU 2315 0xc0029331a0 gate 1563590422345723200 evaluation starts" +"2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2316 0xc0029331a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.345 UTC [cauthdsl] func2 -> DEBU 2317 0xc0029331a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2318 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:40:22.346 UTC [msp] Validate -> DEBU 2319 MSP Org1MSP validating identity" +"2019-07-20 02:40:22.346 UTC [msp] getCertificationChain -> DEBU 231a MSP Org1MSP getting certification chain" +"2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231b 0xc0029331a0 principal matched by identity 0" +"2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 e0 8f e0 d0 af 31 29 3b 49 09 2b a8 a7 61 ce e3 |.....1);I.+..a..| +00000010 2f be 78 94 05 52 4b 05 88 55 28 ef 2d 50 f7 08 |/.x..RK..U(.-P..|" +"2019-07-20 02:40:22.346 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 98 65 5c aa e4 35 ba 8a 33 e6 42 |0E.!..e\..5..3.B| +00000010 8b 3d 5b c9 57 39 65 a8 10 b3 7b f6 1f 6d 23 8e |.=[.W9e...{..m#.| +00000020 58 63 d6 da 94 02 20 21 46 82 7a 61 42 18 46 9a |Xc.... !F.zaB.F.| +00000030 0d 90 a8 31 e2 88 25 c1 8f 13 61 1a 13 c5 19 4b |...1..%...a....K| +00000040 b6 15 f0 b9 47 21 01 |....G!.|" +"2019-07-20 02:40:22.346 UTC [cauthdsl] func2 -> DEBU 231e 0xc0029331a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.347 UTC [cauthdsl] func1 -> DEBU 231f 0xc0029331a0 gate 1563590422345723200 evaluation succeeds" +"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2320 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2321 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2322 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:22.347 UTC [policies] Evaluate -> DEBU 2323 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2324 constructing new tx simulator" +"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2325 constructing new tx simulator txid = [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +"2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2326 [businesschannel][862a1339] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:22.347 UTC [stateleveldb] GetState -> DEBU 2327 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:22.347 UTC [endorser] SimulateProposal -> DEBU 2328 [businesschannel][862a1339] Exit" +"2019-07-20 02:40:22.347 UTC [lockbasedtxmgr] Done -> DEBU 2329 Done with transaction simulation / query execution [862a1339406e889a0eda95b3b658f542f9c4ced7ef23c451d3216db76713b457]" +"2019-07-20 02:40:22.348 UTC [endorser] func1 -> DEBU 232a Exit: request from 172.18.0.9:58352" +"2019-07-20 02:40:22.348 UTC [comm.grpc.server] 1 -> INFO 232b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58352 grpc.code=OK grpc.call_duration=6.0452ms +"2019-07-20 02:40:22.351 UTC [grpc] warningf -> DEBU 232c transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58352: read: connection reset by peer" +"2019-07-20 02:40:22.351 UTC [grpc] infof -> DEBU 232d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:22.352 UTC [grpc] infof -> DEBU 232e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:22.367 UTC [gossip.comm] func1 -> DEBU 232f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2330 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.367 UTC [gossip.gossip] handleMessage -> DEBU 2331 Exiting" +"2019-07-20 02:40:22.368 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2332 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.368 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2333 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2334 Verify: digest = 00000000 68 b2 ce e5 1a bc 7e 9c ac ef cd f9 94 e8 b1 1b |h.....~.........| +00000010 11 db 9d 96 e8 0f b2 db 97 c0 3b 77 50 37 88 64 |..........;wP7.d|" +"2019-07-20 02:40:22.368 UTC [msp.identity] Verify -> DEBU 2335 Verify: sig = 00000000 30 45 02 21 00 af dd 12 0b 63 b8 e1 6e 01 6d 74 |0E.!.....c..n.mt| +00000010 a8 2b 6e bc 79 4b b0 d6 d9 5f 71 27 51 10 ad 99 |.+n.yK..._q'Q...| +00000020 a0 f6 24 e5 cb 02 20 77 89 1b 62 25 94 dc 07 38 |..$... w..b%...8| +00000030 28 6b 54 70 20 5e 3c a5 cd 0a 98 8e fd 9d 53 53 |(kTp ^<.......SS| +00000040 9b 69 e8 69 aa 5c b8 |.i.i.\.|" +"2019-07-20 02:40:22.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 2336 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 2337 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2338 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 2339 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233a Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:22.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 233b Exiting" +"2019-07-20 02:40:22.370 UTC [gossip.discovery] handleAliveMessage -> DEBU 233c Exiting" +"2019-07-20 02:40:22.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 233d Exiting" +"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233e Obtaining identity" +"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 233f Obtaining identity" +"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2340 Obtaining identity" +"2019-07-20 02:40:22.371 UTC [gossip.comm] Send -> DEBU 2341 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.371 UTC [msp] DeserializeIdentity -> DEBU 2342 Obtaining identity" +"2019-07-20 02:40:22.372 UTC [gossip.comm] Send -> DEBU 2343 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2344 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2345 Exiting" +"2019-07-20 02:40:22.372 UTC [gossip.comm] sendToEndpoint -> DEBU 2346 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.373 UTC [gossip.comm] sendToEndpoint -> DEBU 2347 Exiting" +"2019-07-20 02:40:22.377 UTC [gossip.comm] func1 -> DEBU 2348 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.377 UTC [gossip.gossip] handleMessage -> DEBU 2349 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.378 UTC [gossip.gossip] handleMessage -> DEBU 234b Exiting" +"2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234c Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.378 UTC [gossip.discovery] handleMsgFromComm -> DEBU 234d Exiting" +"2019-07-20 02:40:22.378 UTC [gossip.comm] func1 -> DEBU 234a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.379 UTC [gossip.gossip] handleMessage -> DEBU 234e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.380 UTC [gossip.gossip] handleMessage -> DEBU 234f Exiting" +"2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2350 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:22.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2351 Exiting" +"2019-07-20 02:40:22.556 UTC [gossip.comm] func1 -> DEBU 2352 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2353 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.556 UTC [gossip.gossip] handleMessage -> DEBU 2354 Exiting" +"2019-07-20 02:40:22.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2355 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.556 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2356 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:22.557 UTC [msp] DeserializeIdentity -> DEBU 2357 Obtaining identity" +"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2358 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2359 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.557 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 235a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:22.558 UTC [policies] Evaluate -> DEBU 235d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:22.558 UTC [cauthdsl] func1 -> DEBU 235e 0xc0007d4190 gate 1563590422558401200 evaluation starts" +"2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 235f 0xc0007d4190 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.558 UTC [cauthdsl] func2 -> DEBU 2360 0xc0007d4190 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2361 0xc0007d4190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:22.559 UTC [cauthdsl] func2 -> DEBU 2362 0xc0007d4190 principal evaluation fails" +"2019-07-20 02:40:22.559 UTC [cauthdsl] func1 -> DEBU 2363 0xc0007d4190 gate 1563590422558401200 evaluation fails" +"2019-07-20 02:40:22.559 UTC [policies] Evaluate -> DEBU 2364 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2365 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:22.560 UTC [policies] Evaluate -> DEBU 2366 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:22.560 UTC [cauthdsl] func1 -> DEBU 2367 0xc0007d4a30 gate 1563590422560915000 evaluation starts" +"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2368 0xc0007d4a30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 2369 0xc0007d4a30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236a 0xc0007d4a30 principal matched by identity 0" +"2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236b Verify: digest = 00000000 46 8b 7b d6 90 39 0f 79 17 a9 b3 43 a0 14 fe 74 |F.{..9.y...C...t| +00000010 e4 2c e5 e6 6f 82 c6 fb ed 5b 3f c5 df fd 1b 32 |.,..o....[?....2|" +"2019-07-20 02:40:22.561 UTC [msp.identity] Verify -> DEBU 236c Verify: sig = 00000000 30 44 02 20 16 a5 c2 0e 55 8a f8 e7 7a b4 06 29 |0D. ....U...z..)| +00000010 05 4f 88 83 a2 d5 8f f8 0d 68 ae 6a 17 d7 45 0c |.O.......h.j..E.| +00000020 a2 35 17 2b 02 20 51 ce ab c4 fc 0b d4 69 e8 65 |.5.+. Q......i.e| +00000030 66 09 be 24 f4 e1 8e f1 8f 5f 09 d4 7b d8 c5 ac |f..$....._..{...| +00000040 49 bc 10 5e 80 94 |I..^..|" +"2019-07-20 02:40:22.561 UTC [cauthdsl] func2 -> DEBU 236d 0xc0007d4a30 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.561 UTC [cauthdsl] func1 -> DEBU 236e 0xc0007d4a30 gate 1563590422560915000 evaluation succeeds" +"2019-07-20 02:40:22.561 UTC [policies] Evaluate -> DEBU 236f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2370 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2371 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:22.562 UTC [policies] Evaluate -> DEBU 2372 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2373 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2374 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2375 updating membership: timestamp: " +"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2376 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2377 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2378 Exiting" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2379 Exiting" +"2019-07-20 02:40:22.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237a Exiting" +"2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 237b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.564 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" +"2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.564 UTC [gossip.discovery] handleMsgFromComm -> DEBU 237f Exiting" +"2019-07-20 02:40:22.564 UTC [gossip.comm] func1 -> DEBU 2380 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2381 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.565 UTC [gossip.gossip] handleMessage -> DEBU 2382 Exiting" +"2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2383 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.565 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2384 Exiting" +"2019-07-20 02:40:22.565 UTC [msp] DeserializeIdentity -> DEBU 2385 Obtaining identity" +"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2386 Obtaining identity" +"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2387 Obtaining identity" +"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2388 Obtaining identity" +"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 2389 Obtaining identity" +"2019-07-20 02:40:22.566 UTC [msp] DeserializeIdentity -> DEBU 238a Obtaining identity" +"2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238c Obtaining identity" +"2019-07-20 02:40:22.567 UTC [msp] DeserializeIdentity -> DEBU 238d Obtaining identity" +"2019-07-20 02:40:22.567 UTC [gossip.comm] Send -> DEBU 238e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 238f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2390 Exiting" +"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2391 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:22.567 UTC [gossip.comm] sendToEndpoint -> DEBU 2392 Exiting" +"2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2393 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.852 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2394 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2395 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2396 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:22.852 UTC [policies] Evaluate -> DEBU 2397 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:22.852 UTC [msp] DeserializeIdentity -> DEBU 2398 Obtaining identity" +"2019-07-20 02:40:22.852 UTC [msp.identity] newIdentity -> DEBU 2399 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJ9PiwMc+yJquw7iESWUUdgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABJFXeJu8Bn4343K9C/p5zMXGWMf7TRDkm1QTRArOtt2UcwjS +hELr0NUrXJ9/itxePp5kcNe1A/SPXSlVbZJb7zyjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIBQFxbpf0MCh/Pc/loudY4Bg +rIfa+QF858Ffm7hagVV9AiB7x5vl9mUFXWvFJffvBYw0mnUxe0HmAS0C7cpoHJbC +dg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:22.852 UTC [cauthdsl] func1 -> DEBU 239a 0xc0007338d0 gate 1563590422852774600 evaluation starts" +"2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239b 0xc0007338d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.852 UTC [cauthdsl] func2 -> DEBU 239c 0xc0007338d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.852 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 239d Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-07-20 02:40:22.853 UTC [msp] Validate -> DEBU 239e MSP OrdererMSP validating identity" +"2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 239f 0xc0007338d0 principal matched by identity 0" +"2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a0 Verify: digest = 00000000 8c b8 01 77 65 0b a3 0a 0a fc 6f 48 84 dd 2f 3f |...we.....oH../?| +00000010 f7 69 6f 14 28 21 3d 73 f7 2d d8 56 d4 4e 22 80 |.io.(!=s.-.V.N".|" +"2019-07-20 02:40:22.853 UTC [msp.identity] Verify -> DEBU 23a1 Verify: sig = 00000000 30 44 02 20 2f ab 29 ad 54 0d 53 67 d2 ab 50 ad |0D. /.).T.Sg..P.| +00000010 c5 98 64 da 4e 92 02 d8 f9 73 20 b4 ff 23 5c a5 |..d.N....s ..#\.| +00000020 ff 27 12 3e 02 20 0f ac fb c2 41 bc 8d bb 20 08 |.'.>. ....A... .| +00000030 16 c9 b0 a9 58 0b fb cb 0e a5 08 54 64 68 40 27 |....X......Tdh@'| +00000040 7f 8c df 1b 24 f0 |....$.|" +"2019-07-20 02:40:22.853 UTC [cauthdsl] func2 -> DEBU 23a2 0xc0007338d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.853 UTC [cauthdsl] func1 -> DEBU 23a3 0xc0007338d0 gate 1563590422852774600 evaluation succeeds" +"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:22.853 UTC [policies] Evaluate -> DEBU 23a6 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:22.855 UTC [policies] Evaluate -> DEBU 23a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:22.855 UTC [blocksProvider] DeliverBlocks -> DEBU 23a8 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-07-20 02:40:22.855 UTC [gossip.state] addPayload -> DEBU 23a9 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-07-20 02:40:22.856 UTC [gossip.state] addPayload -> DEBU 23aa Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ab [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +"2019-07-20 02:40:22.856 UTC [gossip.state] deliverPayloads -> DEBU 23ac [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +"2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> INFO 23ad [businesschannel] Received block [3] from buffer" +"2019-07-20 02:40:22.856 UTC [gossip.privdata] StoreBlock -> DEBU 23af [businesschannel] Validating block [3]" +"2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b0 [businesschannel] START Block Validation for block [3]" +"2019-07-20 02:40:22.857 UTC [committer.txvalidator] Validate -> DEBU 23b1 expecting 1 block validation responses" +"2019-07-20 02:40:22.857 UTC [committer.txvalidator] validateTx -> DEBU 23b2 [businesschannel] validateTx starts for block 0xc0006949c0 env 0xc003371810 txn 0" +"2019-07-20 02:40:22.856 UTC [blocksProvider] DeliverBlocks -> DEBU 23ae [businesschannel] Gossiping block [3], peers number [3]" +"2019-07-20 02:40:22.857 UTC [protoutils] ValidateTransaction -> DEBU 23b3 ValidateTransactionEnvelope starts for envelope 0xc003371810" +"2019-07-20 02:40:22.858 UTC [protoutils] ValidateTransaction -> DEBU 23b4 Header is channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " +"2019-07-20 02:40:22.858 UTC [protoutils] validateChannelHeader -> DEBU 23b5 validateChannelHeader info: header type 3" +"2019-07-20 02:40:22.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b6 begin" +"2019-07-20 02:40:22.859 UTC [msp] GetManagerForChain -> DEBU 23b7 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b8 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:22.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 23b9 creator is valid" +"2019-07-20 02:40:22.859 UTC [msp.identity] Verify -> DEBU 23ba Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +"2019-07-20 02:40:22.860 UTC [msp.identity] Verify -> DEBU 23bb Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +00000040 d7 3e d5 8f e5 b0 |.>....|" +"2019-07-20 02:40:22.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 23bc exits successfully" +"2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23bd validateEndorserTransaction starts for data 0xc00323ca80, header channel_header:"\010\003\032\014\010\366\375\311\351\005\020\344\375\271\344\002\"\017businesschannel*@79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f:\010\022\006\022\004lscc" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\036E\311&g*\274\n\233\335{\344\252\031\357M\361y\350\340\236\3666" " +"2019-07-20 02:40:22.860 UTC [protoutils] validateEndorserTransaction -> DEBU 23be validateEndorserTransaction info: there are 1 actions" +"2019-07-20 02:40:22.861 UTC [protoutils] validateEndorserTransaction -> DEBU 23bf validateEndorserTransaction info: signature header is valid" +"2019-07-20 02:40:22.858 UTC [gossip.channel] AddToMsgStore -> DEBU 23c0 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:40:22.861 UTC [protoutils] ValidateTransaction -> DEBU 23c1 ValidateTransactionEnvelope returns err %!s()" +"2019-07-20 02:40:22.861 UTC [committer.txvalidator] validateTx -> DEBU 23c2 Transaction is for channel businesschannel" +"2019-07-20 02:40:22.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 23c3 retrieveTransactionByID() - txId = [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f]" +"2019-07-20 02:40:22.862 UTC [committer.txvalidator] validateTx -> DEBU 23c4 Validating transaction vscc tx validate" +"2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23c5 [businesschannel] VSCCValidateTx starts for bytes 0xc003bad000" +"2019-07-20 02:40:22.862 UTC [gossip.pull] Add -> DEBU 23c6 Added 3, total items: 3" +"2019-07-20 02:40:22.862 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 23c7 Validating Tx 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c8 Obtaining identity" +"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23c9 Obtaining identity" +"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23ca Obtaining identity" +"2019-07-20 02:40:22.863 UTC [msp] DeserializeIdentity -> DEBU 23cb Obtaining identity" +"2019-07-20 02:40:22.863 UTC [gossip.comm] Send -> DEBU 23cc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23cd Obtaining identity" +"2019-07-20 02:40:22.864 UTC [msp] DeserializeIdentity -> DEBU 23ce Obtaining identity" +"2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4542 bytes, seq: 3}, Envelope: 4572 bytes, Signature: 0 bytes" +"2019-07-20 02:40:22.864 UTC [gossip.comm] sendToEndpoint -> DEBU 23d0 Exiting" +"2019-07-20 02:40:22.869 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23d1 constructing new query executor txid = [dd0ee138-c617-46cb-98a9-fae76c835f47]" +"2019-07-20 02:40:22.870 UTC [lockbasedtxmgr] Done -> DEBU 23d2 Done with transaction simulation / query execution [dd0ee138-c617-46cb-98a9-fae76c835f47]" +"2019-07-20 02:40:22.871 UTC [msp] DeserializeIdentity -> DEBU 23d3 Obtaining identity" +"2019-07-20 02:40:22.872 UTC [msp.identity] newIdentity -> DEBU 23d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-07-20 02:40:22.873 UTC [cauthdsl] func1 -> DEBU 23d5 0xc0006bb9b0 gate 1563590422873396500 evaluation starts" +"2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d6 0xc0006bb9b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.873 UTC [cauthdsl] func2 -> DEBU 23d7 0xc0006bb9b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.873 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 23d8 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:40:22.873 UTC [msp] Validate -> DEBU 23d9 MSP Org1MSP validating identity" +"2019-07-20 02:40:22.876 UTC [msp] getCertificationChain -> DEBU 23da MSP Org1MSP getting certification chain" +"2019-07-20 02:40:22.877 UTC [cauthdsl] func2 -> DEBU 23db 0xc0006bb9b0 principal matched by identity 0" +"2019-07-20 02:40:22.877 UTC [msp.identity] Verify -> DEBU 23dc Verify: digest = 00000000 37 df f6 38 16 3b f0 53 f0 a2 02 08 1d 97 3d 9c |7..8.;.S......=.| +00000010 03 28 93 2f 16 90 5d 7c a0 7d 4d fd 41 58 8e d9 |.(./..]|.}M.AX..|" +"2019-07-20 02:40:22.878 UTC [msp.identity] Verify -> DEBU 23dd Verify: sig = 00000000 30 43 02 20 1b 72 18 31 bd 18 67 a2 cd 03 ca 91 |0C. .r.1..g.....| +00000010 cb 37 6c 80 76 45 b9 6c f3 20 09 f6 4b 83 fd 0d |.7l.vE.l. ..K...| +00000020 34 a4 1b 10 02 1f 2e cb 8a df 0f 19 1b 54 e4 9a |4............T..| +00000030 d8 18 2b f3 83 42 4a 03 5a 19 be 2b 47 b4 bb c4 |..+..BJ.Z..+G...| +00000040 df f8 47 dc 1f |..G..|" +"2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23de 0xc0006bb9b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.880 UTC [cauthdsl] func2 -> DEBU 23df 0xc0006bb9b0 signed by 1 principal evaluation starts (used [true])" +"2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e0 0xc0006bb9b0 skipping identity 0 because it has already been used" +"2019-07-20 02:40:22.881 UTC [cauthdsl] func2 -> DEBU 23e1 0xc0006bb9b0 principal evaluation fails" +"2019-07-20 02:40:22.881 UTC [cauthdsl] func1 -> DEBU 23e2 0xc0006bb9b0 gate 1563590422873396500 evaluation succeeds" +"2019-07-20 02:40:22.882 UTC [vscc] Validate -> DEBU 23e3 VSCC info: doing special validation for LSCC" +"2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e4 VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-07-20 02:40:22.882 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e5 VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e6 Namespace exp02" +"2019-07-20 02:40:22.883 UTC [vscc] ValidateLSCCInvocation -> DEBU 23e7 Namespace lscc" +"2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23e8 constructing new query executor txid = [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" +"2019-07-20 02:40:22.884 UTC [stateleveldb] GetState -> DEBU 23e9 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:22.884 UTC [lockbasedtxmgr] Done -> DEBU 23ea Done with transaction simulation / query execution [9c8ac5d0-30f8-430f-a1a6-a6ef74648923]" +"2019-07-20 02:40:22.884 UTC [vscc] ValidateLSCCInvocation -> DEBU 23eb Validating deploy for cc exp02 version 1.0" +"2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 23ec constructing new query executor txid = [82bb1a55-4f36-491e-9f0c-a5955335d197]" +"2019-07-20 02:40:22.886 UTC [stateleveldb] GetState -> DEBU 23ed GetState(). ns=lscc, key=exp02~collection" +"2019-07-20 02:40:22.886 UTC [lockbasedtxmgr] Done -> DEBU 23ee Done with transaction simulation / query execution [82bb1a55-4f36-491e-9f0c-a5955335d197]" +"2019-07-20 02:40:22.887 UTC [cauthdsl] func1 -> DEBU 23ef 0xc000587cd0 gate 1563590422887178600 evaluation starts" +"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f0 0xc000587cd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f1 0xc000587cd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:22.888 UTC [cauthdsl] func2 -> DEBU 23f2 0xc000587cd0 principal matched by identity 0" +"2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f3 Verify: digest = 00000000 13 27 15 23 7f ea c0 6f f7 de 69 7f b9 4e 40 d3 |.'.#...o..i..N@.| +00000010 38 a8 45 7d 44 dc 8a 10 99 a9 8a ac fc d5 cf ae |8.E}D...........|" +"2019-07-20 02:40:22.889 UTC [msp.identity] Verify -> DEBU 23f4 Verify: sig = 00000000 30 44 02 20 0b 81 c6 a7 17 d4 96 a6 66 f3 cb b5 |0D. ........f...| +00000010 9f 25 19 03 8e 60 80 9a e5 ac 41 d1 a3 2d 31 f2 |.%...`....A..-1.| +00000020 28 f6 ae 65 02 20 3e f9 bf 45 f5 36 e2 e0 5a 4e |(..e. >..E.6..ZN| +00000030 77 6f 7b 18 9e b3 b7 58 30 f8 63 80 a4 00 54 7f |wo{....X0.c...T.| +00000040 d7 3e d5 8f e5 b0 |.>....|" +"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f5 0xc000587cd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f6 0xc000587cd0 signed by 1 principal evaluation starts (used [true])" +"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f7 0xc000587cd0 skipping identity 0 because it has already been used" +"2019-07-20 02:40:22.889 UTC [cauthdsl] func2 -> DEBU 23f8 0xc000587cd0 principal evaluation fails" +"2019-07-20 02:40:22.890 UTC [cauthdsl] func1 -> DEBU 23f9 0xc000587cd0 gate 1563590422887178600 evaluation succeeds" +"2019-07-20 02:40:22.890 UTC [vscc] Validate -> DEBU 23fa block 3, namespace: lscc, tx 0 validation results is: " +"2019-07-20 02:40:22.890 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 23fb Transaction 79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f appears to be valid" +"2019-07-20 02:40:22.890 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 23fc [businesschannel] VSCCValidateTx completes env bytes 0xc003bad000" +"2019-07-20 02:40:22.890 UTC [committer.txvalidator] validateTx -> DEBU 23fd [businesschannel] validateTx completes for block 0xc0006949c0 env 0xc003371810 txn 0" +"2019-07-20 02:40:22.890 UTC [committer.txvalidator] Validate -> DEBU 23fe got result for idx 0, code 0" +"2019-07-20 02:40:22.891 UTC [committer.txvalidator] Validate -> INFO 23ff [businesschannel] Validated block [3] in 34ms" +"2019-07-20 02:40:22.892 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2400 Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:40:22.892 UTC [gossip.privdata] StoreBlock -> DEBU 2401 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:40:22.892 UTC [kvledger] CommitWithPvtData -> DEBU 2402 [businesschannel] Validating state for block [3]" +"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2403 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2404 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:40:22.892 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2405 Validating new block with num trans = [1]" +"2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2406 ValidateAndPrepareBatch() for block number = [3]" +"2019-07-20 02:40:22.893 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2407 preprocessing ProtoBlock..." +"2019-07-20 02:40:22.893 UTC [valimpl] preprocessProtoBlock -> DEBU 2408 txType=ENDORSER_TRANSACTION" +"2019-07-20 02:40:22.894 UTC [stateleveldb] GetState -> DEBU 2409 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:22.894 UTC [statebasedval] validateKVRead -> DEBU 240a Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-07-20 02:40:22.894 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 240b Block [3] Transaction index [0] TxId [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] marked as valid by state validator" +"2019-07-20 02:40:22.894 UTC [valinternal] ApplyWriteSet -> DEBU 240c txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc000258880), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0002588c0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc000258900)}" +"2019-07-20 02:40:22.894 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240d validating rwset..." +"2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240e postprocessing ProtoBlock..." +"2019-07-20 02:40:22.895 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 240f ValidateAndPrepareBatch() complete" +"2019-07-20 02:40:22.895 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2410 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00309b4a0)}}" +"2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleStateUpdates -> INFO 2411 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-07-20 02:40:22.896 UTC [stateleveldb] GetState -> DEBU 2412 GetState(). ns=lscc, key=exp02~collection" +"2019-07-20 02:40:22.896 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2413 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-07-20 02:40:22.897 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 2414 Created metadata tar" +"2019-07-20 02:40:22.897 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 2415 Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +"2019-07-20 02:40:22.897 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 2416 Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-07-20 02:40:22.897 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2417 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +"2019-07-20 02:40:22.897 UTC [stateleveldb] GetState -> DEBU 2418 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2419 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 201 201 124 213 209 131 170 90 214 236 213 79 201 15 102 244 57 138 217 224 48 255 78 38 213 53 156 203 16 22 213 204 2 32 92 73 198 4 5 111 56 38 126 201 24 110 29 201 66 1 202 46 128 237 231 125 50 102 55 17 170 129 77 248 168 103]} 0x15231a0}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0007d3200 0xc0007d0ba0 {{0 0} 0 0 0 0} {false}})]}" +"2019-07-20 02:40:22.898 UTC [stateleveldb] GetState -> DEBU 241a GetState(). ns=lscc, key=exp02~collection" +"2019-07-20 02:40:22.898 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 241b Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00049f160})}" +"2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241c [businesschannel] Adding CommitHash to the block [3]" +"2019-07-20 02:40:22.899 UTC [kvledger] CommitWithPvtData -> DEBU 241d [businesschannel] Committing block [3] to storage" +"2019-07-20 02:40:22.899 UTC [ledgerstorage] CommitWithPvtData -> DEBU 241e Writing block [3] to pvt block store" +"2019-07-20 02:40:22.901 UTC [pvtdatastorage] Prepare -> DEBU 241f Saved 0 private data write sets for block [3]" +"2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2420 Indexing block [blockNum=3, blockHash=[]byte{0x18, 0x70, 0x86, 0xed, 0x63, 0x58, 0x1a, 0xe8, 0x75, 0x8c, 0x4e, 0x43, 0x60, 0x90, 0xd4, 0xe2, 0xe5, 0xb8, 0x6b, 0x53, 0x15, 0x11, 0x95, 0xd4, 0xe0, 0xf8, 0xb9, 0xcf, 0x43, 0x25, 0x9d, 0x7f} txOffsets= +txId=79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f locPointer=offset=70, bytesLength=3522 +]" +"2019-07-20 02:40:22.903 UTC [fsblkstorage] indexBlock -> DEBU 2421 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to txid-index" +"2019-07-20 02:40:22.904 UTC [fsblkstorage] indexBlock -> DEBU 2422 Adding txLoc [fileSuffixNum=0, offset=71531, bytesLength=3522] for tx number:[0] ID: [79f74fa3eadc7ad8636afd13f6f2b711028444747730b1f136cbaf101b60776f] to blockNumTranNum index" +"2019-07-20 02:40:22.907 UTC [fsblkstorage] updateCheckpoint -> DEBU 2423 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76025], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-07-20 02:40:22.908 UTC [pvtdatastorage] Commit -> DEBU 2424 Committing private data for block [3]" +"2019-07-20 02:40:22.910 UTC [pvtdatastorage] Commit -> DEBU 2425 Committed private data for block [3]" +"2019-07-20 02:40:22.911 UTC [kvledger] CommitWithPvtData -> DEBU 2426 [businesschannel] Committing block [3] transactions to state database" +"2019-07-20 02:40:22.911 UTC [lockbasedtxmgr] Commit -> DEBU 2427 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 2428 Committing updates to state database" +"2019-07-20 02:40:22.912 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2429 Building the expiry schedules based on the update batch" +"2019-07-20 02:40:22.912 UTC [lockbasedtxmgr] Commit -> DEBU 242a Write lock acquired for committing updates to state database" +"2019-07-20 02:40:22.913 UTC [stateleveldb] ApplyUpdates -> DEBU 242b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-07-20 02:40:22.914 UTC [stateleveldb] ApplyUpdates -> DEBU 242d Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +"2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] Commit -> DEBU 242e Updates committed to state database and the write lock is released" +"2019-07-20 02:40:22.916 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 242f Preparing potential purge list working-set for expiringAtBlk [4]" +"2019-07-20 02:40:22.916 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2430 constructing new query executor txid = [3b620695-cd97-4774-aa6c-670f7a63026d]" +"2019-07-20 02:40:22.917 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 2431 Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +"2019-07-20 02:40:22.917 UTC [stateleveldb] GetState -> DEBU 2432 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:22.917 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2433 Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +"2019-07-20 02:40:22.917 UTC [lockbasedtxmgr] Done -> DEBU 2434 Done with transaction simulation / query execution [3b620695-cd97-4774-aa6c-670f7a63026d]" +"2019-07-20 02:40:22.918 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 2435 Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +"2019-07-20 02:40:22.918 UTC [msp] GetDefaultSigningIdentity -> DEBU 2436 Obtaining default signing identity" +"2019-07-20 02:40:22.918 UTC [msp.identity] Sign -> DEBU 2437 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08031A0C0A0565787030321203312E30 " +"2019-07-20 02:40:22.919 UTC [msp.identity] Sign -> DEBU 2438 Sign: digest: F57E1C530C7035E35585EC6DB2FD52DEB073123D88DCDEDA3469126395DE6470 " +"2019-07-20 02:40:22.920 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2439 Listeners for channel businesschannel invoked" +"2019-07-20 02:40:22.916 UTC [leveldbhelper] GetIterator -> DEBU 243a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +"2019-07-20 02:40:22.920 UTC [lockbasedtxmgr] func1 -> DEBU 243b launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:40:22.920 UTC [kvledger] CommitWithPvtData -> DEBU 243c [businesschannel] Committing block [3] transactions to history database" +"2019-07-20 02:40:22.920 UTC [historyleveldb] Commit -> DEBU 243d Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +"2019-07-20 02:40:22.920 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 243e No expiry entry found for expiringAtBlk [4]" +"2019-07-20 02:40:22.922 UTC [historyleveldb] Commit -> DEBU 243f Channel [businesschannel]: Updates committed to history database for blockNo [3]" +"2019-07-20 02:40:22.922 UTC [kvledger] CommitWithPvtData -> INFO 2440 [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=6ms block_and_pvtdata_commit=11ms state_commit=9ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +"2019-07-20 02:40:22.923 UTC [msp] GetDefaultSigningIdentity -> DEBU 2441 Obtaining default signing identity" +"2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2442 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08041A0C0A0565787030321203312E30 " +"2019-07-20 02:40:22.923 UTC [msp.identity] Sign -> DEBU 2443 Sign: digest: BF89A0C215F21F47A90AE4FECE47C8598012A62D55BBCAD57DA7449BE32BD4F1 " +"2019-07-20 02:40:22.923 UTC [gossip.state] commitBlock -> DEBU 2444 [businesschannel] Committed block [3] with 1 transaction(s)" +"2019-07-20 02:40:23.929 UTC [gossip.comm] func1 -> DEBU 2445 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.930 UTC [gossip.gossip] handleMessage -> DEBU 2446 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.931 UTC [gossip.gossip] handleMessage -> DEBU 2447 Exiting" +"2019-07-20 02:40:23.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2448 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2449 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:23.933 UTC [msp] DeserializeIdentity -> DEBU 244a Obtaining identity" +"2019-07-20 02:40:23.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 244b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:23.935 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 244d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:23.936 UTC [policies] Evaluate -> DEBU 244e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 244f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:23.937 UTC [policies] Evaluate -> DEBU 2450 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:23.938 UTC [cauthdsl] func1 -> DEBU 2451 0xc00049b6c0 gate 1563590423938160300 evaluation starts" +"2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2452 0xc00049b6c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:23.938 UTC [cauthdsl] func2 -> DEBU 2453 0xc00049b6c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2454 0xc00049b6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 2455 0xc00049b6c0 principal evaluation fails" +"2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 2456 0xc00049b6c0 gate 1563590423938160300 evaluation fails" +"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2457 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2458 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:23.939 UTC [policies] Evaluate -> DEBU 2459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:23.939 UTC [cauthdsl] func1 -> DEBU 245a 0xc00049bf00 gate 1563590423939786700 evaluation starts" +"2019-07-20 02:40:23.939 UTC [cauthdsl] func2 -> DEBU 245b 0xc00049bf00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245c 0xc00049bf00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 245d 0xc00049bf00 principal matched by identity 0" +"2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245e Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| +00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" +"2019-07-20 02:40:23.940 UTC [msp.identity] Verify -> DEBU 245f Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| +00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| +00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| +00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| +00000040 16 dd 0a 2d 86 f3 96 |...-...|" +"2019-07-20 02:40:23.940 UTC [cauthdsl] func2 -> DEBU 2460 0xc00049bf00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:23.941 UTC [cauthdsl] func1 -> DEBU 2461 0xc00049bf00 gate 1563590423939786700 evaluation succeeds" +"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2462 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2463 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:23.941 UTC [policies] Evaluate -> DEBU 2464 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:23.942 UTC [policies] Evaluate -> DEBU 2465 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:23.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:23.942 UTC [gossip.discovery] learnExistingMembers -> DEBU 2467 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2468 updating membership: timestamp: " +"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 2469 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:23.943 UTC [gossip.discovery] learnExistingMembers -> DEBU 246b Exiting" +"2019-07-20 02:40:23.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 246c Exiting" +"2019-07-20 02:40:23.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 246d Exiting" +"2019-07-20 02:40:23.944 UTC [gossip.discovery] sendMemResponse -> DEBU 246e Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:23.944 UTC [msp] DeserializeIdentity -> DEBU 246f Obtaining identity" +"2019-07-20 02:40:23.945 UTC [gossip.comm] func1 -> DEBU 2470 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.945 UTC [gossip.gossip] handleMessage -> DEBU 2471 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.945 UTC [gossip.pull] HandleMessage -> DEBU 2473 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2474 Obtaining identity" +"2019-07-20 02:40:23.945 UTC [msp] DeserializeIdentity -> DEBU 2472 Obtaining identity" +"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2475 Obtaining identity" +"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2476 Obtaining identity" +"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2477 Obtaining identity" +"2019-07-20 02:40:23.946 UTC [msp] DeserializeIdentity -> DEBU 2478 Obtaining identity" +"2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 2479 Obtaining identity" +"2019-07-20 02:40:23.947 UTC [msp] DeserializeIdentity -> DEBU 247a Obtaining identity" +"2019-07-20 02:40:23.948 UTC [gossip.pull] SendDigest -> DEBU 247b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:23.948 UTC [gossip.gossip] handleMessage -> DEBU 247c Exiting" +"2019-07-20 02:40:23.948 UTC [gossip.comm] Send -> DEBU 247d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:23.949 UTC [gossip.comm] sendToEndpoint -> DEBU 247f Exiting" +"2019-07-20 02:40:23.949 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020$" signature:"0E\002!\000\257\335\022\013c\270\341n\001mt\250+n\274yK\260\326\331_q'Q\020\255\231\240\366$\345\313\002 w\211\033b%\224\334\0078(kTp ^<\245\315\n\230\216\375\235SS\233i\350i\252\\\270" > alive: alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +"2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2481 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2482 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.254 UTC [gossip.pull] Hello -> DEBU 2483 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:24.254 UTC [gossip.comm] Send -> DEBU 2484 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.255 UTC [gossip.pull] Hello -> DEBU 2485 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:24.255 UTC [gossip.comm] Send -> DEBU 2486 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2487 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.255 UTC [gossip.comm] sendToEndpoint -> DEBU 2488 Exiting" +"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 2489 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248a Exiting" +"2019-07-20 02:40:24.257 UTC [gossip.comm] func1 -> DEBU 248b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.258 UTC [gossip.pull] HandleMessage -> DEBU 248d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.258 UTC [gossip.gossip] handleMessage -> DEBU 248e Exiting" +"2019-07-20 02:40:24.256 UTC [gossip.comm] sendToEndpoint -> DEBU 248f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.259 UTC [gossip.comm] func1 -> DEBU 2490 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.259 UTC [gossip.gossip] handleMessage -> DEBU 2491 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.259 UTC [gossip.pull] HandleMessage -> DEBU 2492 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.260 UTC [gossip.gossip] handleMessage -> DEBU 2493 Exiting" +"2019-07-20 02:40:24.259 UTC [gossip.comm] sendToEndpoint -> DEBU 2494 Exiting" +"2019-07-20 02:40:24.262 UTC [gossip.comm] func1 -> DEBU 2495 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2496 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.262 UTC [gossip.pull] HandleMessage -> DEBU 2497 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.262 UTC [gossip.gossip] handleMessage -> DEBU 2498 Exiting" +"2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 2499 Obtaining default signing identity" +"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151021 " +"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249b Sign: digest: 086E8AFDC0D95B46BA6F5676E9FFC6D08AB168E789B5C7D3982A0EFD3FDED97B " +"2019-07-20 02:40:24.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 249c Obtaining default signing identity" +"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:24.295 UTC [msp.identity] Sign -> DEBU 249e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 249f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a0 Obtaining identity" +"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a1 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.296 UTC [msp] DeserializeIdentity -> DEBU 24a2 Obtaining identity" +"2019-07-20 02:40:24.296 UTC [gossip.comm] Send -> DEBU 24a3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.296 UTC [gossip.comm] sendToEndpoint -> DEBU 24a5 Exiting" +"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a7 Exiting" +"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.297 UTC [gossip.comm] sendToEndpoint -> DEBU 24a9 Exiting" +"2019-07-20 02:40:24.299 UTC [gossip.comm] func1 -> DEBU 24aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.299 UTC [gossip.gossip] handleMessage -> DEBU 24ab Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.300 UTC [gossip.gossip] handleMessage -> DEBU 24ac Exiting" +"2019-07-20 02:40:24.300 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.300 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24ae Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24af Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +"2019-07-20 02:40:24.301 UTC [msp.identity] Verify -> DEBU 24b0 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +"2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.302 UTC [gossip.discovery] isSentByMe -> DEBU 24b2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b4 Exiting" +"2019-07-20 02:40:24.304 UTC [gossip.gossip] handleMessage -> DEBU 24b6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.304 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b7 Exiting" +"2019-07-20 02:40:24.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.303 UTC [gossip.comm] func1 -> DEBU 24b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.305 UTC [gossip.gossip] handleMessage -> DEBU 24b9 Exiting" +"2019-07-20 02:40:24.306 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24bb Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:24.306 UTC [msp.identity] Verify -> DEBU 24bc Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +"2019-07-20 02:40:24.307 UTC [msp.identity] Verify -> DEBU 24bd Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +"2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24be Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.307 UTC [gossip.discovery] isSentByMe -> DEBU 24bf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 24c0 Exiting" +"2019-07-20 02:40:24.308 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c1 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:24.308 UTC [msp] DeserializeIdentity -> DEBU 24c2 Obtaining identity" +"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.309 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24c5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.309 UTC [policies] Evaluate -> DEBU 24c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.309 UTC [cauthdsl] func1 -> DEBU 24c9 0xc00044ebf0 gate 1563590424309885400 evaluation starts" +"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24ca 0xc00044ebf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cb 0xc00044ebf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cc 0xc00044ebf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.310 UTC [cauthdsl] func2 -> DEBU 24cd 0xc00044ebf0 principal evaluation fails" +"2019-07-20 02:40:24.310 UTC [cauthdsl] func1 -> DEBU 24ce 0xc00044ebf0 gate 1563590424309885400 evaluation fails" +"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.310 UTC [policies] Evaluate -> DEBU 24d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.311 UTC [cauthdsl] func1 -> DEBU 24d2 0xc00044f580 gate 1563590424310987600 evaluation starts" +"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d3 0xc00044f580 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d4 0xc00044f580 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.311 UTC [cauthdsl] func2 -> DEBU 24d5 0xc00044f580 principal matched by identity 0" +"2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d6 Verify: digest = 00000000 31 01 b5 67 4c 33 cb f4 36 80 ff cb e1 f9 1d 73 |1..gL3..6......s| +00000010 f9 9b 49 64 38 02 b9 2e b6 09 35 4b 89 8f 7c 6a |..Id8.....5K..|j|" +"2019-07-20 02:40:24.311 UTC [msp.identity] Verify -> DEBU 24d7 Verify: sig = 00000000 30 45 02 21 00 cb d8 3b 0a 47 60 c8 63 0b 30 33 |0E.!...;.G`.c.03| +00000010 ef fa 63 02 a9 3c e8 cf 92 f2 91 89 ff 4c 4d fd |..c..<.......LM.| +00000020 fe f9 12 55 7e 02 20 17 e7 93 62 80 25 1f 8c 59 |...U~. ...b.%..Y| +00000030 87 34 55 f3 9d 50 97 0c 4a 64 57 4d 7c c9 fe 03 |.4U..P..JdWM|...| +00000040 16 dd 0a 2d 86 f3 96 |...-...|" +"2019-07-20 02:40:24.312 UTC [cauthdsl] func2 -> DEBU 24d8 0xc00044f580 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.312 UTC [cauthdsl] func1 -> DEBU 24d9 0xc00044f580 gate 1563590424310987600 evaluation succeeds" +"2019-07-20 02:40:24.312 UTC [policies] Evaluate -> DEBU 24da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dc Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.313 UTC [policies] Evaluate -> DEBU 24dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24de Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 24df Exiting" +"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e0 Exiting" +"2019-07-20 02:40:24.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24e2 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:24.314 UTC [gossip.gossip] handleMessage -> DEBU 24e3 Exiting" +"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e4 Verify: digest = 00000000 08 6e 8a fd c0 d9 5b 46 ba 6f 56 76 e9 ff c6 d0 |.n....[F.oVv....| +00000010 8a b1 68 e7 89 b5 c7 d3 98 2a 0e fd 3f de d9 7b |..h......*..?..{|" +"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e5 Verify: sig = 00000000 30 45 02 21 00 87 90 20 fe 4a 00 aa a0 29 fc 06 |0E.!... .J...)..| +00000010 b5 da 6f 8a bb 56 e1 ec 9b eb 35 35 4b d9 da 4e |..o..V....55K..N| +00000020 d4 ed bc 52 22 02 20 5b ac e8 c5 7e 0a c5 85 94 |...R". [...~....| +00000030 f3 b5 d1 4d fe d5 38 9f 14 66 12 4b a7 fa c2 15 |...M..8..f.K....| +00000040 91 27 e1 c4 6b 90 f8 |.'..k..|" +"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:24.315 UTC [msp.identity] Verify -> DEBU 24e7 Verify: sig = 00000000 30 44 02 20 0e 9c 8d a2 0e f2 2a e5 9b b6 17 d3 |0D. ......*.....| +00000010 ac 3a c0 37 a4 0a 51 12 b7 f2 a7 78 69 65 16 5d |.:.7..Q....xie.]| +00000020 22 16 c0 19 02 20 74 42 a4 00 5d 04 90 54 fb b3 |".... tB..]..T..| +00000030 18 89 61 bb 4b a0 27 eb c0 7a 18 20 6b a9 6e 5b |..a.K.'..z. k.n[| +00000040 76 47 a5 81 e4 57 |vG...W|" +"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:24.316 UTC [gossip.discovery] isSentByMe -> DEBU 24e9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 24ea Exiting" +"2019-07-20 02:40:24.316 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24eb Exiting" +"2019-07-20 02:40:24.369 UTC [gossip.comm] func1 -> DEBU 24ec Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.369 UTC [gossip.gossip] handleMessage -> DEBU 24ed Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.369 UTC [gossip.pull] HandleMessage -> DEBU 24ee GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.370 UTC [gossip.pull] SendDigest -> DEBU 24ef Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:24.370 UTC [gossip.gossip] handleMessage -> DEBU 24f0 Exiting" +"2019-07-20 02:40:24.374 UTC [gossip.comm] func1 -> DEBU 24f1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.374 UTC [gossip.gossip] handleMessage -> DEBU 24f3 Exiting" +"2019-07-20 02:40:24.375 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.375 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f6 Verify: digest = 00000000 f7 db 21 ce dd da b6 c7 68 b1 be dc 17 69 4a 9b |..!.....h....iJ.| +00000010 4e 1c 08 d7 64 40 fd 34 71 bb af 05 ca b4 96 37 |N...d@.4q......7|" +"2019-07-20 02:40:24.375 UTC [msp.identity] Verify -> DEBU 24f7 Verify: sig = 00000000 30 45 02 21 00 a9 5d 61 2b f5 ac c6 63 89 4e fb |0E.!..]a+...c.N.| +00000010 6d 08 85 da 52 55 17 cc 93 8d 2f 40 5a 31 27 6f |m...RU..../@Z1'o| +00000020 60 28 81 78 28 02 20 34 05 05 23 bd 08 70 b9 c6 |`(.x(. 4..#..p..| +00000030 14 de 52 b0 16 16 d2 21 c8 66 04 9a 5e 48 b1 6b |..R....!.f..^H.k| +00000040 f9 63 98 57 62 85 db |.c.Wb..|" +"2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:24.376 UTC [msp.identity] Verify -> DEBU 24f9 Verify: sig = 00000000 30 44 02 20 6f fe ab d1 9b f0 4b c4 7e fe 0f 5a |0D. o.....K.~..Z| +00000010 68 f2 ab 5a db a3 02 fa 13 ad bd 37 e4 49 a3 01 |h..Z.......7.I..| +00000020 f3 3a bb 13 02 20 65 1d ea 2a 8c 94 ee 54 27 11 |.:... e..*...T'.| +00000030 5b eb 0f c2 00 78 d8 2c 50 e9 96 8d 9c 0d 8c 79 |[....x.,P......y| +00000040 b8 75 1a 8a eb 03 |.u....|" +"2019-07-20 02:40:24.377 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:24.377 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fc updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:24.378 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:24.379 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Exiting" +"2019-07-20 02:40:24.379 UTC [gossip.discovery] handleAliveMessage -> DEBU 2500 Exiting" +"2019-07-20 02:40:24.380 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2501 Exiting" +"2019-07-20 02:40:24.380 UTC [gossip.discovery] sendMemResponse -> DEBU 2502 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:24.380 UTC [msp] DeserializeIdentity -> DEBU 2503 Obtaining identity" +"2019-07-20 02:40:24.381 UTC [msp] DeserializeIdentity -> DEBU 2504 Obtaining identity" +"2019-07-20 02:40:24.381 UTC [gossip.comm] Send -> DEBU 2505 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.382 UTC [gossip.discovery] sendMemResponse -> DEBU 2506 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" secret_envelope: > alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +"2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.382 UTC [gossip.comm] sendToEndpoint -> DEBU 2508 Exiting" +"2019-07-20 02:40:24.542 UTC [endorser] ProcessProposal -> DEBU 2509 Entering: request from 172.18.0.9:58356" +"2019-07-20 02:40:24.542 UTC [protoutils] ValidateProposalMessage -> DEBU 250a ValidateProposalMessage starts for signed proposal 0xc002fdc370" +"2019-07-20 02:40:24.543 UTC [protoutils] validateChannelHeader -> DEBU 250b validateChannelHeader info: header type 3" +"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250c begin" +"2019-07-20 02:40:24.543 UTC [msp] GetManagerForChain -> DEBU 250d Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:24.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 250f creator is valid" +"2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2510 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| +00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" +"2019-07-20 02:40:24.543 UTC [msp.identity] Verify -> DEBU 2511 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| +00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| +00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| +00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| +00000040 63 c0 3c 1d 9d 1d |c.<...|" +"2019-07-20 02:40:24.544 UTC [protoutils] checkSignatureFromCreator -> DEBU 2512 exits successfully" +"2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2513 validateChaincodeProposalMessage starts for proposal 0xc0005e7f80, header 0xc002fdc780" +"2019-07-20 02:40:24.544 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2514 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:24.544 UTC [endorser] preProcess -> DEBU 2515 [businesschannel][9ced4390] processing txid: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe" +"2019-07-20 02:40:24.544 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2516 retrieveTransactionByID() - txId = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +"2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2517 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:24.544 UTC [aclmgmt] CheckACL -> DEBU 2518 acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 2519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.545 UTC [policies] Evaluate -> DEBU 251b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:24.545 UTC [cauthdsl] func1 -> DEBU 251c 0xc000229d40 gate 1563590424545536000 evaluation starts" +"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251d 0xc000229d40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251e 0xc000229d40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.545 UTC [cauthdsl] func2 -> DEBU 251f 0xc000229d40 principal matched by identity 0" +"2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 58 7a 40 a8 1f a6 1a 91 47 ca 3e 0a 16 21 04 d4 |Xz@.....G.>..!..| +00000010 50 81 e6 1a c7 b8 02 31 bd ed ec fb 2e 9b 76 97 |P......1......v.|" +"2019-07-20 02:40:24.546 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 44 02 20 23 05 67 c0 e5 2d a1 66 f7 7d 78 1d |0D. #.g..-.f.}x.| +00000010 96 1d 47 4a e1 2d 67 6a 3c 16 a0 24 24 f8 b9 bd |..GJ.-gj<..$$...| +00000020 bf 64 ac 69 02 20 63 23 39 44 87 4f 15 ad 73 6f |.d.i. c#9D.O..so| +00000030 66 d9 e7 87 c4 71 b3 2d d0 53 14 19 5e 75 10 5d |f....q.-.S..^u.]| +00000040 63 c0 3c 1d 9d 1d |c.<...|" +"2019-07-20 02:40:24.546 UTC [cauthdsl] func2 -> DEBU 2522 0xc000229d40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.546 UTC [cauthdsl] func1 -> DEBU 2523 0xc000229d40 gate 1563590424545536000 evaluation succeeds" +"2019-07-20 02:40:24.546 UTC [policies] Evaluate -> DEBU 2524 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2526 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:24.547 UTC [policies] Evaluate -> DEBU 2527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:24.547 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2528 constructing new tx simulator" +"2019-07-20 02:40:24.548 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2529 constructing new tx simulator txid = [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +"2019-07-20 02:40:24.548 UTC [endorser] SimulateProposal -> DEBU 252a [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.548 UTC [stateleveldb] GetState -> DEBU 252b GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:24.549 UTC [ccprovider] GetChaincodeData -> DEBU 252c Getting chaincode data for from cache" +"2019-07-20 02:40:24.549 UTC [endorser] callChaincode -> INFO 252d [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.549 UTC [chaincode] Execute -> DEBU 252e Entry" +"2019-07-20 02:40:24.551 UTC [chaincode] handleMessage -> DEBU 252f [9ced4390] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:24.551 UTC [chaincode] HandleTransaction -> DEBU 2530 [9ced4390] handling GET_STATE from chaincode" +"2019-07-20 02:40:24.552 UTC [chaincode] HandleGetState -> DEBU 2531 [9ced4390] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:24.552 UTC [stateleveldb] GetState -> DEBU 2532 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:24.552 UTC [chaincode] HandleTransaction -> DEBU 2533 [9ced4390] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:24.554 UTC [gossip.comm] func1 -> DEBU 2534 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.555 UTC [gossip.gossip] handleMessage -> DEBU 2535 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.555 UTC [gossip.pull] HandleMessage -> DEBU 2536 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2537 Obtaining identity" +"2019-07-20 02:40:24.555 UTC [msp] DeserializeIdentity -> DEBU 2538 Obtaining identity" +"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 2539 Obtaining identity" +"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253a Obtaining identity" +"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253b Obtaining identity" +"2019-07-20 02:40:24.556 UTC [msp] DeserializeIdentity -> DEBU 253c Obtaining identity" +"2019-07-20 02:40:24.556 UTC [gossip.pull] SendDigest -> DEBU 253d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:24.556 UTC [gossip.gossip] handleMessage -> DEBU 253e Exiting" +"2019-07-20 02:40:24.557 UTC [chaincode] handleMessage -> DEBU 253f [9ced4390] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:24.557 UTC [chaincode] Notify -> DEBU 2540 [9ced4390] notifying Txid:9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, channelID:businesschannel" +"2019-07-20 02:40:24.558 UTC [chaincode] Execute -> DEBU 2541 Exit" +"2019-07-20 02:40:24.558 UTC [endorser] callChaincode -> INFO 2542 [businesschannel][9ced4390] Exit chaincode: name:"exp02" (8ms)" +"2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2543 Simulation completed, getting simulation results" +"2019-07-20 02:40:24.558 UTC [lockbasedtxmgr] Done -> DEBU 2544 Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +"2019-07-20 02:40:24.558 UTC [endorser] SimulateProposal -> DEBU 2545 [businesschannel][9ced4390] Exit" +"2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2546 [businesschannel][9ced4390] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.559 UTC [endorser] endorseProposal -> DEBU 2547 [businesschannel][9ced4390] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:24.559 UTC [endorser] EndorseWithPlugin -> DEBU 2548 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" +"2019-07-20 02:40:24.560 UTC [gossip.comm] func1 -> DEBU 2549 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.565 UTC [msp.identity] Sign -> DEBU 254a Sign: plaintext: 0A2097CB3F03F46412D05C11B69168FC...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:24.566 UTC [msp.identity] Sign -> DEBU 254c Sign: digest: A2BFD1B59AE6A062AA9F49715A99F6F5A4AC22E447B5BA55A700F061CA54F3E7 " +"2019-07-20 02:40:24.566 UTC [endorser] EndorseWithPlugin -> DEBU 254d Exiting {plugin: escc, channel: businesschannel, tx: 9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe, chaincode: exp02}" +"2019-07-20 02:40:24.566 UTC [endorser] endorseProposal -> DEBU 254e [businesschannel][9ced4390] Exit" +"2019-07-20 02:40:24.566 UTC [lockbasedtxmgr] Done -> DEBU 254f Done with transaction simulation / query execution [9ced43902d360762ee6aa92cfd734e9d8348d2c60d3206ace827ca26ddb75cfe]" +"2019-07-20 02:40:24.567 UTC [endorser] func1 -> DEBU 2550 Exit: request from 172.18.0.9:58356" +"2019-07-20 02:40:24.566 UTC [gossip.gossip] handleMessage -> DEBU 254b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.567 UTC [comm.grpc.server] 1 -> INFO 2551 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58356 grpc.code=OK grpc.call_duration=25.1225ms +"2019-07-20 02:40:24.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2553 Got message: GossipMessage: tag:EMPTY mem_req:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2554 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:24.568 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" +"2019-07-20 02:40:24.567 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" +"2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2556 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.569 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2557 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2558 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:24.573 UTC [grpc] infof -> DEBU 2559 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:24.572 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 255a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.573 UTC [policies] Evaluate -> DEBU 255c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.574 UTC [policies] Evaluate -> DEBU 255d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.574 UTC [cauthdsl] func1 -> DEBU 255e 0xc00027b190 gate 1563590424574399600 evaluation starts" +"2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 255f 0xc00027b190 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.574 UTC [cauthdsl] func2 -> DEBU 2560 0xc00027b190 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2561 0xc00027b190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.575 UTC [cauthdsl] func2 -> DEBU 2562 0xc00027b190 principal evaluation fails" +"2019-07-20 02:40:24.575 UTC [cauthdsl] func1 -> DEBU 2563 0xc00027b190 gate 1563590424574399600 evaluation fails" +"2019-07-20 02:40:24.575 UTC [policies] Evaluate -> DEBU 2564 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2565 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.576 UTC [policies] Evaluate -> DEBU 2566 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.576 UTC [cauthdsl] func1 -> DEBU 2567 0xc00027ba40 gate 1563590424576595400 evaluation starts" +"2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2568 0xc00027ba40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.576 UTC [cauthdsl] func2 -> DEBU 2569 0xc00027ba40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256a 0xc00027ba40 principal matched by identity 0" +"2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256b Verify: digest = 00000000 41 b0 db f9 9c d3 07 22 e0 f1 0f a6 45 df 28 d5 |A......"....E.(.| +00000010 17 04 4e 0f 92 f8 eb 0e 36 59 06 81 4e 27 04 4a |..N.....6Y..N'.J|" +"2019-07-20 02:40:24.577 UTC [msp.identity] Verify -> DEBU 256c Verify: sig = 00000000 30 44 02 20 14 8e 2e 3b 7a 79 e9 a8 e3 4d ad a8 |0D. ...;zy...M..| +00000010 da d9 de 22 30 55 a7 77 4a ac 5e 17 7d d4 33 76 |..."0U.wJ.^.}.3v| +00000020 eb 3e bc 24 02 20 48 de 27 64 5d 20 89 e3 ab c6 |.>.$. H.'d] ....| +00000030 85 6e 79 7e 3e 04 4f 44 a9 94 c8 36 46 63 d3 c4 |.ny~>.OD...6Fc..| +00000040 3e 9f 0e e2 b1 ab |>.....|" +"2019-07-20 02:40:24.577 UTC [cauthdsl] func2 -> DEBU 256d 0xc00027ba40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.578 UTC [cauthdsl] func1 -> DEBU 256e 0xc00027ba40 gate 1563590424576595400 evaluation succeeds" +"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 256f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2570 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2571 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.578 UTC [policies] Evaluate -> DEBU 2572 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.578 UTC [gossip.discovery] handleAliveMessage -> DEBU 2573 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2574 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2575 updating membership: timestamp: " +"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2576 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2577 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:24.579 UTC [gossip.discovery] learnExistingMembers -> DEBU 2578 Exiting" +"2019-07-20 02:40:24.579 UTC [gossip.discovery] handleAliveMessage -> DEBU 2579 Exiting" +"2019-07-20 02:40:24.579 UTC [gossip.discovery] handleMsgFromComm -> DEBU 257a Exiting" +"2019-07-20 02:40:24.580 UTC [gossip.discovery] sendMemResponse -> DEBU 257b Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257c Obtaining identity" +"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257d Obtaining identity" +"2019-07-20 02:40:24.580 UTC [msp] DeserializeIdentity -> DEBU 257e Obtaining identity" +"2019-07-20 02:40:24.581 UTC [gossip.comm] Send -> DEBU 257f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2580 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2581 Exiting" +"2019-07-20 02:40:24.581 UTC [gossip.discovery] sendMemResponse -> DEBU 2582 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020%" signature:"0E\002!\000\251]a+\365\254\306c\211N\373m\010\205\332RU\027\314\223\215/@Z1'o`(\201x(\002 4\005\005#\275\010p\271\306\024\336R\260\026\026\322!\310f\004\232^H\261k\371c\230Wb\205\333" > alive:\274$\002 H\336'd] \211\343\253\306\205ny~>\004OD\251\224\3106Fc\323\304>\237\016\342\261\253" > alive: alive:xg\002 *\243\346\221\036\274S\206\000>\016#\343v\\\215\035\310\236W\344\354\366A\306)\206\242\375\037\260K" > " +"2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" +"2019-07-20 02:40:24.717 UTC [msp] DeserializeIdentity -> DEBU 2584 Obtaining identity" +"2019-07-20 02:40:24.718 UTC [gossip.comm] Send -> DEBU 2585 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2587 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Exiting" +"2019-07-20 02:40:24.718 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" +"2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.719 UTC [gossip.comm] sendToEndpoint -> DEBU 258b Exiting" +"2019-07-20 02:40:24.720 UTC [gossip.comm] func1 -> DEBU 258c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.720 UTC [gossip.gossip] handleMessage -> DEBU 258d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.720 UTC [msp.identity] Verify -> DEBU 258e Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:24.721 UTC [msp.identity] Verify -> DEBU 258f Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:24.721 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" +"2019-07-20 02:40:24.722 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" +"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2592 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2593 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2594 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.722 UTC [policies] Evaluate -> DEBU 2595 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2596 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.723 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.723 UTC [cauthdsl] func1 -> DEBU 2598 0xc0002ecf80 gate 1563590424723322000 evaluation starts" +"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 2599 0xc0002ecf80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259b 0xc0002ecf80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.723 UTC [gossip.comm] func1 -> DEBU 259a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.723 UTC [cauthdsl] func2 -> DEBU 259c 0xc0002ecf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.726 UTC [cauthdsl] func2 -> DEBU 259d 0xc0002ecf80 principal evaluation fails" +"2019-07-20 02:40:24.726 UTC [cauthdsl] func1 -> DEBU 259e 0xc0002ecf80 gate 1563590424723322000 evaluation fails" +"2019-07-20 02:40:24.726 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" +"2019-07-20 02:40:24.726 UTC [policies] Evaluate -> DEBU 25a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" +"2019-07-20 02:40:24.727 UTC [gossip.comm] Send -> DEBU 25a3 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-07-20 02:40:24.727 UTC [gossip.comm] func1 -> DEBU 25a4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.727 UTC [msp] DeserializeIdentity -> DEBU 25a5 Obtaining identity" +"2019-07-20 02:40:24.727 UTC [policies] Evaluate -> DEBU 25a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.728 UTC [policies] Evaluate -> DEBU 25a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.729 UTC [cauthdsl] func1 -> DEBU 25a8 0xc0002eda70 gate 1563590424729010500 evaluation starts" +"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25aa 0xc0002eda70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ac 0xc0002eda70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.729 UTC [cauthdsl] func2 -> DEBU 25ad 0xc0002eda70 principal matched by identity 0" +"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.729 UTC [msp.identity] Verify -> DEBU 25af Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:24.730 UTC [msp.identity] Verify -> DEBU 25b1 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.730 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" +"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25b0 Exiting" +"2019-07-20 02:40:24.730 UTC [cauthdsl] func2 -> DEBU 25b3 0xc0002eda70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.730 UTC [cauthdsl] func1 -> DEBU 25b5 0xc0002eda70 gate 1563590424729010500 evaluation succeeds" +"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.728 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +"2019-07-20 02:40:24.731 UTC [policies] Evaluate -> DEBU 25b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.732 UTC [msp] DeserializeIdentity -> DEBU 25ba Obtaining identity" +"2019-07-20 02:40:24.735 UTC [msp] DeserializeIdentity -> DEBU 25bb Obtaining identity" +"2019-07-20 02:40:24.729 UTC [gossip.comm] sendToEndpoint -> DEBU 25ab Exiting" +"2019-07-20 02:40:24.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25bd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25be Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.737 UTC [policies] Evaluate -> DEBU 25bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.738 UTC [policies] Evaluate -> DEBU 25c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.738 UTC [cauthdsl] func1 -> DEBU 25c2 0xc0003dcea0 gate 1563590424738584700 evaluation starts" +"2019-07-20 02:40:24.738 UTC [cauthdsl] func2 -> DEBU 25c3 0xc0003dcea0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c4 0xc0003dcea0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c5 0xc0003dcea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.739 UTC [cauthdsl] func2 -> DEBU 25c6 0xc0003dcea0 principal evaluation fails" +"2019-07-20 02:40:24.739 UTC [cauthdsl] func1 -> DEBU 25c7 0xc0003dcea0 gate 1563590424738584700 evaluation fails" +"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.740 UTC [policies] Evaluate -> DEBU 25ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.740 UTC [cauthdsl] func1 -> DEBU 25cb 0xc0003dd810 gate 1563590424740711600 evaluation starts" +"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cc 0xc0003dd810 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25cd 0xc0003dd810 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.741 UTC [cauthdsl] func2 -> DEBU 25ce 0xc0003dd810 principal matched by identity 0" +"2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25cf Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:24.742 UTC [msp.identity] Verify -> DEBU 25d0 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:24.742 UTC [cauthdsl] func2 -> DEBU 25d1 0xc0003dd810 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.743 UTC [cauthdsl] func1 -> DEBU 25d3 0xc0003dd810 gate 1563590424740711600 evaluation succeeds" +"2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.743 UTC [policies] Evaluate -> DEBU 25d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.743 UTC [gossip.comm] func1 -> DEBU 25d2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.745 UTC [policies] Evaluate -> DEBU 25d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.746 UTC [msp.identity] Verify -> DEBU 25d8 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:24.747 UTC [msp.identity] Verify -> DEBU 25d9 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25da Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25db Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.749 UTC [policies] Evaluate -> DEBU 25de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.750 UTC [cauthdsl] func1 -> DEBU 25df 0xc000716cd0 gate 1563590424750527300 evaluation starts" +"2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e0 0xc000716cd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.751 UTC [cauthdsl] func2 -> DEBU 25e1 0xc000716cd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.753 UTC [cauthdsl] func2 -> DEBU 25e2 0xc000716cd0 principal matched by identity 0" +"2019-07-20 02:40:24.754 UTC [msp.identity] Verify -> DEBU 25e3 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" +"2019-07-20 02:40:24.755 UTC [msp] DeserializeIdentity -> DEBU 25e5 Obtaining identity" +"2019-07-20 02:40:24.755 UTC [gossip.pull] Hello -> DEBU 25e7 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e8 Obtaining identity" +"2019-07-20 02:40:24.755 UTC [msp.identity] Verify -> DEBU 25e6 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:24.756 UTC [msp] DeserializeIdentity -> DEBU 25e9 Obtaining identity" +"2019-07-20 02:40:24.760 UTC [gossip.comm] Send -> DEBU 25eb Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:24.761 UTC [gossip.comm] sendToEndpoint -> DEBU 25ec Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.757 UTC [cauthdsl] func2 -> DEBU 25ea 0xc000716cd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.762 UTC [cauthdsl] func1 -> DEBU 25ed 0xc000716cd0 gate 1563590424750527300 evaluation succeeds" +"2019-07-20 02:40:24.762 UTC [policies] Evaluate -> DEBU 25ef Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.763 UTC [policies] Evaluate -> DEBU 25f1 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.764 UTC [policies] Evaluate -> DEBU 25f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.764 UTC [gossip.comm] func1 -> DEBU 25f3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.762 UTC [gossip.comm] sendToEndpoint -> DEBU 25ee Exiting" +"2019-07-20 02:40:24.764 UTC [gossip.gossip] handleMessage -> DEBU 25f4 Exiting" +"2019-07-20 02:40:24.766 UTC [gossip.gossip] handleMessage -> DEBU 25f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.766 UTC [msp] DeserializeIdentity -> DEBU 25f6 Obtaining identity" +"2019-07-20 02:40:24.767 UTC [msp.identity] Verify -> DEBU 25f7 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f8 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:24.768 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fb Obtaining identity" +"2019-07-20 02:40:24.769 UTC [msp] DeserializeIdentity -> DEBU 25fc Obtaining identity" +"2019-07-20 02:40:24.769 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25fd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25fe Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ff Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2601 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.770 UTC [policies] Evaluate -> DEBU 2602 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.770 UTC [cauthdsl] func1 -> DEBU 2603 0xc002963630 gate 1563590424770746900 evaluation starts" +"2019-07-20 02:40:24.770 UTC [cauthdsl] func2 -> DEBU 2604 0xc002963630 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2605 0xc002963630 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2606 0xc002963630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.771 UTC [cauthdsl] func2 -> DEBU 2607 0xc002963630 principal evaluation fails" +"2019-07-20 02:40:24.771 UTC [cauthdsl] func1 -> DEBU 2608 0xc002963630 gate 1563590424770746900 evaluation fails" +"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 2609 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.771 UTC [policies] Evaluate -> DEBU 260b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.772 UTC [cauthdsl] func1 -> DEBU 260c 0xc002963e70 gate 1563590424772207200 evaluation starts" +"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260d 0xc002963e70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260e 0xc002963e70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.772 UTC [cauthdsl] func2 -> DEBU 260f 0xc002963e70 principal matched by identity 0" +"2019-07-20 02:40:24.773 UTC [msp.identity] Verify -> DEBU 2610 Verify: digest = 00000000 49 fd 56 5f f1 ca d4 20 83 e3 c3 b4 4b 68 94 70 |I.V_... ....Kh.p| +00000010 30 0c b1 6d 33 04 1f 6d 2f 95 f1 7d 37 bc d1 db |0..m3..m/..}7...|" +"2019-07-20 02:40:24.774 UTC [msp.identity] Verify -> DEBU 2611 Verify: sig = 00000000 30 45 02 21 00 e5 e6 42 aa af 59 c2 56 8a 0e 0d |0E.!...B..Y.V...| +00000010 11 da 76 95 a8 93 1c 3c 30 9e 62 a0 16 e6 4f f1 |..v....<0.b...O.| +00000020 51 f7 4c 39 34 02 20 47 7c 07 bb a6 e4 4f 18 ea |Q.L94. G|....O..| +00000030 64 d6 a0 ad 0e 21 3b f3 ea af 95 41 d7 5d b2 95 |d....!;....A.]..| +00000040 98 47 39 77 d8 8a 59 |.G9w..Y|" +"2019-07-20 02:40:24.774 UTC [cauthdsl] func2 -> DEBU 2612 0xc002963e70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.774 UTC [cauthdsl] func1 -> DEBU 2613 0xc002963e70 gate 1563590424772207200 evaluation succeeds" +"2019-07-20 02:40:24.774 UTC [policies] Evaluate -> DEBU 2614 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2615 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2616 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.775 UTC [policies] Evaluate -> DEBU 2617 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.775 UTC [endorser] ProcessProposal -> DEBU 2618 Entering: request from 172.18.0.9:58360" +"2019-07-20 02:40:24.775 UTC [msp] DeserializeIdentity -> DEBU 2619 Obtaining identity" +"2019-07-20 02:40:24.775 UTC [protoutils] ValidateProposalMessage -> DEBU 261a ValidateProposalMessage starts for signed proposal 0xc002f51540" +"2019-07-20 02:40:24.776 UTC [protoutils] validateChannelHeader -> DEBU 261b validateChannelHeader info: header type 3" +"2019-07-20 02:40:24.776 UTC [protoutils] checkSignatureFromCreator -> DEBU 261d begin" +"2019-07-20 02:40:24.777 UTC [msp] GetManagerForChain -> DEBU 261e Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 261f creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:24.777 UTC [protoutils] checkSignatureFromCreator -> DEBU 2620 creator is valid" +"2019-07-20 02:40:24.776 UTC [msp] DeserializeIdentity -> DEBU 261c Obtaining identity" +"2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2621 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| +00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" +"2019-07-20 02:40:24.778 UTC [msp.identity] Verify -> DEBU 2623 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| +00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| +00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| +00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| +00000040 5f 7c d9 ad 57 d3 |_|..W.|" +"2019-07-20 02:40:24.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2622 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.779 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 exits successfully" +"2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2626 validateChaincodeProposalMessage starts for proposal 0xc0001485b0, header 0xc002f51950" +"2019-07-20 02:40:24.779 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2627 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:24.779 UTC [endorser] preProcess -> DEBU 2628 [businesschannel][3cf6d7e2] processing txid: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732" +"2019-07-20 02:40:24.779 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2629 retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +"2019-07-20 02:40:24.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2625 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 262b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.780 UTC [aclmgmt] CheckACL -> DEBU 262a acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:24.781 UTC [aclmgmt] CheckACL -> DEBU 262e acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.781 UTC [policies] Evaluate -> DEBU 2632 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:24.781 UTC [cauthdsl] func1 -> DEBU 2633 0xc003a0e750 gate 1563590424781804600 evaluation starts" +"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2634 0xc003a0e750 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2635 0xc003a0e750 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.780 UTC [policies] Evaluate -> DEBU 262f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.782 UTC [cauthdsl] func2 -> DEBU 2636 0xc003a0e750 principal matched by identity 0" +"2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2638 Verify: digest = 00000000 d0 3a 89 45 63 c1 72 e5 82 71 9e 16 5d 2a b0 8d |.:.Ec.r..q..]*..| +00000010 eb c5 71 9d 97 9b 2e 42 4a f7 05 59 cf 16 72 a2 |..q....BJ..Y..r.|" +"2019-07-20 02:40:24.782 UTC [cauthdsl] func1 -> DEBU 2637 0xc003a0eb00 gate 1563590424782522000 evaluation starts" +"2019-07-20 02:40:24.782 UTC [msp.identity] Verify -> DEBU 2639 Verify: sig = 00000000 30 44 02 20 37 55 b9 46 75 03 f1 7b 01 67 84 ea |0D. 7U.Fu..{.g..| +00000010 1d 2b f7 2b 7d d1 d8 66 ec c7 8d 54 a9 d9 9b ba |.+.+}..f...T....| +00000020 8e b9 d5 68 02 20 2f 08 1b 38 43 79 8c 34 46 93 |...h. /..8Cy.4F.| +00000030 e4 36 35 b2 49 53 b2 b1 6f 67 16 75 6e 31 a7 24 |.65.IS..og.un1.$| +00000040 5f 7c d9 ad 57 d3 |_|..W.|" +"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263a 0xc003a0eb00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263c 0xc003a0eb00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263b 0xc003a0e750 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.783 UTC [cauthdsl] func1 -> DEBU 263d 0xc003a0e750 gate 1563590424781804600 evaluation succeeds" +"2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 263e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.783 UTC [policies] Evaluate -> DEBU 2640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:24.783 UTC [cauthdsl] func2 -> DEBU 263f 0xc003a0eb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2641 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:24.784 UTC [cauthdsl] func2 -> DEBU 2642 0xc003a0eb00 principal evaluation fails" +"2019-07-20 02:40:24.784 UTC [cauthdsl] func1 -> DEBU 2644 0xc003a0eb00 gate 1563590424782522000 evaluation fails" +"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2645 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.784 UTC [policies] Evaluate -> DEBU 2643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2646 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.785 UTC [policies] Evaluate -> DEBU 2647 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2648 constructing new tx simulator" +"2019-07-20 02:40:24.785 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2649 constructing new tx simulator txid = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +"2019-07-20 02:40:24.785 UTC [endorser] SimulateProposal -> DEBU 264b [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.785 UTC [stateleveldb] GetState -> DEBU 264c GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:24.785 UTC [ccprovider] GetChaincodeData -> DEBU 264d Getting chaincode data for from cache" +"2019-07-20 02:40:24.786 UTC [endorser] callChaincode -> INFO 264e [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.786 UTC [chaincode] Execute -> DEBU 264f Entry" +"2019-07-20 02:40:24.785 UTC [cauthdsl] func1 -> DEBU 264a 0xc00055f7a0 gate 1563590424785318600 evaluation starts" +"2019-07-20 02:40:24.787 UTC [chaincode] handleMessage -> DEBU 2651 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2650 0xc00055f7a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2652 0xc00055f7a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.787 UTC [cauthdsl] func2 -> DEBU 2653 0xc00055f7a0 principal matched by identity 0" +"2019-07-20 02:40:24.787 UTC [chaincode] HandleTransaction -> DEBU 2654 [3cf6d7e2] handling GET_STATE from chaincode" +"2019-07-20 02:40:24.788 UTC [chaincode] HandleGetState -> DEBU 2656 [3cf6d7e2] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:24.788 UTC [stateleveldb] GetState -> DEBU 2657 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:24.788 UTC [chaincode] HandleTransaction -> DEBU 2658 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2655 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:24.788 UTC [msp.identity] Verify -> DEBU 2659 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:24.789 UTC [cauthdsl] func2 -> DEBU 265a 0xc00055f7a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.789 UTC [cauthdsl] func1 -> DEBU 265b 0xc00055f7a0 gate 1563590424785318600 evaluation succeeds" +"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.789 UTC [policies] Evaluate -> DEBU 265f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.790 UTC [msp] DeserializeIdentity -> DEBU 2661 Obtaining identity" +"2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2662 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.790 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2663 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2665 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.790 UTC [policies] Evaluate -> DEBU 2666 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.790 UTC [cauthdsl] func1 -> DEBU 2667 0xc003b4cc60 gate 1563590424790742400 evaluation starts" +"2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2668 0xc003b4cc60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.790 UTC [cauthdsl] func2 -> DEBU 2669 0xc003b4cc60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266a 0xc003b4cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.791 UTC [cauthdsl] func2 -> DEBU 266b 0xc003b4cc60 principal evaluation fails" +"2019-07-20 02:40:24.791 UTC [cauthdsl] func1 -> DEBU 266c 0xc003b4cc60 gate 1563590424790742400 evaluation fails" +"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.789 UTC [chaincode] handleMessage -> DEBU 2660 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.791 UTC [policies] Evaluate -> DEBU 266f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.792 UTC [cauthdsl] func1 -> DEBU 2671 0xc003b4d510 gate 1563590424792004600 evaluation starts" +"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2672 0xc003b4d510 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2673 0xc003b4d510 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.792 UTC [cauthdsl] func2 -> DEBU 2674 0xc003b4d510 principal matched by identity 0" +"2019-07-20 02:40:24.792 UTC [msp.identity] Verify -> DEBU 2675 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:24.791 UTC [chaincode] HandleTransaction -> DEBU 2670 [3cf6d7e2] handling GET_STATE from chaincode" +"2019-07-20 02:40:24.793 UTC [chaincode] HandleGetState -> DEBU 2676 [3cf6d7e2] getting state for chaincode exp02, key b, channel businesschannel" +"2019-07-20 02:40:24.794 UTC [stateleveldb] GetState -> DEBU 2677 GetState(). ns=exp02, key=b" +"2019-07-20 02:40:24.794 UTC [chaincode] HandleTransaction -> DEBU 2678 [3cf6d7e2] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:24.793 UTC [msp.identity] Verify -> DEBU 2679 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:24.795 UTC [cauthdsl] func2 -> DEBU 267a 0xc003b4d510 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.795 UTC [cauthdsl] func1 -> DEBU 267b 0xc003b4d510 gate 1563590424792004600 evaluation succeeds" +"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.795 UTC [policies] Evaluate -> DEBU 267e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.796 UTC [policies] Evaluate -> DEBU 267f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2680 Exiting" +"2019-07-20 02:40:24.796 UTC [gossip.gossip] handleMessage -> DEBU 2681 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 740 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.796 UTC [msp] DeserializeIdentity -> DEBU 2682 Obtaining identity" +"2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2683 Verify: digest = 00000000 61 20 cb 6f 8f aa 03 3d de 98 25 8e 32 73 15 92 |a .o...=..%.2s..| +00000010 4b f1 bb cf 6d b3 55 d5 b4 ae 64 bd a2 14 c7 26 |K...m.U...d....&|" +"2019-07-20 02:40:24.797 UTC [msp.identity] Verify -> DEBU 2684 Verify: sig = 00000000 30 44 02 20 6a ad 18 eb b9 8a 5d 5d a4 0b 2f 9a |0D. j.....]]../.| +00000010 bd 69 b8 5a e6 55 d1 1a ce da 8b 06 21 d1 77 09 |.i.Z.U......!.w.| +00000020 35 6b 7d 0a 02 20 41 31 52 a6 c6 f5 f9 f6 14 64 |5k}.. A1R......d| +00000030 be e1 07 91 e4 ab 63 39 1e c0 18 b8 25 85 43 6b |......c9....%.Ck| +00000040 d2 41 7c 47 6f 15 |.A|Go.|" +"2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2685 Obtaining identity" +"2019-07-20 02:40:24.797 UTC [msp] DeserializeIdentity -> DEBU 2686 Obtaining identity" +"2019-07-20 02:40:24.798 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2687 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2689 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.799 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 268a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.799 UTC [policies] Evaluate -> DEBU 268d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.799 UTC [cauthdsl] func1 -> DEBU 268e 0xc0036e5740 gate 1563590424799839700 evaluation starts" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 268f 0xc0036e5740 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2690 0xc0036e5740 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2691 0xc0036e5740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func2 -> DEBU 2692 0xc0036e5740 principal evaluation fails" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2693 0xc0036e5740 gate 1563590424799839700 evaluation fails" +"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2694 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.800 UTC [policies] Evaluate -> DEBU 2696 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.800 UTC [cauthdsl] func1 -> DEBU 2697 0xc0036e5f80 gate 1563590424800963900 evaluation starts" +"2019-07-20 02:40:24.798 UTC [chaincode] handleMessage -> DEBU 2688 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 2698 0xc0036e5f80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 2699 [3cf6d7e2] handling PUT_STATE from chaincode" +"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269a 0xc0036e5f80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.801 UTC [chaincode] HandleTransaction -> DEBU 269b [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:24.801 UTC [cauthdsl] func2 -> DEBU 269c 0xc0036e5f80 principal matched by identity 0" +"2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 269e Verify: digest = 00000000 bd d3 92 5c 4e 4e d8 ba 06 03 0e 34 bd 0c 60 64 |...\NN.....4..`d| +00000010 c3 85 4c 2f 7e 52 09 c8 98 67 50 07 bf 11 6e 62 |..L/~R...gP...nb|" +"2019-07-20 02:40:24.802 UTC [chaincode] handleMessage -> DEBU 269d [3cf6d7e2] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 269f [3cf6d7e2] handling PUT_STATE from chaincode" +"2019-07-20 02:40:24.802 UTC [msp.identity] Verify -> DEBU 26a0 Verify: sig = 00000000 30 45 02 21 00 cf df 0b 6d b5 7e f7 4b 11 44 76 |0E.!....m.~.K.Dv| +00000010 6e a1 b8 da 85 2b d7 5a a9 cb 2c 73 91 41 c8 ab |n....+.Z..,s.A..| +00000020 85 99 a7 e3 29 02 20 20 4a b5 11 b2 72 9f aa 8d |....). J...r...| +00000030 eb 75 f7 8d 4a 83 24 16 97 9f 03 6c f2 a4 c9 c9 |.u..J.$....l....| +00000040 ed cc 1b b6 9e 4e 52 |.....NR|" +"2019-07-20 02:40:24.803 UTC [chaincode] HandleTransaction -> DEBU 26a1 [3cf6d7e2] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:24.804 UTC [chaincode] handleMessage -> DEBU 26a3 [3cf6d7e2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:24.804 UTC [chaincode] Notify -> DEBU 26a4 [3cf6d7e2] notifying Txid:3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, channelID:businesschannel" +"2019-07-20 02:40:24.804 UTC [chaincode] Execute -> DEBU 26a5 Exit" +"2019-07-20 02:40:24.804 UTC [endorser] callChaincode -> INFO 26a6 [businesschannel][3cf6d7e2] Exit chaincode: name:"exp02" (18ms)" +"2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 26a7 Simulation completed, getting simulation results" +"2019-07-20 02:40:24.804 UTC [lockbasedtxmgr] Done -> DEBU 26a8 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +"2019-07-20 02:40:24.804 UTC [endorser] SimulateProposal -> DEBU 26a9 [businesschannel][3cf6d7e2] Exit" +"2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26aa [businesschannel][3cf6d7e2] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:24.804 UTC [endorser] endorseProposal -> DEBU 26ab [businesschannel][3cf6d7e2] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:24.804 UTC [endorser] EndorseWithPlugin -> DEBU 26ac Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" +"2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ad Sign: plaintext: 0A20D3E5EF20BE3985D0A70F10BC9838...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:24.804 UTC [msp.identity] Sign -> DEBU 26ae Sign: digest: 4C3F23D107F594129EEAAB4C73111C5D8F880DCB0AF0F51BEE8DA03F26D71281 " +"2019-07-20 02:40:24.805 UTC [endorser] EndorseWithPlugin -> DEBU 26af Exiting {plugin: escc, channel: businesschannel, tx: 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, chaincode: exp02}" +"2019-07-20 02:40:24.805 UTC [endorser] endorseProposal -> DEBU 26b0 [businesschannel][3cf6d7e2] Exit" +"2019-07-20 02:40:24.805 UTC [lockbasedtxmgr] Done -> DEBU 26b1 Done with transaction simulation / query execution [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +"2019-07-20 02:40:24.806 UTC [endorser] func1 -> DEBU 26b2 Exit: request from 172.18.0.9:58360" +"2019-07-20 02:40:24.806 UTC [comm.grpc.server] 1 -> INFO 26b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58360 grpc.code=OK grpc.call_duration=30.9885ms +"2019-07-20 02:40:24.803 UTC [cauthdsl] func2 -> DEBU 26a2 0xc0036e5f80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.807 UTC [cauthdsl] func1 -> DEBU 26b4 0xc0036e5f80 gate 1563590424800963900 evaluation succeeds" +"2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.807 UTC [policies] Evaluate -> DEBU 26b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b7 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.808 UTC [policies] Evaluate -> DEBU 26b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26b9 Verify: digest = 00000000 47 88 04 ef 29 c3 0a 98 61 13 15 03 eb 49 9b 54 |G...)...a....I.T| +00000010 dc cf 1a f6 ec 1b 2d 4b 90 45 59 e2 06 af 09 30 |......-K.EY....0|" +"2019-07-20 02:40:24.820 UTC [msp.identity] Verify -> DEBU 26ba Verify: sig = 00000000 30 45 02 21 00 e1 23 45 6c 7e a2 b8 ca cd 1f 8b |0E.!..#El~......| +00000010 bd da 06 71 a2 77 54 9e ba 5b a2 c2 c1 95 bc 26 |...q.wT..[.....&| +00000020 93 14 94 6c 95 02 20 50 63 fd f4 cd 6f f7 41 af |...l.. Pc...o.A.| +00000030 65 01 b5 2a 76 65 de dc 4f 5f 1f 65 ff 8b c8 93 |e..*ve..O_.e....| +00000040 3d a4 49 5d c4 5d bb |=.I].].|" +"2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bb Obtaining identity" +"2019-07-20 02:40:24.822 UTC [msp] DeserializeIdentity -> DEBU 26bc Obtaining identity" +"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26be Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26bf Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.823 UTC [policies] Evaluate -> DEBU 26c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.823 UTC [cauthdsl] func1 -> DEBU 26c3 0xc0036e1f60 gate 1563590424823548200 evaluation starts" +"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c4 0xc0036e1f60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c5 0xc0036e1f60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c6 0xc0036e1f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.823 UTC [cauthdsl] func2 -> DEBU 26c7 0xc0036e1f60 principal evaluation fails" +"2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26c8 0xc0036e1f60 gate 1563590424823548200 evaluation fails" +"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.824 UTC [policies] Evaluate -> DEBU 26cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.824 UTC [cauthdsl] func1 -> DEBU 26cc 0xc0038e07a0 gate 1563590424824490800 evaluation starts" +"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cd 0xc0038e07a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26ce 0xc0038e07a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.824 UTC [cauthdsl] func2 -> DEBU 26cf 0xc0038e07a0 principal matched by identity 0" +"2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d0 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +"2019-07-20 02:40:24.825 UTC [msp.identity] Verify -> DEBU 26d1 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +"2019-07-20 02:40:24.826 UTC [cauthdsl] func2 -> DEBU 26d2 0xc0038e07a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.826 UTC [cauthdsl] func1 -> DEBU 26d3 0xc0038e07a0 gate 1563590424824490800 evaluation succeeds" +"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.826 UTC [policies] Evaluate -> DEBU 26d6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.827 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +"2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26da Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:24.827 UTC [policies] Evaluate -> DEBU 26dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:24.827 UTC [cauthdsl] func1 -> DEBU 26de 0xc0038e1880 gate 1563590424827881200 evaluation starts" +"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26df 0xc0038e1880 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e0 0xc0038e1880 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e1 0xc0038e1880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:24.828 UTC [cauthdsl] func2 -> DEBU 26e2 0xc0038e1880 principal evaluation fails" +"2019-07-20 02:40:24.828 UTC [cauthdsl] func1 -> DEBU 26e3 0xc0038e1880 gate 1563590424827881200 evaluation fails" +"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:24.828 UTC [policies] Evaluate -> DEBU 26e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:24.829 UTC [cauthdsl] func1 -> DEBU 26e7 0xc00393e0c0 gate 1563590424828998600 evaluation starts" +"2019-07-20 02:40:24.830 UTC [cauthdsl] func2 -> DEBU 26e8 0xc00393e0c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26e9 0xc00393e0c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:24.831 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00393e0c0 principal matched by identity 0" +"2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:24.833 UTC [grpc] infof -> DEBU 26ec transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:24.833 UTC [msp.identity] Verify -> DEBU 26ed Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +"2019-07-20 02:40:24.834 UTC [msp.identity] Verify -> DEBU 26ee Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +"2019-07-20 02:40:24.835 UTC [cauthdsl] func2 -> DEBU 26ef 0xc00393e0c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:24.835 UTC [cauthdsl] func1 -> DEBU 26f0 0xc00393e0c0 gate 1563590424828998600 evaluation succeeds" +"2019-07-20 02:40:24.835 UTC [policies] Evaluate -> DEBU 26f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:24.836 UTC [policies] Evaluate -> DEBU 26f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:24.836 UTC [gossip.gossip] handleMessage -> DEBU 26f5 Exiting" +"2019-07-20 02:40:24.837 UTC [gossip.gossip] handleMessage -> DEBU 26f6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:24.838 UTC [msp.identity] Verify -> DEBU 26f7 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +"2019-07-20 02:40:24.839 UTC [msp.identity] Verify -> DEBU 26f8 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +"2019-07-20 02:40:24.839 UTC [msp] DeserializeIdentity -> DEBU 26f9 Obtaining identity" +"2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fa Exiting" +"2019-07-20 02:40:24.839 UTC [gossip.gossip] handleMessage -> DEBU 26fb Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.840 UTC [gossip.pull] HandleMessage -> DEBU 26fc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.840 UTC [gossip.gossip] handleMessage -> DEBU 26fd Exiting" +"2019-07-20 02:40:24.878 UTC [gossip.comm] func1 -> DEBU 26fe Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.878 UTC [gossip.gossip] handleMessage -> DEBU 26ff Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2700 Obtaining identity" +"2019-07-20 02:40:24.880 UTC [msp] DeserializeIdentity -> DEBU 2701 Obtaining identity" +"2019-07-20 02:40:24.881 UTC [gossip.gossip] handleMessage -> DEBU 2702 Exiting" +"2019-07-20 02:40:24.886 UTC [gossip.comm] func1 -> DEBU 2703 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.886 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2705 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:24.887 UTC [msp.identity] Verify -> DEBU 2706 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:24.887 UTC [gossip.gossip] handleMessage -> DEBU 2707 Exiting" +"2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2708 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.893 UTC [gossip.gossip] handleMessage -> DEBU 270a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:24.894 UTC [msp.identity] Verify -> DEBU 270c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:24.893 UTC [gossip.comm] func1 -> DEBU 2709 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.894 UTC [msp] DeserializeIdentity -> DEBU 270d Obtaining identity" +"2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270e Exiting" +"2019-07-20 02:40:24.895 UTC [gossip.gossip] handleMessage -> DEBU 270f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2710 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:24.895 UTC [msp.identity] Verify -> DEBU 2711 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:24.896 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" +"2019-07-20 02:40:24.896 UTC [gossip.gossip] handleMessage -> DEBU 2713 Exiting" +"2019-07-20 02:40:24.902 UTC [gossip.comm] func1 -> DEBU 2714 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.903 UTC [gossip.gossip] handleMessage -> DEBU 2715 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.903 UTC [gossip.pull] HandleMessage -> DEBU 2716 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:24.903 UTC [gossip.pull] SendDigest -> DEBU 2717 Sending BLOCK_MSG digest: [3 1 2] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:24.904 UTC [gossip.gossip] handleMessage -> DEBU 2718 Exiting" +"2019-07-20 02:40:25.024 UTC [endorser] ProcessProposal -> DEBU 2719 Entering: request from 172.18.0.9:58366" +"2019-07-20 02:40:25.025 UTC [protoutils] ValidateProposalMessage -> DEBU 271a ValidateProposalMessage starts for signed proposal 0xc0029a5d10" +"2019-07-20 02:40:25.025 UTC [protoutils] validateChannelHeader -> DEBU 271b validateChannelHeader info: header type 3" +"2019-07-20 02:40:25.026 UTC [protoutils] checkSignatureFromCreator -> DEBU 271c begin" +"2019-07-20 02:40:25.026 UTC [msp] GetManagerForChain -> DEBU 271d Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:25.026 UTC [msp] DeserializeIdentity -> DEBU 271e Obtaining identity" +"2019-07-20 02:40:25.027 UTC [msp.identity] newIdentity -> DEBU 271f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:25.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2720 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-07-20 02:40:25.028 UTC [msp] Validate -> DEBU 2721 MSP Org2MSP validating identity" +"2019-07-20 02:40:25.029 UTC [msp] getCertificationChain -> DEBU 2722 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:25.029 UTC [protoutils] checkSignatureFromCreator -> DEBU 2723 creator is valid" +"2019-07-20 02:40:25.029 UTC [msp.identity] Verify -> DEBU 2724 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| +00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" +"2019-07-20 02:40:25.030 UTC [msp.identity] Verify -> DEBU 2725 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| +00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| +00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| +00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| +00000040 62 a9 01 cd 92 74 |b....t|" +"2019-07-20 02:40:25.030 UTC [protoutils] checkSignatureFromCreator -> DEBU 2726 exits successfully" +"2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2727 validateChaincodeProposalMessage starts for proposal 0xc000122f50, header 0xc00080e140" +"2019-07-20 02:40:25.030 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2728 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:25.031 UTC [endorser] preProcess -> DEBU 2729 [businesschannel][fe4517b7] processing txid: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a" +"2019-07-20 02:40:25.031 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 272a retrieveTransactionByID() - txId = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +"2019-07-20 02:40:25.031 UTC [aclmgmt] CheckACL -> DEBU 272b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:25.032 UTC [aclmgmt] CheckACL -> DEBU 272c acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:25.032 UTC [policies] Evaluate -> DEBU 272f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:25.033 UTC [cauthdsl] func1 -> DEBU 2730 0xc003e0d260 gate 1563590425033105300 evaluation starts" +"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2731 0xc003e0d260 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2732 0xc003e0d260 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.033 UTC [cauthdsl] func2 -> DEBU 2733 0xc003e0d260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:25.034 UTC [cauthdsl] func2 -> DEBU 2734 0xc003e0d260 principal evaluation fails" +"2019-07-20 02:40:25.034 UTC [cauthdsl] func1 -> DEBU 2735 0xc003e0d260 gate 1563590425033105300 evaluation fails" +"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2736 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2737 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:25.034 UTC [policies] Evaluate -> DEBU 2738 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:40:25.035 UTC [cauthdsl] func1 -> DEBU 2739 0xc003e0dac0 gate 1563590425034719300 evaluation starts" +"2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273a 0xc003e0dac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.035 UTC [cauthdsl] func2 -> DEBU 273b 0xc003e0dac0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.035 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 273c Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:40:25.035 UTC [msp] Validate -> DEBU 273d MSP Org2MSP validating identity" +"2019-07-20 02:40:25.035 UTC [msp] getCertificationChain -> DEBU 273e MSP Org2MSP getting certification chain" +"2019-07-20 02:40:25.036 UTC [cauthdsl] func2 -> DEBU 273f 0xc003e0dac0 principal matched by identity 0" +"2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2740 Verify: digest = 00000000 1a 72 dc bd 22 9d ce 42 23 dc 31 1e cb ab c5 44 |.r.."..B#.1....D| +00000010 32 91 e1 c3 ca 33 1a 63 3d e3 8d 58 28 7d b5 12 |2....3.c=..X(}..|" +"2019-07-20 02:40:25.036 UTC [msp.identity] Verify -> DEBU 2741 Verify: sig = 00000000 30 44 02 20 66 25 b5 25 13 52 60 f0 15 e4 d2 17 |0D. f%.%.R`.....| +00000010 df a6 46 b6 09 c6 0a d5 db c7 c3 3b 8a 81 e0 f4 |..F........;....| +00000020 f4 71 03 49 02 20 5d 06 96 80 7b 06 1c 2e fa 98 |.q.I. ]...{.....| +00000030 9a 11 ca b9 10 35 3b 52 ac 86 12 9a 90 11 fa a7 |.....5;R........| +00000040 62 a9 01 cd 92 74 |b....t|" +"2019-07-20 02:40:25.037 UTC [cauthdsl] func2 -> DEBU 2742 0xc003e0dac0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:25.037 UTC [cauthdsl] func1 -> DEBU 2743 0xc003e0dac0 gate 1563590425034719300 evaluation succeeds" +"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2744 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2745 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2746 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:25.037 UTC [policies] Evaluate -> DEBU 2747 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:25.037 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2748 constructing new tx simulator" +"2019-07-20 02:40:25.038 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2749 constructing new tx simulator txid = [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +"2019-07-20 02:40:25.038 UTC [endorser] SimulateProposal -> DEBU 274a [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:25.038 UTC [stateleveldb] GetState -> DEBU 274b GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:25.038 UTC [ccprovider] GetChaincodeData -> DEBU 274c Getting chaincode data for from cache" +"2019-07-20 02:40:25.038 UTC [endorser] callChaincode -> INFO 274d [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:25.039 UTC [chaincode] Execute -> DEBU 274e Entry" +"2019-07-20 02:40:25.040 UTC [chaincode] handleMessage -> DEBU 274f [fe4517b7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2750 [fe4517b7] handling GET_STATE from chaincode" +"2019-07-20 02:40:25.040 UTC [chaincode] HandleGetState -> DEBU 2751 [fe4517b7] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:25.040 UTC [stateleveldb] GetState -> DEBU 2752 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:25.040 UTC [chaincode] HandleTransaction -> DEBU 2753 [fe4517b7] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:25.041 UTC [chaincode] handleMessage -> DEBU 2754 [fe4517b7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:25.042 UTC [chaincode] Notify -> DEBU 2755 [fe4517b7] notifying Txid:fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, channelID:businesschannel" +"2019-07-20 02:40:25.045 UTC [gossip.comm] func1 -> DEBU 2756 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:25.046 UTC [gossip.gossip] handleMessage -> DEBU 2757 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2758 Obtaining identity" +"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 2759 Obtaining identity" +"2019-07-20 02:40:25.046 UTC [msp] DeserializeIdentity -> DEBU 275a Obtaining identity" +"2019-07-20 02:40:25.047 UTC [gossip.gossip] handleMessage -> DEBU 275b Exiting" +"2019-07-20 02:40:25.047 UTC [chaincode] Execute -> DEBU 275c Exit" +"2019-07-20 02:40:25.047 UTC [endorser] callChaincode -> INFO 275d [businesschannel][fe4517b7] Exit chaincode: name:"exp02" (9ms)" +"2019-07-20 02:40:25.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 275e Simulation completed, getting simulation results" +"2019-07-20 02:40:25.048 UTC [lockbasedtxmgr] Done -> DEBU 275f Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +"2019-07-20 02:40:25.048 UTC [endorser] SimulateProposal -> DEBU 2760 [businesschannel][fe4517b7] Exit" +"2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2761 [businesschannel][fe4517b7] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:25.048 UTC [endorser] endorseProposal -> DEBU 2762 [businesschannel][fe4517b7] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:25.048 UTC [endorser] EndorseWithPlugin -> DEBU 2763 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" +"2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2764 Sign: plaintext: 0A2086BA17C4AAFC9D029031ABC2FFF8...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:25.048 UTC [msp.identity] Sign -> DEBU 2765 Sign: digest: B49E3AD54A8ED894AD092B2726AC8FBC2C4B98C786E0D4605E7E46CC2F7AAA90 " +"2019-07-20 02:40:25.049 UTC [endorser] EndorseWithPlugin -> DEBU 2766 Exiting {plugin: escc, channel: businesschannel, tx: fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a, chaincode: exp02}" +"2019-07-20 02:40:25.049 UTC [endorser] endorseProposal -> DEBU 2767 [businesschannel][fe4517b7] Exit" +"2019-07-20 02:40:25.050 UTC [lockbasedtxmgr] Done -> DEBU 2768 Done with transaction simulation / query execution [fe4517b786ee8b445b78ed452c6524856e913dbebaed307b95aca5dc490d175a]" +"2019-07-20 02:40:25.050 UTC [endorser] func1 -> DEBU 2769 Exit: request from 172.18.0.9:58366" +"2019-07-20 02:40:25.050 UTC [comm.grpc.server] 1 -> INFO 276a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58366 grpc.code=OK grpc.call_duration=26.8375ms +"2019-07-20 02:40:25.051 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:25.051 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:25.052 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" +"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 276e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 276f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.052 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2770 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2771 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2772 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:25.052 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:25.052 UTC [cauthdsl] func1 -> DEBU 2774 0xc003fcb870 gate 1563590425052956900 evaluation starts" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2775 0xc003fcb870 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2776 0xc003fcb870 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2777 0xc003fcb870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func2 -> DEBU 2778 0xc003fcb870 principal evaluation fails" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 2779 0xc003fcb870 gate 1563590425052956900 evaluation fails" +"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.053 UTC [policies] Evaluate -> DEBU 277c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:25.053 UTC [cauthdsl] func1 -> DEBU 277d 0xc00400e0b0 gate 1563590425053935600 evaluation starts" +"2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277e 0xc00400e0b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.054 UTC [cauthdsl] func2 -> DEBU 277f 0xc00400e0b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.057 UTC [cauthdsl] func2 -> DEBU 2780 0xc00400e0b0 principal matched by identity 0" +"2019-07-20 02:40:25.057 UTC [grpc] infof -> DEBU 2781 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:25.057 UTC [msp.identity] Verify -> DEBU 2782 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:25.058 UTC [msp.identity] Verify -> DEBU 2783 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:25.059 UTC [cauthdsl] func2 -> DEBU 2784 0xc00400e0b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:25.059 UTC [cauthdsl] func1 -> DEBU 2785 0xc00400e0b0 gate 1563590425053935600 evaluation succeeds" +"2019-07-20 02:40:25.059 UTC [policies] Evaluate -> DEBU 2786 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2787 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2788 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:25.060 UTC [policies] Evaluate -> DEBU 2789 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:25.060 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +"2019-07-20 02:40:25.060 UTC [gossip.gossip] handleMessage -> DEBU 278b Exiting" +"2019-07-20 02:40:25.061 UTC [gossip.comm] func1 -> DEBU 278c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:25.061 UTC [gossip.gossip] handleMessage -> DEBU 278d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:25.061 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" +"2019-07-20 02:40:25.062 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 278f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2791 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.063 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2792 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2793 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:25.062 UTC [grpc] infof -> DEBU 2790 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2794 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:25.064 UTC [policies] Evaluate -> DEBU 2795 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:25.065 UTC [cauthdsl] func1 -> DEBU 2796 0xc003e81ea0 gate 1563590425064986200 evaluation starts" +"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2797 0xc003e81ea0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2798 0xc003e81ea0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.065 UTC [cauthdsl] func2 -> DEBU 2799 0xc003e81ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:25.066 UTC [cauthdsl] func2 -> DEBU 279a 0xc003e81ea0 principal evaluation fails" +"2019-07-20 02:40:25.066 UTC [cauthdsl] func1 -> DEBU 279b 0xc003e81ea0 gate 1563590425064986200 evaluation fails" +"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.067 UTC [policies] Evaluate -> DEBU 279e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:25.069 UTC [cauthdsl] func1 -> DEBU 279f 0xc0006386e0 gate 1563590425068282800 evaluation starts" +"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a0 0xc0006386e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a1 0xc0006386e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.069 UTC [cauthdsl] func2 -> DEBU 27a2 0xc0006386e0 principal matched by identity 0" +"2019-07-20 02:40:25.070 UTC [msp.identity] Verify -> DEBU 27a3 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:25.071 UTC [msp.identity] Verify -> DEBU 27a4 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:25.072 UTC [cauthdsl] func2 -> DEBU 27a5 0xc0006386e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:25.072 UTC [cauthdsl] func1 -> DEBU 27a6 0xc0006386e0 gate 1563590425068282800 evaluation succeeds" +"2019-07-20 02:40:25.072 UTC [policies] Evaluate -> DEBU 27a7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.073 UTC [policies] Evaluate -> DEBU 27a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27a9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:25.074 UTC [policies] Evaluate -> DEBU 27aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:25.075 UTC [msp] DeserializeIdentity -> DEBU 27ab Obtaining identity" +"2019-07-20 02:40:25.075 UTC [gossip.gossip] handleMessage -> DEBU 27ac Exiting" +"2019-07-20 02:40:25.183 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:25.183 UTC [gossip.gossip] handleMessage -> DEBU 27ae Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27af Obtaining identity" +"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b0 Obtaining identity" +"2019-07-20 02:40:25.184 UTC [msp] DeserializeIdentity -> DEBU 27b1 Obtaining identity" +"2019-07-20 02:40:25.186 UTC [gossip.gossip] handleMessage -> DEBU 27b2 Exiting" +"2019-07-20 02:40:25.192 UTC [gossip.comm] func1 -> DEBU 27b3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:25.193 UTC [gossip.gossip] handleMessage -> DEBU 27b4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:25.193 UTC [msp] DeserializeIdentity -> DEBU 27b5 Obtaining identity" +"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.195 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:25.195 UTC [policies] Evaluate -> DEBU 27bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27bc 0xc0007504a0 gate 1563590425196036400 evaluation starts" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bd 0xc0007504a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27be 0xc0007504a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27bf 0xc0007504a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func2 -> DEBU 27c0 0xc0007504a0 principal evaluation fails" +"2019-07-20 02:40:25.196 UTC [cauthdsl] func1 -> DEBU 27c1 0xc0007504a0 gate 1563590425196036400 evaluation fails" +"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:25.196 UTC [policies] Evaluate -> DEBU 27c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27c5 0xc000750ce0 gate 1563590425196986500 evaluation starts" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c6 0xc000750ce0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c7 0xc000750ce0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27c8 0xc000750ce0 principal matched by identity 0" +"2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +"2019-07-20 02:40:25.197 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func2 -> DEBU 27cb 0xc000750ce0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:25.197 UTC [cauthdsl] func1 -> DEBU 27cc 0xc000750ce0 gate 1563590425196986500 evaluation succeeds" +"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:25.197 UTC [policies] Evaluate -> DEBU 27cf Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:25.198 UTC [policies] Evaluate -> DEBU 27d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:25.198 UTC [msp] DeserializeIdentity -> DEBU 27d1 Obtaining identity" +"2019-07-20 02:40:25.198 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Exiting" +"2019-07-20 02:40:26.844 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:26.845 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 27d4 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:40:26.846 UTC [policies] Evaluate -> DEBU 27d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:26.847 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:26.847 UTC [cauthdsl] func1 -> DEBU 27d8 0xc000639f40 gate 1563590426847433500 evaluation starts" +"2019-07-20 02:40:26.847 UTC [cauthdsl] func2 -> DEBU 27d9 0xc000639f40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27da 0xc000639f40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:26.848 UTC [cauthdsl] func2 -> DEBU 27db 0xc000639f40 principal matched by identity 0" +"2019-07-20 02:40:26.848 UTC [msp.identity] Verify -> DEBU 27dc Verify: digest = 00000000 a0 cc 22 24 a6 fd 41 ca a8 ab e4 54 29 1b 01 20 |.."$..A....T).. | +00000010 a1 aa a0 ab 2c b6 6c 16 c4 77 ff 3d e4 2f 4b 00 |....,.l..w.=./K.|" +"2019-07-20 02:40:26.849 UTC [msp.identity] Verify -> DEBU 27dd Verify: sig = 00000000 30 44 02 20 49 e5 40 e2 01 5a 4d b2 0b b1 d9 96 |0D. I.@..ZM.....| +00000010 eb ef c0 39 d8 5f 4a bf 19 95 66 d7 1b 7e 23 e4 |...9._J...f..~#.| +00000020 86 75 35 11 02 20 4a bc 32 6c e8 b3 58 8f 09 cd |.u5.. J.2l..X...| +00000030 cb 09 71 17 d5 13 8e 95 96 9a 8c 1d d1 91 07 86 |..q.............| +00000040 93 23 b1 9d cd 6e |.#...n|" +"2019-07-20 02:40:26.849 UTC [cauthdsl] func2 -> DEBU 27de 0xc000639f40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:26.850 UTC [cauthdsl] func1 -> DEBU 27df 0xc000639f40 gate 1563590426847433500 evaluation succeeds" +"2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:26.850 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e2 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:26.851 UTC [policies] Evaluate -> DEBU 27e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:26.852 UTC [blocksProvider] DeliverBlocks -> DEBU 27e4 [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-07-20 02:40:26.852 UTC [gossip.state] addPayload -> DEBU 27e5 [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-07-20 02:40:26.853 UTC [gossip.state] addPayload -> DEBU 27e6 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:40:26.853 UTC [blocksProvider] DeliverBlocks -> DEBU 27e8 [businesschannel] Gossiping block [4], peers number [3]" +"2019-07-20 02:40:26.853 UTC [gossip.state] deliverPayloads -> DEBU 27e7 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +"2019-07-20 02:40:26.854 UTC [gossip.state] deliverPayloads -> DEBU 27e9 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +"2019-07-20 02:40:26.854 UTC [gossip.privdata] StoreBlock -> INFO 27ea [businesschannel] Received block [4] from buffer" +"2019-07-20 02:40:26.857 UTC [gossip.privdata] StoreBlock -> DEBU 27eb [businesschannel] Validating block [4]" +"2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ec [businesschannel] START Block Validation for block [4]" +"2019-07-20 02:40:26.858 UTC [committer.txvalidator] Validate -> DEBU 27ed expecting 1 block validation responses" +"2019-07-20 02:40:26.858 UTC [committer.txvalidator] validateTx -> DEBU 27ee [businesschannel] validateTx starts for block 0xc0004858c0 env 0xc0028bdc20 txn 0" +"2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27ef ValidateTransactionEnvelope starts for envelope 0xc0028bdc20" +"2019-07-20 02:40:26.859 UTC [protoutils] ValidateTransaction -> DEBU 27f0 Header is channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " +"2019-07-20 02:40:26.859 UTC [protoutils] validateChannelHeader -> DEBU 27f1 validateChannelHeader info: header type 3" +"2019-07-20 02:40:26.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f2 begin" +"2019-07-20 02:40:26.860 UTC [msp] GetManagerForChain -> DEBU 27f3 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:26.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f5 creator is valid" +"2019-07-20 02:40:26.861 UTC [msp.identity] Verify -> DEBU 27f6 Verify: digest = 00000000 97 03 8b 29 3b d7 61 87 c0 b1 9e e0 d5 e5 59 bf |...);.a.......Y.| +00000010 90 93 46 3e 70 6d ee 67 fe cd 38 32 fe 22 66 b0 |..F>pm.g..82."f.|" +"2019-07-20 02:40:26.862 UTC [msp.identity] Verify -> DEBU 27f7 Verify: sig = 00000000 30 45 02 21 00 a8 a2 93 b5 4c 8c 0c 6b 3e 06 99 |0E.!.....L..k>..| +00000010 37 7b a3 55 44 c0 5e fc a4 0d f6 f7 d1 98 27 42 |7{.UD.^.......'B| +00000020 53 8c 9b 56 17 02 20 42 ff 25 02 18 bc cb 75 a0 |S..V.. B.%....u.| +00000030 32 02 be 09 df a4 6d ad 1b 05 12 07 ec 58 2d e3 |2.....m......X-.| +00000040 95 b0 80 c3 bc 80 99 |.......|" +"2019-07-20 02:40:26.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 27f8 exits successfully" +"2019-07-20 02:40:26.862 UTC [protoutils] validateEndorserTransaction -> DEBU 27f9 validateEndorserTransaction starts for data 0xc003bdf000, header channel_header:"\010\003\032\014\010\230\376\311\351\005\020\200\222\363\360\002\"\017businesschannel*@3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030ZM\234\320}XST\361\312\344\252\267\352Gt\026d\332\211=k_\312" " +"2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fa validateEndorserTransaction info: there are 1 actions" +"2019-07-20 02:40:26.863 UTC [protoutils] validateEndorserTransaction -> DEBU 27fb validateEndorserTransaction info: signature header is valid" +"2019-07-20 02:40:26.863 UTC [protoutils] ValidateTransaction -> DEBU 27fc ValidateTransactionEnvelope returns err %!s()" +"2019-07-20 02:40:26.863 UTC [committer.txvalidator] validateTx -> DEBU 27fd Transaction is for channel businesschannel" +"2019-07-20 02:40:26.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 27fe retrieveTransactionByID() - txId = [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732]" +"2019-07-20 02:40:26.864 UTC [committer.txvalidator] validateTx -> DEBU 27ff Validating transaction vscc tx validate" +"2019-07-20 02:40:26.864 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2800 [businesschannel] VSCCValidateTx starts for bytes 0xc0004e2400" +"2019-07-20 02:40:26.864 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2801 constructing new query executor txid = [f398664c-20c2-4d41-9183-fecba403f08a]" +"2019-07-20 02:40:26.864 UTC [stateleveldb] GetState -> DEBU 2802 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:26.865 UTC [lockbasedtxmgr] Done -> DEBU 2803 Done with transaction simulation / query execution [f398664c-20c2-4d41-9183-fecba403f08a]" +"2019-07-20 02:40:26.865 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2804 Validating Tx 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +"2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2805 constructing new query executor txid = [5b17155b-dc37-4fcd-8594-53903d419501]" +"2019-07-20 02:40:26.867 UTC [lockbasedtxmgr] Done -> DEBU 2806 Done with transaction simulation / query execution [5b17155b-dc37-4fcd-8594-53903d419501]" +"2019-07-20 02:40:26.868 UTC [cauthdsl] func1 -> DEBU 2807 0xc002f478a0 gate 1563590426868447500 evaluation starts" +"2019-07-20 02:40:26.869 UTC [cauthdsl] func2 -> DEBU 2808 0xc002f478a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:26.870 UTC [gossip.channel] AddToMsgStore -> DEBU 2809 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:40:26.870 UTC [gossip.pull] Add -> DEBU 280b Added 4, total items: 4" +"2019-07-20 02:40:26.870 UTC [cauthdsl] func2 -> DEBU 280a 0xc002f478a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280c 0xc002f478a0 principal matched by identity 0" +"2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280d Verify: digest = 00000000 4c 3f 23 d1 07 f5 94 12 9e ea ab 4c 73 11 1c 5d |L?#........Ls..]| +00000010 8f 88 0d cb 0a f0 f5 1b ee 8d a0 3f 26 d7 12 81 |...........?&...|" +"2019-07-20 02:40:26.872 UTC [msp.identity] Verify -> DEBU 280e Verify: sig = 00000000 30 45 02 21 00 a3 09 11 68 b6 4a cf cc b2 e0 16 |0E.!....h.J.....| +00000010 4f a8 02 f4 78 43 81 2a f3 c7 ea 8b 34 ed 79 ca |O...xC.*....4.y.| +00000020 71 f2 e0 ca 94 02 20 3c f5 44 47 2d ce fc 85 9c |q..... <.DG-....| +00000030 56 18 25 fa 92 95 2f e5 42 a2 94 96 01 72 d3 5b |V.%.../.B....r.[| +00000040 67 e8 13 66 51 b3 6b |g..fQ.k|" +"2019-07-20 02:40:26.872 UTC [cauthdsl] func2 -> DEBU 280f 0xc002f478a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2810 0xc002f478a0 signed by 1 principal evaluation starts (used [true])" +"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2811 0xc002f478a0 skipping identity 0 because it has already been used" +"2019-07-20 02:40:26.873 UTC [cauthdsl] func2 -> DEBU 2812 0xc002f478a0 principal evaluation fails" +"2019-07-20 02:40:26.873 UTC [cauthdsl] func1 -> DEBU 2813 0xc002f478a0 gate 1563590426868447500 evaluation succeeds" +"2019-07-20 02:40:26.873 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2814 constructing new query executor txid = [b411b15d-1b46-48d3-be14-dbe98f8da76f]" +"2019-07-20 02:40:26.876 UTC [lockbasedtxmgr] Done -> DEBU 2815 Done with transaction simulation / query execution [b411b15d-1b46-48d3-be14-dbe98f8da76f]" +"2019-07-20 02:40:26.876 UTC [vscc] Validate -> DEBU 2816 block 4, namespace: exp02, tx 0 validation results is: " +"2019-07-20 02:40:26.876 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2817 Transaction 3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 appears to be valid" +"2019-07-20 02:40:26.876 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2818 [businesschannel] VSCCValidateTx completes env bytes 0xc0004e2400" +"2019-07-20 02:40:26.876 UTC [committer.txvalidator] validateTx -> DEBU 2819 [businesschannel] validateTx completes for block 0xc0004858c0 env 0xc0028bdc20 txn 0" +"2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> DEBU 281a got result for idx 0, code 0" +"2019-07-20 02:40:26.876 UTC [committer.txvalidator] Validate -> INFO 281b [businesschannel] Validated block [4] in 18ms" +"2019-07-20 02:40:26.876 UTC [gossip.privdata] listMissingPrivateData -> DEBU 281c Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:40:26.876 UTC [gossip.privdata] StoreBlock -> DEBU 281d [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:40:26.877 UTC [kvledger] CommitWithPvtData -> DEBU 281e [businesschannel] Validating state for block [4]" +"2019-07-20 02:40:26.880 UTC [msp] DeserializeIdentity -> DEBU 281f Obtaining identity" +"2019-07-20 02:40:26.877 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2820 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:40:26.882 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2821 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:40:26.883 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2822 Validating new block with num trans = [1]" +"2019-07-20 02:40:26.883 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2823 ValidateAndPrepareBatch() for block number = [4]" +"2019-07-20 02:40:26.884 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2824 preprocessing ProtoBlock..." +"2019-07-20 02:40:26.884 UTC [valimpl] preprocessProtoBlock -> DEBU 2825 txType=ENDORSER_TRANSACTION" +"2019-07-20 02:40:26.885 UTC [msp] DeserializeIdentity -> DEBU 2826 Obtaining identity" +"2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 2827 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:26.886 UTC [statebasedval] validateKVRead -> DEBU 2828 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 2829 Obtaining identity" +"2019-07-20 02:40:26.886 UTC [msp] DeserializeIdentity -> DEBU 282a Obtaining identity" +"2019-07-20 02:40:26.886 UTC [stateleveldb] GetState -> DEBU 282b GetState(). ns=exp02, key=b" +"2019-07-20 02:40:26.887 UTC [gossip.comm] Send -> DEBU 282c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:26.887 UTC [statebasedval] validateKVRead -> DEBU 282d Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 282e Obtaining identity" +"2019-07-20 02:40:26.887 UTC [stateleveldb] GetState -> DEBU 282f GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:26.890 UTC [statebasedval] validateKVRead -> DEBU 2830 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-07-20 02:40:26.890 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2831 Block [4] Transaction index [0] TxId [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] marked as valid by state validator" +"2019-07-20 02:40:26.890 UTC [valinternal] ApplyWriteSet -> DEBU 2832 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003020a40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003020b00)}" +"2019-07-20 02:40:26.890 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2833 validating rwset..." +"2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2834 postprocessing ProtoBlock..." +"2019-07-20 02:40:26.887 UTC [msp] DeserializeIdentity -> DEBU 2835 Obtaining identity" +"2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2836 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4006 bytes, seq: 4}, Envelope: 4036 bytes, Signature: 0 bytes" +"2019-07-20 02:40:26.893 UTC [gossip.comm] sendToEndpoint -> DEBU 2837 Exiting" +"2019-07-20 02:40:26.891 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2838 ValidateAndPrepareBatch() complete" +"2019-07-20 02:40:26.895 UTC [kvledger] CommitWithPvtData -> DEBU 2839 [businesschannel] Adding CommitHash to the block [4]" +"2019-07-20 02:40:26.896 UTC [kvledger] CommitWithPvtData -> DEBU 283a [businesschannel] Committing block [4] to storage" +"2019-07-20 02:40:26.896 UTC [ledgerstorage] CommitWithPvtData -> DEBU 283b Writing block [4] to pvt block store" +"2019-07-20 02:40:26.903 UTC [pvtdatastorage] Prepare -> DEBU 283c Saved 0 private data write sets for block [4]" +"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283d Indexing block [blockNum=4, blockHash=[]byte{0xb7, 0x10, 0x53, 0xe8, 0x49, 0x19, 0xe7, 0xf, 0x6f, 0x37, 0xc7, 0x9c, 0x27, 0xaf, 0x1c, 0x10, 0x15, 0x6c, 0xa3, 0xe5, 0x32, 0x4c, 0x6a, 0x2a, 0x4d, 0xc, 0x12, 0xea, 0x60, 0x40, 0x84, 0xb2} txOffsets= +txId=3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732 locPointer=offset=70, bytesLength=2986 +]" +"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283e Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to txid-index" +"2019-07-20 02:40:26.915 UTC [fsblkstorage] indexBlock -> DEBU 283f Adding txLoc [fileSuffixNum=0, offset=76095, bytesLength=2986] for tx number:[0] ID: [3cf6d7e2220599b95e47f77b5a6f33b720d84d879d0c51152ef7dd8eb2d4e732] to blockNumTranNum index" +"2019-07-20 02:40:26.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 2840 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80053], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-07-20 02:40:26.918 UTC [pvtdatastorage] Commit -> DEBU 2841 Committing private data for block [4]" +"2019-07-20 02:40:26.924 UTC [pvtdatastorage] Commit -> DEBU 2842 Committed private data for block [4]" +"2019-07-20 02:40:26.924 UTC [kvledger] CommitWithPvtData -> DEBU 2843 [businesschannel] Committing block [4] transactions to state database" +"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2844 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2845 Committing updates to state database" +"2019-07-20 02:40:26.924 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2846 Building the expiry schedules based on the update batch" +"2019-07-20 02:40:26.924 UTC [lockbasedtxmgr] Commit -> DEBU 2847 Write lock acquired for committing updates to state database" +"2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2848 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-07-20 02:40:26.925 UTC [stateleveldb] ApplyUpdates -> DEBU 2849 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] Commit -> DEBU 284a Updates committed to state database and the write lock is released" +"2019-07-20 02:40:26.928 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 284b Preparing potential purge list working-set for expiringAtBlk [5]" +"2019-07-20 02:40:26.928 UTC [lockbasedtxmgr] func1 -> DEBU 284c launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:40:26.928 UTC [kvledger] CommitWithPvtData -> DEBU 284d [businesschannel] Committing block [4] transactions to history database" +"2019-07-20 02:40:26.928 UTC [historyleveldb] Commit -> DEBU 284e Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +"2019-07-20 02:40:26.928 UTC [leveldbhelper] GetIterator -> DEBU 284f Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +"2019-07-20 02:40:26.929 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2850 No expiry entry found for expiringAtBlk [5]" +"2019-07-20 02:40:26.930 UTC [historyleveldb] Commit -> DEBU 2851 Channel [businesschannel]: Updates committed to history database for blockNo [4]" +"2019-07-20 02:40:26.931 UTC [kvledger] CommitWithPvtData -> INFO 2852 [businesschannel] Committed block [4] with 1 transaction(s) in 54ms (state_validation=18ms block_and_pvtdata_commit=28ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +"2019-07-20 02:40:26.931 UTC [msp] GetDefaultSigningIdentity -> DEBU 2853 Obtaining default signing identity" +"2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2854 Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08051A0C0A0565787030321203312E30 " +"2019-07-20 02:40:26.931 UTC [msp.identity] Sign -> DEBU 2855 Sign: digest: 9F8F9BA187E3D7AD25ADAB380D04A58C6823AADBBC650640B818D6D17BCA764A " +"2019-07-20 02:40:26.931 UTC [gossip.state] commitBlock -> DEBU 2856 [businesschannel] Committed block [4] with 1 transaction(s)" +"2019-07-20 02:40:26.999 UTC [gossip.election] waitForInterrupt -> DEBU 2857 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:27.000 UTC [gossip.election] IsLeader -> DEBU 2858 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:27.000 UTC [msp] GetDefaultSigningIdentity -> DEBU 2859 Obtaining default signing identity" +"2019-07-20 02:40:27.001 UTC [msp.identity] Sign -> DEBU 285a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100A1801 " +"2019-07-20 02:40:27.002 UTC [msp.identity] Sign -> DEBU 285b Sign: digest: 3C12A3CEC5CB7423F2D05CC1CB64C08F1FCFA25938DE5509242BEFFCB1D03575 " +"2019-07-20 02:40:27.002 UTC [gossip.election] waitForInterrupt -> DEBU 285c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:27.006 UTC [gossip.comm] func1 -> DEBU 285d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.008 UTC [gossip.gossip] handleMessage -> DEBU 285e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.009 UTC [gossip.gossip] handleMessage -> DEBU 285f Exiting" +"2019-07-20 02:40:27.009 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2860 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.010 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2861 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:27.010 UTC [msp] DeserializeIdentity -> DEBU 2862 Obtaining identity" +"2019-07-20 02:40:27.011 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2864 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.012 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2865 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.012 UTC [policies] Evaluate -> DEBU 2866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.013 UTC [policies] Evaluate -> DEBU 2868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:27.013 UTC [cauthdsl] func1 -> DEBU 2869 0xc0033ef6f0 gate 1563590427013372300 evaluation starts" +"2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286a 0xc0033ef6f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.013 UTC [cauthdsl] func2 -> DEBU 286b 0xc0033ef6f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286c 0xc0033ef6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.015 UTC [cauthdsl] func2 -> DEBU 286d 0xc0033ef6f0 principal evaluation fails" +"2019-07-20 02:40:27.016 UTC [cauthdsl] func1 -> DEBU 286f 0xc0033ef6f0 gate 1563590427013372300 evaluation fails" +"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2870 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.015 UTC [gossip.comm] func1 -> DEBU 286e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2871 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.017 UTC [policies] Evaluate -> DEBU 2873 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:27.018 UTC [cauthdsl] func1 -> DEBU 2874 0xc00379a040 gate 1563590427018048500 evaluation starts" +"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2875 0xc00379a040 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2876 0xc00379a040 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 2877 0xc00379a040 principal matched by identity 0" +"2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2878 Verify: digest = 00000000 34 5c 18 02 4e f3 bc fb b1 a1 29 a4 92 63 c8 d0 |4\..N.....)..c..| +00000010 e0 62 df a1 90 fd 41 a8 c7 18 5c 3e 5a 8d c5 6e |.b....A...\>Z..n|" +"2019-07-20 02:40:27.018 UTC [msp.identity] Verify -> DEBU 2879 Verify: sig = 00000000 30 44 02 20 23 4e fb c3 d2 e3 f4 cc da f4 e2 3f |0D. #N.........?| +00000010 f6 47 89 14 6b f5 4f 8e cc fb 18 d3 0b 6f c4 c5 |.G..k.O......o..| +00000020 5b e7 ec 8d 02 20 77 89 48 b5 92 de 13 26 6e 5e |[.... w.H....&n^| +00000030 ee ba a7 b1 33 d2 36 d5 4b 6a 61 14 23 18 6e 25 |....3.6.Kja.#.n%| +00000040 99 37 43 15 a0 09 |.7C...|" +"2019-07-20 02:40:27.018 UTC [cauthdsl] func2 -> DEBU 287a 0xc00379a040 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.019 UTC [cauthdsl] func1 -> DEBU 287b 0xc00379a040 gate 1563590427018048500 evaluation succeeds" +"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:27.019 UTC [policies] Evaluate -> DEBU 287f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:27.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 2880 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2881 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2882 updating membership: timestamp: " +"2019-07-20 02:40:27.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 2883 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2884 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:27.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2885 Exiting" +"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Exiting" +"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2887 Exiting" +"2019-07-20 02:40:27.017 UTC [gossip.gossip] handleMessage -> DEBU 2872 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.020 UTC [gossip.gossip] handleMessage -> DEBU 2888 Exiting" +"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2889 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288a Exiting" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288b Obtaining identity" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288c Obtaining identity" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288d Obtaining identity" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" +"2019-07-20 02:40:27.021 UTC [gossip.comm] Send -> DEBU 288f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2891 Obtaining identity" +"2019-07-20 02:40:27.021 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" +"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" +"2019-07-20 02:40:27.022 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" +"2019-07-20 02:40:27.024 UTC [gossip.comm] Send -> DEBU 2897 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:27.024 UTC [msp] DeserializeIdentity -> DEBU 2898 Obtaining identity" +"2019-07-20 02:40:27.025 UTC [msp] DeserializeIdentity -> DEBU 2899 Obtaining identity" +"2019-07-20 02:40:27.025 UTC [gossip.comm] Send -> DEBU 289a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 289c Exiting" +"2019-07-20 02:40:27.024 UTC [gossip.comm] func1 -> DEBU 2896 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.025 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" +"2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" +"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.025 UTC [gossip.comm] sendToEndpoint -> DEBU 28a2 Exiting" +"2019-07-20 02:40:27.024 UTC [gossip.comm] sendToEndpoint -> DEBU 28a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.026 UTC [gossip.comm] sendToEndpoint -> DEBU 28a4 Exiting" +"2019-07-20 02:40:27.244 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a5 Obtaining default signing identity" +"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151022 " +"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a7 Sign: digest: 819BDFE46E1A1EE055D1141FFDE3D7554AF2B24B2F62ECB0CFC09CC56E885EFA " +"2019-07-20 02:40:27.312 UTC [msp] GetDefaultSigningIdentity -> DEBU 28a8 Obtaining default signing identity" +"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28a9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:27.312 UTC [msp.identity] Sign -> DEBU 28aa Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:27.312 UTC [gossip.discovery] periodicalSendAlive -> DEBU 28ab Sleeping 5s" +"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ac Obtaining identity" +"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28ad Obtaining identity" +"2019-07-20 02:40:27.324 UTC [gossip.comm] Send -> DEBU 28ae Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:27.324 UTC [msp] DeserializeIdentity -> DEBU 28af Obtaining identity" +"2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.325 UTC [msp] DeserializeIdentity -> DEBU 28b1 Obtaining identity" +"2019-07-20 02:40:27.325 UTC [gossip.comm] Send -> DEBU 28b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b4 Exiting" +"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.325 UTC [gossip.comm] sendToEndpoint -> DEBU 28b6 Exiting" +"2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.326 UTC [gossip.comm] sendToEndpoint -> DEBU 28b8 Exiting" +"2019-07-20 02:40:27.401 UTC [gossip.comm] func1 -> DEBU 28b9 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28ba Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:27.401 UTC [gossip.gossip] handleMessage -> DEBU 28bb Exiting" +"2019-07-20 02:40:27.402 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28bc Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:27.402 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28bd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28be Verify: digest = 00000000 d5 d4 12 8c 11 af 11 2f f8 85 73 66 a1 82 f1 bf |......./..sf....| +00000010 e7 f9 2c af 71 30 28 38 89 7d ec df 43 e1 3e dc |..,.q0(8.}..C.>.|" +"2019-07-20 02:40:27.404 UTC [msp.identity] Verify -> DEBU 28bf Verify: sig = 00000000 30 45 02 21 00 a9 07 c0 0f 0b 35 ba 37 ea 31 e4 |0E.!......5.7.1.| +00000010 7a db a5 7b 94 0f 9d 2e 5e be 4d a6 e6 b3 fa b5 |z..{....^.M.....| +00000020 ff dc 30 61 b0 02 20 62 ea df c6 5d 10 5a d8 82 |..0a.. b...].Z..| +00000030 38 99 7a 54 45 3a 92 96 e7 41 e9 cd 67 42 f0 dc |8.zTE:...A..gB..| +00000040 e0 8c 56 a8 ed 17 da |..V....|" +"2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:27.405 UTC [msp.identity] Verify -> DEBU 28c1 Verify: sig = 00000000 30 45 02 21 00 fe b4 65 c5 5b 87 1f 40 11 77 34 |0E.!...e.[..@.w4| +00000010 39 85 1b 3a 7f 13 47 91 b3 31 12 bd 5d 72 cf a7 |9..:..G..1..]r..| +00000020 cf e8 ee 6d b2 02 20 37 91 77 c8 95 05 19 2f 4e |...m.. 7.w..../N| +00000030 68 b2 a6 a1 ea e5 9f f9 d1 e7 7b cd 79 ac 9e 50 |h.........{.y..P| +00000040 c6 0e 51 df e0 84 85 |..Q....|" +"2019-07-20 02:40:27.411 UTC [gossip.comm] func1 -> DEBU 28c2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.412 UTC [gossip.comm] func1 -> DEBU 28c4 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.412 UTC [gossip.gossip] handleMessage -> DEBU 28c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.408 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:27.418 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:27.419 UTC [gossip.discovery] learnExistingMembers -> DEBU 28ca Exiting" +"2019-07-20 02:40:27.419 UTC [gossip.discovery] handleAliveMessage -> DEBU 28cb Exiting" +"2019-07-20 02:40:27.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cc Exiting" +"2019-07-20 02:40:27.419 UTC [gossip.gossip] handleMessage -> DEBU 28cd Exiting" +"2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28ce Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28cf Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d0 Exiting" +"2019-07-20 02:40:27.420 UTC [gossip.gossip] handleMessage -> DEBU 28d1 Exiting" +"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d2 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.420 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28d3 Exiting" +"2019-07-20 02:40:27.429 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" +"2019-07-20 02:40:27.430 UTC [msp] DeserializeIdentity -> DEBU 28d5 Obtaining identity" +"2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d6 Obtaining identity" +"2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d7 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.431 UTC [msp] DeserializeIdentity -> DEBU 28d8 Obtaining identity" +"2019-07-20 02:40:27.431 UTC [gossip.comm] Send -> DEBU 28d9 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.431 UTC [gossip.comm] sendToEndpoint -> DEBU 28db Exiting" +"2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.432 UTC [gossip.comm] sendToEndpoint -> DEBU 28dd Exiting" +"2019-07-20 02:40:27.551 UTC [endorser] ProcessProposal -> DEBU 28de Entering: request from 172.18.0.9:58370" +"2019-07-20 02:40:27.551 UTC [protoutils] ValidateProposalMessage -> DEBU 28df ValidateProposalMessage starts for signed proposal 0xc000596280" +"2019-07-20 02:40:27.552 UTC [protoutils] validateChannelHeader -> DEBU 28e0 validateChannelHeader info: header type 3" +"2019-07-20 02:40:27.552 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e1 begin" +"2019-07-20 02:40:27.552 UTC [msp] GetManagerForChain -> DEBU 28e2 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:27.553 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e3 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-07-20 02:40:27.554 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e4 creator is valid" +"2019-07-20 02:40:27.554 UTC [msp.identity] Verify -> DEBU 28e5 Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| +00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" +"2019-07-20 02:40:27.555 UTC [msp.identity] Verify -> DEBU 28e6 Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| +00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| +00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| +00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| +00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" +"2019-07-20 02:40:27.555 UTC [protoutils] checkSignatureFromCreator -> DEBU 28e7 exits successfully" +"2019-07-20 02:40:27.556 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28e8 validateChaincodeProposalMessage starts for proposal 0xc000406700, header 0xc000596690" +"2019-07-20 02:40:27.561 UTC [gossip.comm] func1 -> DEBU 28e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.565 UTC [gossip.gossip] handleMessage -> DEBU 28ea Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.566 UTC [gossip.gossip] handleMessage -> DEBU 28eb Exiting" +"2019-07-20 02:40:27.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28ed Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:27.568 UTC [msp] DeserializeIdentity -> DEBU 28ee Obtaining identity" +"2019-07-20 02:40:27.570 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.576 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28f3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.575 UTC [gossip.comm] func1 -> DEBU 28f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.576 UTC [gossip.comm] func1 -> DEBU 28f1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.578 UTC [policies] Evaluate -> DEBU 28f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:27.579 UTC [gossip.gossip] handleMessage -> DEBU 28f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.582 UTC [policies] Evaluate -> DEBU 28f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.565 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28f7 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:27.584 UTC [endorser] preProcess -> DEBU 28f9 [businesschannel][45a41d79] processing txid: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81" +"2019-07-20 02:40:27.584 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28fa retrieveTransactionByID() - txId = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +"2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fb acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:27.584 UTC [policies] Evaluate -> DEBU 28f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:27.585 UTC [aclmgmt] CheckACL -> DEBU 28fc acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:27.587 UTC [policies] Evaluate -> DEBU 28ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.586 UTC [cauthdsl] func1 -> DEBU 28fd 0xc003ab5ab0 gate 1563590427586480900 evaluation starts" +"2019-07-20 02:40:27.588 UTC [policies] Evaluate -> DEBU 2900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:27.589 UTC [cauthdsl] func1 -> DEBU 2902 0xc002858240 gate 1563590427589122400 evaluation starts" +"2019-07-20 02:40:27.589 UTC [cauthdsl] func2 -> DEBU 2903 0xc002858240 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.588 UTC [cauthdsl] func2 -> DEBU 2901 0xc003ab5ab0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2904 0xc003ab5ab0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2905 0xc003ab5ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2906 0xc003ab5ab0 principal evaluation fails" +"2019-07-20 02:40:27.600 UTC [cauthdsl] func1 -> DEBU 2907 0xc003ab5ab0 gate 1563590427586480900 evaluation fails" +"2019-07-20 02:40:27.600 UTC [policies] Evaluate -> DEBU 2909 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.601 UTC [policies] Evaluate -> DEBU 290b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:27.601 UTC [cauthdsl] func1 -> DEBU 290c 0xc002858a80 gate 1563590427601207400 evaluation starts" +"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290d 0xc002858a80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290e 0xc002858a80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 290f 0xc002858a80 principal matched by identity 0" +"2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2910 Verify: digest = 00000000 f9 8d f8 ea 20 e1 4b 0a 33 89 a1 4a e1 65 16 14 |.... .K.3..J.e..| +00000010 88 2f 4e e4 e9 4e 05 f1 4a 0b f0 5e ea 5a cb c5 |./N..N..J..^.Z..|" +"2019-07-20 02:40:27.601 UTC [msp.identity] Verify -> DEBU 2911 Verify: sig = 00000000 30 45 02 21 00 df e9 99 b7 18 e6 f2 5b 89 92 70 |0E.!........[..p| +00000010 3a 70 57 71 5c 8f c3 19 89 a0 3b 81 8b 21 bc 6d |:pWq\.....;..!.m| +00000020 b4 24 3a 2a 10 02 20 53 cb f9 11 e8 15 28 46 8f |.$:*.. S.....(F.| +00000030 e5 66 9f cf 35 99 71 f1 2a 66 f8 0c aa cd c3 35 |.f..5.q.*f.....5| +00000040 cf 6b 12 ea 09 cb eb |.k.....|" +"2019-07-20 02:40:27.601 UTC [cauthdsl] func2 -> DEBU 2912 0xc002858a80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.602 UTC [cauthdsl] func1 -> DEBU 2913 0xc002858a80 gate 1563590427601207400 evaluation succeeds" +"2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2914 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.602 UTC [policies] Evaluate -> DEBU 2915 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2916 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:27.603 UTC [policies] Evaluate -> DEBU 2917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:27.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 2918 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 2919 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291a updating membership: timestamp: " +"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291b Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:27.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 291c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:27.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 291d Exiting" +"2019-07-20 02:40:27.605 UTC [gossip.discovery] handleAliveMessage -> DEBU 291e Exiting" +"2019-07-20 02:40:27.605 UTC [gossip.discovery] handleMsgFromComm -> DEBU 291f Exiting" +"2019-07-20 02:40:27.600 UTC [cauthdsl] func2 -> DEBU 2908 0xc002858240 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2920 0xc002858240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.606 UTC [cauthdsl] func2 -> DEBU 2922 0xc002858240 principal evaluation fails" +"2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2924 0xc002858240 gate 1563590427589122400 evaluation fails" +"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2925 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2926 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.607 UTC [policies] Evaluate -> DEBU 2927 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:40:27.607 UTC [cauthdsl] func1 -> DEBU 2928 0xc00295c3f0 gate 1563590427607262800 evaluation starts" +"2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 2929 0xc00295c3f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.607 UTC [cauthdsl] func2 -> DEBU 292a 0xc00295c3f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.606 UTC [gossip.gossip] handleMessage -> DEBU 2923 Exiting" +"2019-07-20 02:40:27.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2921 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.610 UTC [cauthdsl] func2 -> DEBU 292b 0xc00295c3f0 principal matched by identity 0" +"2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292e Verify: digest = 00000000 1b 56 5f d0 6c cc 26 db 51 8e f0 35 dc 66 83 a6 |.V_.l.&.Q..5.f..| +00000010 db 62 2e 19 d8 63 bc aa 22 54 24 95 e8 88 90 cb |.b...c.."T$.....|" +"2019-07-20 02:40:27.611 UTC [msp.identity] Verify -> DEBU 292f Verify: sig = 00000000 30 45 02 21 00 b9 f1 57 3a 84 f5 ca 68 f2 de 84 |0E.!...W:...h...| +00000010 73 4f a7 75 11 6b 5f ef 34 d9 86 b8 6e ea 3c 9d |sO.u.k_.4...n.<.| +00000020 2a 38 5f eb 9d 02 20 3e 21 dc c6 3d 5d 5e b6 38 |*8_... >!..=]^.8| +00000030 fa 0a 44 9e 4d 79 0f a2 46 9f 4b 5d 94 4e f3 cd |..D.My..F.K].N..| +00000040 5b 92 39 ce 65 b4 56 |[.9.e.V|" +"2019-07-20 02:40:27.611 UTC [cauthdsl] func2 -> DEBU 2930 0xc00295c3f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.610 UTC [gossip.gossip] handleMessage -> DEBU 292c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" +"2019-07-20 02:40:27.612 UTC [cauthdsl] func1 -> DEBU 2931 0xc00295c3f0 gate 1563590427607262800 evaluation succeeds" +"2019-07-20 02:40:27.612 UTC [policies] Evaluate -> DEBU 2934 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2935 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2936 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:27.613 UTC [policies] Evaluate -> DEBU 2937 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:27.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2932 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2939 Exiting" +"2019-07-20 02:40:27.613 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2938 constructing new tx simulator" +"2019-07-20 02:40:27.616 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +"2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +"2019-07-20 02:40:27.617 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" +"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" +"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 293f Obtaining identity" +"2019-07-20 02:40:27.617 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2940 constructing new tx simulator txid = [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +"2019-07-20 02:40:27.618 UTC [msp] DeserializeIdentity -> DEBU 2941 Obtaining identity" +"2019-07-20 02:40:27.619 UTC [gossip.comm] Send -> DEBU 2942 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.619 UTC [msp] DeserializeIdentity -> DEBU 2943 Obtaining identity" +"2019-07-20 02:40:27.619 UTC [endorser] SimulateProposal -> DEBU 2944 [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.620 UTC [gossip.comm] Send -> DEBU 2945 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:27.620 UTC [stateleveldb] GetState -> DEBU 2946 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2947 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 2949 Exiting" +"2019-07-20 02:40:27.620 UTC [gossip.comm] sendToEndpoint -> DEBU 2948 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:27.621 UTC [gossip.comm] sendToEndpoint -> DEBU 294a Exiting" +"2019-07-20 02:40:27.612 UTC [gossip.gossip] handleMessage -> DEBU 2933 Exiting" +"2019-07-20 02:40:27.623 UTC [ccprovider] GetChaincodeData -> DEBU 294b Getting chaincode data for from cache" +"2019-07-20 02:40:27.623 UTC [endorser] callChaincode -> INFO 294c [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.626 UTC [chaincode] Execute -> DEBU 294d Entry" +"2019-07-20 02:40:27.630 UTC [chaincode] handleMessage -> DEBU 294e [45a41d79] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:27.631 UTC [chaincode] HandleTransaction -> DEBU 294f [45a41d79] handling GET_STATE from chaincode" +"2019-07-20 02:40:27.631 UTC [chaincode] HandleGetState -> DEBU 2950 [45a41d79] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:27.632 UTC [stateleveldb] GetState -> DEBU 2951 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:27.632 UTC [chaincode] HandleTransaction -> DEBU 2952 [45a41d79] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:27.634 UTC [chaincode] handleMessage -> DEBU 2953 [45a41d79] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:27.634 UTC [chaincode] Notify -> DEBU 2954 [45a41d79] notifying Txid:45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, channelID:businesschannel" +"2019-07-20 02:40:27.634 UTC [chaincode] Execute -> DEBU 2955 Exit" +"2019-07-20 02:40:27.634 UTC [endorser] callChaincode -> INFO 2956 [businesschannel][45a41d79] Exit chaincode: name:"exp02" (9ms)" +"2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2957 Simulation completed, getting simulation results" +"2019-07-20 02:40:27.634 UTC [lockbasedtxmgr] Done -> DEBU 2958 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +"2019-07-20 02:40:27.635 UTC [endorser] SimulateProposal -> DEBU 2959 [businesschannel][45a41d79] Exit" +"2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295a [businesschannel][45a41d79] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.635 UTC [endorser] endorseProposal -> DEBU 295b [businesschannel][45a41d79] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:27.635 UTC [endorser] EndorseWithPlugin -> DEBU 295c Entering endorsement for {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" +"2019-07-20 02:40:27.635 UTC [msp.identity] Sign -> DEBU 295d Sign: plaintext: 0A206ADFF19A06A8EA4B5E0424063B24...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:27.636 UTC [msp.identity] Sign -> DEBU 295e Sign: digest: 8F0962501C35270F72ECE8639758C3F453AD626CECD34429CC2E661F87E2C9DE " +"2019-07-20 02:40:27.636 UTC [endorser] EndorseWithPlugin -> DEBU 295f Exiting {plugin: escc, channel: businesschannel, tx: 45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81, chaincode: exp02}" +"2019-07-20 02:40:27.636 UTC [endorser] endorseProposal -> DEBU 2960 [businesschannel][45a41d79] Exit" +"2019-07-20 02:40:27.636 UTC [lockbasedtxmgr] Done -> DEBU 2961 Done with transaction simulation / query execution [45a41d79e86d784d142522119b4780a763516f415ecff244bbd3b4663ad1ec81]" +"2019-07-20 02:40:27.637 UTC [endorser] func1 -> DEBU 2962 Exit: request from 172.18.0.9:58370" +"2019-07-20 02:40:27.637 UTC [comm.grpc.server] 1 -> INFO 2963 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58370 grpc.code=OK grpc.call_duration=86.3296ms +"2019-07-20 02:40:27.644 UTC [grpc] infof -> DEBU 2964 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:27.647 UTC [grpc] infof -> DEBU 2965 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:27.839 UTC [endorser] ProcessProposal -> DEBU 2966 Entering: request from 172.18.0.9:58374" +"2019-07-20 02:40:27.839 UTC [protoutils] ValidateProposalMessage -> DEBU 2967 ValidateProposalMessage starts for signed proposal 0xc0005976d0" +"2019-07-20 02:40:27.839 UTC [protoutils] validateChannelHeader -> DEBU 2968 validateChannelHeader info: header type 3" +"2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 2969 begin" +"2019-07-20 02:40:27.839 UTC [msp] GetManagerForChain -> DEBU 296a Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:27.839 UTC [protoutils] checkSignatureFromCreator -> DEBU 296b creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296c creator is valid" +"2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296d Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| +00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" +"2019-07-20 02:40:27.840 UTC [msp.identity] Verify -> DEBU 296e Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| +00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| +00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| +00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| +00000040 ba 33 01 2b 88 5d |.3.+.]|" +"2019-07-20 02:40:27.840 UTC [protoutils] checkSignatureFromCreator -> DEBU 296f exits successfully" +"2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2970 validateChaincodeProposalMessage starts for proposal 0xc000406fc0, header 0xc000597ae0" +"2019-07-20 02:40:27.841 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2971 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:27.841 UTC [endorser] preProcess -> DEBU 2972 [businesschannel][cf18601c] processing txid: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919" +"2019-07-20 02:40:27.842 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2973 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +"2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2974 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:27.843 UTC [aclmgmt] CheckACL -> DEBU 2975 acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.843 UTC [policies] Evaluate -> DEBU 2978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:27.843 UTC [cauthdsl] func1 -> DEBU 2979 0xc003493650 gate 1563590427843609300 evaluation starts" +"2019-07-20 02:40:27.843 UTC [cauthdsl] func2 -> DEBU 297a 0xc003493650 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297b 0xc003493650 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297c 0xc003493650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.844 UTC [cauthdsl] func2 -> DEBU 297d 0xc003493650 principal evaluation fails" +"2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 297e 0xc003493650 gate 1563590427843609300 evaluation fails" +"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 297f Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:27.844 UTC [policies] Evaluate -> DEBU 2981 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-07-20 02:40:27.844 UTC [cauthdsl] func1 -> DEBU 2982 0xc003493e90 gate 1563590427844684100 evaluation starts" +"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2983 0xc003493e90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2984 0xc003493e90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2985 0xc003493e90 principal matched by identity 0" +"2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2986 Verify: digest = 00000000 c3 11 3a ce 05 0b b6 c2 ee e7 c5 b9 8c 52 af 4f |..:..........R.O| +00000010 01 b8 4d b3 96 45 0d 73 57 33 f8 30 e7 f2 d8 85 |..M..E.sW3.0....|" +"2019-07-20 02:40:27.845 UTC [msp.identity] Verify -> DEBU 2987 Verify: sig = 00000000 30 44 02 20 55 6e 07 e3 f7 18 b8 fa 3e f3 8c 86 |0D. Un......>...| +00000010 20 be 8a 77 f9 6e 40 7a eb 3b c0 dc 85 c4 58 e1 | ..w.n@z.;....X.| +00000020 d3 ba f8 0c 02 20 43 86 89 2d 35 a2 bc 95 c0 b8 |..... C..-5.....| +00000030 dc 39 22 70 33 9a 19 9a 51 40 70 61 c8 73 dc 3f |.9"p3...Q@pa.s.?| +00000040 ba 33 01 2b 88 5d |.3.+.]|" +"2019-07-20 02:40:27.845 UTC [cauthdsl] func2 -> DEBU 2988 0xc003493e90 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.846 UTC [cauthdsl] func1 -> DEBU 2989 0xc003493e90 gate 1563590427844684100 evaluation succeeds" +"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298a Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:27.846 UTC [policies] Evaluate -> DEBU 298c Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:27.847 UTC [policies] Evaluate -> DEBU 298d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 298e constructing new tx simulator" +"2019-07-20 02:40:27.847 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 298f constructing new tx simulator txid = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +"2019-07-20 02:40:27.847 UTC [endorser] SimulateProposal -> DEBU 2990 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.847 UTC [stateleveldb] GetState -> DEBU 2991 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:27.847 UTC [ccprovider] GetChaincodeData -> DEBU 2992 Getting chaincode data for from cache" +"2019-07-20 02:40:27.848 UTC [endorser] callChaincode -> INFO 2993 [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.848 UTC [chaincode] Execute -> DEBU 2994 Entry" +"2019-07-20 02:40:27.850 UTC [chaincode] handleMessage -> DEBU 2995 [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2996 [cf18601c] handling GET_STATE from chaincode" +"2019-07-20 02:40:27.850 UTC [chaincode] HandleGetState -> DEBU 2997 [cf18601c] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:27.850 UTC [stateleveldb] GetState -> DEBU 2998 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:27.850 UTC [chaincode] HandleTransaction -> DEBU 2999 [cf18601c] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:27.851 UTC [chaincode] handleMessage -> DEBU 299a [cf18601c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:27.851 UTC [chaincode] HandleTransaction -> DEBU 299b [cf18601c] handling GET_STATE from chaincode" +"2019-07-20 02:40:27.852 UTC [chaincode] HandleGetState -> DEBU 299c [cf18601c] getting state for chaincode exp02, key b, channel businesschannel" +"2019-07-20 02:40:27.852 UTC [stateleveldb] GetState -> DEBU 299d GetState(). ns=exp02, key=b" +"2019-07-20 02:40:27.852 UTC [chaincode] HandleTransaction -> DEBU 299e [cf18601c] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:27.853 UTC [chaincode] handleMessage -> DEBU 299f [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:27.853 UTC [chaincode] HandleTransaction -> DEBU 29a0 [cf18601c] handling PUT_STATE from chaincode" +"2019-07-20 02:40:27.854 UTC [chaincode] HandleTransaction -> DEBU 29a1 [cf18601c] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:27.855 UTC [chaincode] handleMessage -> DEBU 29a2 [cf18601c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-07-20 02:40:27.855 UTC [chaincode] HandleTransaction -> DEBU 29a3 [cf18601c] handling PUT_STATE from chaincode" +"2019-07-20 02:40:27.856 UTC [chaincode] HandleTransaction -> DEBU 29a4 [cf18601c] Completed PUT_STATE. Sending RESPONSE" +"2019-07-20 02:40:27.858 UTC [chaincode] handleMessage -> DEBU 29a5 [cf18601c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:27.858 UTC [chaincode] Notify -> DEBU 29a6 [cf18601c] notifying Txid:cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, channelID:businesschannel" +"2019-07-20 02:40:27.858 UTC [chaincode] Execute -> DEBU 29a7 Exit" +"2019-07-20 02:40:27.859 UTC [endorser] callChaincode -> INFO 29a8 [businesschannel][cf18601c] Exit chaincode: name:"exp02" (11ms)" +"2019-07-20 02:40:27.859 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 29a9 Simulation completed, getting simulation results" +"2019-07-20 02:40:27.861 UTC [lockbasedtxmgr] Done -> DEBU 29aa Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +"2019-07-20 02:40:27.861 UTC [endorser] SimulateProposal -> DEBU 29ab [businesschannel][cf18601c] Exit" +"2019-07-20 02:40:27.861 UTC [endorser] endorseProposal -> DEBU 29ac [businesschannel][cf18601c] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:27.862 UTC [endorser] endorseProposal -> DEBU 29ad [businesschannel][cf18601c] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:27.862 UTC [endorser] EndorseWithPlugin -> DEBU 29ae Entering endorsement for {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" +"2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29af Sign: plaintext: 0A208F6E376BDBC55C3AA7239AA1D8FF...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:27.862 UTC [msp.identity] Sign -> DEBU 29b0 Sign: digest: C6E111A0177E2C9B0B87802FB0AF0B6B419E7EC6C5CFFDAFEC9A9218AC29ED00 " +"2019-07-20 02:40:27.863 UTC [endorser] EndorseWithPlugin -> DEBU 29b1 Exiting {plugin: escc, channel: businesschannel, tx: cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, chaincode: exp02}" +"2019-07-20 02:40:27.863 UTC [endorser] endorseProposal -> DEBU 29b2 [businesschannel][cf18601c] Exit" +"2019-07-20 02:40:27.863 UTC [lockbasedtxmgr] Done -> DEBU 29b3 Done with transaction simulation / query execution [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +"2019-07-20 02:40:27.863 UTC [endorser] func1 -> DEBU 29b4 Exit: request from 172.18.0.9:58374" +"2019-07-20 02:40:27.863 UTC [comm.grpc.server] 1 -> INFO 29b5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58374 grpc.code=OK grpc.call_duration=24.3051ms +"2019-07-20 02:40:27.897 UTC [grpc] infof -> DEBU 29b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:27.898 UTC [grpc] infof -> DEBU 29b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:27.932 UTC [gossip.comm] func1 -> DEBU 29b8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29b9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.933 UTC [gossip.gossip] handleMessage -> DEBU 29ba Exiting" +"2019-07-20 02:40:27.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29bb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bc Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:27.935 UTC [msp] DeserializeIdentity -> DEBU 29bd Obtaining identity" +"2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:27.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29bf Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:27.937 UTC [policies] Evaluate -> DEBU 29c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c4 0xc0037d00b0 gate 1563590427937259900 evaluation starts" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c5 0xc0037d00b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c6 0xc0037d00b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c7 0xc0037d00b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func2 -> DEBU 29c8 0xc0037d00b0 principal evaluation fails" +"2019-07-20 02:40:27.937 UTC [cauthdsl] func1 -> DEBU 29c9 0xc0037d00b0 gate 1563590427937259900 evaluation fails" +"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:27.938 UTC [policies] Evaluate -> DEBU 29cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:27.939 UTC [cauthdsl] func1 -> DEBU 29cd 0xc0037d08f0 gate 1563590427939010500 evaluation starts" +"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29ce 0xc0037d08f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29cf 0xc0037d08f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:27.939 UTC [cauthdsl] func2 -> DEBU 29d0 0xc0037d08f0 principal matched by identity 0" +"2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d1 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| +00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" +"2019-07-20 02:40:27.939 UTC [msp.identity] Verify -> DEBU 29d2 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| +00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| +00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| +00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 29d3 0xc0037d08f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:27.949 UTC [cauthdsl] func1 -> DEBU 29d4 0xc0037d08f0 gate 1563590427939010500 evaluation succeeds" +"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d7 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:27.949 UTC [policies] Evaluate -> DEBU 29d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:27.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 29d9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:27.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 29da Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29db updating membership: timestamp: " +"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dc Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29dd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:27.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 29de Exiting" +"2019-07-20 02:40:27.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29df Exiting" +"2019-07-20 02:40:27.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e0 Exiting" +"2019-07-20 02:40:27.951 UTC [gossip.discovery] sendMemResponse -> DEBU 29e1 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:27.951 UTC [msp] DeserializeIdentity -> DEBU 29e2 Obtaining identity" +"2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e3 Obtaining identity" +"2019-07-20 02:40:27.952 UTC [msp] DeserializeIdentity -> DEBU 29e4 Obtaining identity" +"2019-07-20 02:40:27.952 UTC [gossip.comm] Send -> DEBU 29e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:27.952 UTC [gossip.comm] sendToEndpoint -> DEBU 29e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.953 UTC [gossip.comm] sendToEndpoint -> DEBU 29e7 Exiting" +"2019-07-20 02:40:27.953 UTC [gossip.discovery] sendMemResponse -> DEBU 29e8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020&" signature:"0E\002!\000\251\007\300\017\0135\2727\3521\344z\333\245{\224\017\235.^\276M\246\346\263\372\265\377\3340a\260\002 b\352\337\306]\020Z\330\2028\231zTE:\222\226\347A\351\315gB\360\334\340\214V\250\355\027\332" > alive: alive: alive: " +"2019-07-20 02:40:27.964 UTC [gossip.comm] func1 -> DEBU 29e9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.964 UTC [gossip.gossip] handleMessage -> DEBU 29ea Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.965 UTC [gossip.pull] HandleMessage -> DEBU 29eb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ec Obtaining identity" +"2019-07-20 02:40:27.966 UTC [msp] DeserializeIdentity -> DEBU 29ed Obtaining identity" +"2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ee Obtaining identity" +"2019-07-20 02:40:27.967 UTC [msp] DeserializeIdentity -> DEBU 29ef Obtaining identity" +"2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f0 Obtaining identity" +"2019-07-20 02:40:27.968 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" +"2019-07-20 02:40:27.973 UTC [gossip.pull] SendDigest -> DEBU 29f2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:27.973 UTC [gossip.gossip] handleMessage -> DEBU 29f3 Exiting" +"2019-07-20 02:40:28.111 UTC [endorser] ProcessProposal -> DEBU 29f4 Entering: request from 172.18.0.9:58380" +"2019-07-20 02:40:28.111 UTC [protoutils] ValidateProposalMessage -> DEBU 29f5 ValidateProposalMessage starts for signed proposal 0xc00040e8c0" +"2019-07-20 02:40:28.111 UTC [protoutils] validateChannelHeader -> DEBU 29f6 validateChannelHeader info: header type 3" +"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f7 begin" +"2019-07-20 02:40:28.111 UTC [msp] GetManagerForChain -> DEBU 29f8 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:28.111 UTC [protoutils] checkSignatureFromCreator -> DEBU 29fa creator is valid" +"2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fb Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| +00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" +"2019-07-20 02:40:28.111 UTC [msp.identity] Verify -> DEBU 29fc Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 29fd exits successfully" +"2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29fe validateChaincodeProposalMessage starts for proposal 0xc00015e460, header 0xc00040ed20" +"2019-07-20 02:40:28.112 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29ff validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:28.112 UTC [endorser] preProcess -> DEBU 2a00 [businesschannel][cc800e57] processing txid: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0" +"2019-07-20 02:40:28.112 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a01 retrieveTransactionByID() - txId = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +"2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a02 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:28.112 UTC [aclmgmt] CheckACL -> DEBU 2a03 acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.112 UTC [policies] Evaluate -> DEBU 2a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:28.112 UTC [cauthdsl] func1 -> DEBU 2a07 0xc003dfe5b0 gate 1563590428112919900 evaluation starts" +"2019-07-20 02:40:28.112 UTC [cauthdsl] func2 -> DEBU 2a08 0xc003dfe5b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a09 0xc003dfe5b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.113 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc003dfe5b0 principal matched by identity 0" +"2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 f7 63 6d 9c e3 0f 6f 49 34 31 c5 75 f8 cc 73 59 |.cm...oI41.u..sY| +00000010 3e 44 6c 0a ca 0b fa 16 82 5a 9e 34 f7 de cc 56 |>Dl......Z.4...V|" +"2019-07-20 02:40:28.113 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 44 02 20 76 ce ba 3c 46 66 e0 65 1c c7 ae 70 |0D. v.. DEBU 2a0d 0xc003dfe5b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.113 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc003dfe5b0 gate 1563590428112919900 evaluation succeeds" +"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:28.113 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:28.113 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" +"2019-07-20 02:40:28.114 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +"2019-07-20 02:40:28.114 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:28.114 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:28.114 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" +"2019-07-20 02:40:28.114 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:28.114 UTC [chaincode] Execute -> DEBU 2a19 Entry" +"2019-07-20 02:40:28.115 UTC [chaincode] handleMessage -> DEBU 2a1a [cc800e57] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:28.115 UTC [chaincode] HandleTransaction -> DEBU 2a1b [cc800e57] handling GET_STATE from chaincode" +"2019-07-20 02:40:28.115 UTC [chaincode] HandleGetState -> DEBU 2a1c [cc800e57] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:28.116 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" +"2019-07-20 02:40:28.116 UTC [chaincode] HandleTransaction -> DEBU 2a1e [cc800e57] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:28.116 UTC [chaincode] handleMessage -> DEBU 2a1f [cc800e57] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:28.116 UTC [chaincode] Notify -> DEBU 2a20 [cc800e57] notifying Txid:cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, channelID:businesschannel" +"2019-07-20 02:40:28.116 UTC [chaincode] Execute -> DEBU 2a21 Exit" +"2019-07-20 02:40:28.116 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][cc800e57] Exit chaincode: name:"exp02" (2ms)" +"2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" +"2019-07-20 02:40:28.117 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +"2019-07-20 02:40:28.117 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][cc800e57] Exit" +"2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][cc800e57] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:28.117 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][cc800e57] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:28.117 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" +"2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A203057560B0313BBF17756CE01CD7D...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:28.117 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: 6133F8EA9F116FF8A82DC6B0FBFF17BB6F8709BD253A81A79A71CB31DE79DE43 " +"2019-07-20 02:40:28.118 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0, chaincode: exp02}" +"2019-07-20 02:40:28.118 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][cc800e57] Exit" +"2019-07-20 02:40:28.118 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [cc800e576f7159a06f245e5b95fbd6d8f1110f4ac0d989bf718e2a537e328ce0]" +"2019-07-20 02:40:28.118 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.9:58380" +"2019-07-20 02:40:28.118 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58380 grpc.code=OK grpc.call_duration=7.2891ms +"2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:28.121 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:28.256 UTC [gossip.pull] Hello -> DEBU 2a32 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:28.257 UTC [gossip.comm] Send -> DEBU 2a33 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.259 UTC [gossip.pull] Hello -> DEBU 2a34 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:28.259 UTC [gossip.comm] Send -> DEBU 2a35 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.260 UTC [gossip.pull] Hello -> DEBU 2a36 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:28.260 UTC [gossip.comm] Send -> DEBU 2a37 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a38 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.261 UTC [gossip.comm] sendToEndpoint -> DEBU 2a39 Exiting" +"2019-07-20 02:40:28.263 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3d Exiting" +"2019-07-20 02:40:28.264 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.265 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3e Exiting" +"2019-07-20 02:40:28.264 UTC [gossip.comm] func1 -> DEBU 2a3c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.265 UTC [gossip.gossip] handleMessage -> DEBU 2a3f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.266 UTC [gossip.pull] HandleMessage -> DEBU 2a40 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.266 UTC [gossip.gossip] handleMessage -> DEBU 2a41 Exiting" +"2019-07-20 02:40:28.266 UTC [gossip.comm] func1 -> DEBU 2a42 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a43 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.267 UTC [gossip.pull] HandleMessage -> DEBU 2a44 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.267 UTC [gossip.comm] func1 -> DEBU 2a45 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.267 UTC [gossip.gossip] handleMessage -> DEBU 2a46 Exiting" +"2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.268 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.268 UTC [gossip.gossip] handleMessage -> DEBU 2a49 Exiting" +"2019-07-20 02:40:28.297 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4a Obtaining default signing identity" +"2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4b Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151023 " +"2019-07-20 02:40:28.298 UTC [msp.identity] Sign -> DEBU 2a4c Sign: digest: DD566ACBCC6F0F4BF5C93A6D9969AB3470634D6F878390F8EAAA43682E300636 " +"2019-07-20 02:40:28.299 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a4d Obtaining default signing identity" +"2019-07-20 02:40:28.299 UTC [msp.identity] Sign -> DEBU 2a4e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:28.300 UTC [msp.identity] Sign -> DEBU 2a4f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:28.300 UTC [gossip.comm] Send -> DEBU 2a50 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.301 UTC [msp] DeserializeIdentity -> DEBU 2a51 Obtaining identity" +"2019-07-20 02:40:28.301 UTC [gossip.comm] Send -> DEBU 2a52 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.302 UTC [gossip.comm] sendToEndpoint -> DEBU 2a54 Exiting" +"2019-07-20 02:40:28.302 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" +"2019-07-20 02:40:28.302 UTC [gossip.comm] Send -> DEBU 2a56 Entering, sending GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.303 UTC [gossip.comm] sendToEndpoint -> DEBU 2a58 Exiting" +"2019-07-20 02:40:28.305 UTC [gossip.comm] func1 -> DEBU 2a59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.305 UTC [gossip.gossip] handleMessage -> DEBU 2a5b Exiting" +"2019-07-20 02:40:28.305 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.305 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:9\025\030\\\204{\325/\032UG\260*\335\005x\001\213\265T\350#1L\255 " > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.306 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Exiting" +"2019-07-20 02:40:28.306 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a5e Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a60 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.311 UTC [gossip.gossip] handleMessage -> DEBU 2a61 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.311 UTC [gossip.comm] func1 -> DEBU 2a62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.311 UTC [msp.identity] Verify -> DEBU 2a63 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +"2019-07-20 02:40:28.312 UTC [msp.identity] Verify -> DEBU 2a64 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +"2019-07-20 02:40:28.312 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a65 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.312 UTC [gossip.discovery] isSentByMe -> DEBU 2a66 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a67 Exiting" +"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a68 Exiting" +"2019-07-20 02:40:28.313 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6a Exiting" +"2019-07-20 02:40:28.314 UTC [gossip.gossip] handleMessage -> DEBU 2a6c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.314 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a6b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:28.314 UTC [msp.identity] Verify -> DEBU 2a6d Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +"2019-07-20 02:40:28.315 UTC [msp.identity] Verify -> DEBU 2a6e Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +"2019-07-20 02:40:28.315 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a6f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.316 UTC [gossip.discovery] isSentByMe -> DEBU 2a70 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.316 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a71 Exiting" +"2019-07-20 02:40:28.316 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a72 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:28.316 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" +"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a74 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a75 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.317 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a76 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.317 UTC [policies] Evaluate -> DEBU 2a79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7a 0xc0004eff30 gate 1563590428318061300 evaluation starts" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7b 0xc0004eff30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7c 0xc0004eff30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7d 0xc0004eff30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func2 -> DEBU 2a7e 0xc0004eff30 principal evaluation fails" +"2019-07-20 02:40:28.318 UTC [cauthdsl] func1 -> DEBU 2a7f 0xc0004eff30 gate 1563590428318061300 evaluation fails" +"2019-07-20 02:40:28.318 UTC [policies] Evaluate -> DEBU 2a80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.319 UTC [policies] Evaluate -> DEBU 2a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.319 UTC [cauthdsl] func1 -> DEBU 2a83 0xc000556770 gate 1563590428319543900 evaluation starts" +"2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a84 0xc000556770 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.319 UTC [cauthdsl] func2 -> DEBU 2a85 0xc000556770 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.320 UTC [cauthdsl] func2 -> DEBU 2a86 0xc000556770 principal matched by identity 0" +"2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a87 Verify: digest = 00000000 44 7e e5 24 1a e0 8b 4c c7 85 ea 43 02 f3 73 0d |D~.$...L...C..s.| +00000010 ee 85 7e 9c cb af b6 05 57 83 87 05 7e 4e 25 d8 |..~.....W...~N%.|" +"2019-07-20 02:40:28.320 UTC [msp.identity] Verify -> DEBU 2a88 Verify: sig = 00000000 30 44 02 20 2b bf 05 66 a2 a0 25 38 81 fc 86 73 |0D. +..f..%8...s| +00000010 dc 3f 28 4b b8 b5 54 d8 cc e7 30 66 79 20 f8 b0 |.?(K..T...0fy ..| +00000020 6e b4 c1 23 02 20 50 86 69 b7 c5 1f 6d 81 53 81 |n..#. P.i...m.S.| +00000030 3c 67 7b 04 48 0a f7 1a 05 79 1c 48 a9 70 09 49 | DEBU 2a89 0xc000556770 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.320 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc000556770 gate 1563590428319543900 evaluation succeeds" +"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.321 UTC [policies] Evaluate -> DEBU 2a8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.321 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a8f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a90 Exiting" +"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a91 Exiting" +"2019-07-20 02:40:28.322 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a92 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.322 UTC [gossip.gossip] handleMessage -> DEBU 2a93 Exiting" +"2019-07-20 02:40:28.323 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a94 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:28.324 UTC [msp.identity] Verify -> DEBU 2a95 Verify: digest = 00000000 dd 56 6a cb cc 6f 0f 4b f5 c9 3a 6d 99 69 ab 34 |.Vj..o.K..:m.i.4| +00000010 70 63 4d 6f 87 83 90 f8 ea aa 43 68 2e 30 06 36 |pcMo......Ch.0.6|" +"2019-07-20 02:40:28.326 UTC [msp.identity] Verify -> DEBU 2a96 Verify: sig = 00000000 30 45 02 21 00 ba 6a 1a d5 50 f5 2d 82 1a 0b 09 |0E.!..j..P.-....| +00000010 b2 77 bf fa c1 2c 6d 3f 58 fb c0 3d 84 00 6c 09 |.w...,m?X..=..l.| +00000020 1e 94 f5 62 33 02 20 0a 9d ce a8 1b 3e 39 15 18 |...b3. .....>9..| +00000030 5c 84 7b d5 2f 1a 55 47 b0 2a dd 05 78 01 8b b5 |\.{./.UG.*..x...| +00000040 54 e8 23 31 4c ad 20 |T.#1L. |" +"2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a97 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:28.327 UTC [msp.identity] Verify -> DEBU 2a98 Verify: sig = 00000000 30 45 02 21 00 ad 7b 41 8f d5 3d 54 c2 64 5f 84 |0E.!..{A..=T.d_.| +00000010 05 26 86 79 15 e2 67 05 70 51 4e e3 47 b4 f3 8a |.&.y..g.pQN.G...| +00000020 a3 1a 1a a3 7a 02 20 76 54 21 e8 2d e2 d2 d3 47 |....z. vT!.-...G| +00000030 65 80 54 e2 59 47 47 d3 ee 0b c4 f4 bc 92 51 fc |e.T.YGG.......Q.| +00000040 6b 5e 10 f1 dc fd 42 |k^....B|" +"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:28.327 UTC [gossip.discovery] isSentByMe -> DEBU 2a9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Exiting" +"2019-07-20 02:40:28.327 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a9c Exiting" +"2019-07-20 02:40:28.367 UTC [gossip.comm] func1 -> DEBU 2a9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.368 UTC [gossip.gossip] handleMessage -> DEBU 2a9e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.368 UTC [gossip.pull] HandleMessage -> DEBU 2a9f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.369 UTC [gossip.pull] SendDigest -> DEBU 2aa0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:28.369 UTC [gossip.gossip] handleMessage -> DEBU 2aa1 Exiting" +"2019-07-20 02:40:28.389 UTC [gossip.comm] func1 -> DEBU 2aa2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.389 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.390 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" +"2019-07-20 02:40:28.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.394 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +"2019-07-20 02:40:28.394 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +00000040 26 61 82 2d 44 90 |&a.-D.|" +"2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aa9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:28.395 UTC [msp.identity] Verify -> DEBU 2aaa Verify: sig = 00000000 30 45 02 21 00 f5 8a 76 70 1b 9e 13 5b bc 43 19 |0E.!...vp...[.C.| +00000010 06 6f c9 d9 d1 12 64 6a 6c 56 fd 82 e1 aa 45 37 |.o....djlV....E7| +00000020 94 52 38 8e 4a 02 20 32 69 7f 61 06 4a 6c 28 0e |.R8.J. 2i.a.Jl(.| +00000030 1a 1c 48 26 9b a1 07 62 f4 21 8b e4 98 7b ff e0 |..H&...b.!...{..| +00000040 d1 fd 28 be 2f 8e af |..(./..|" +"2019-07-20 02:40:28.396 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aab Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aac Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aad updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aae Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:28.396 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aaf Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:28.397 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ab0 Exiting" +"2019-07-20 02:40:28.397 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab1 Exiting" +"2019-07-20 02:40:28.398 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:28.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ab3 Exiting" +"2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab4 Obtaining identity" +"2019-07-20 02:40:28.398 UTC [msp] DeserializeIdentity -> DEBU 2ab5 Obtaining identity" +"2019-07-20 02:40:28.398 UTC [gossip.comm] Send -> DEBU 2ab6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.399 UTC [gossip.discovery] sendMemResponse -> DEBU 2ab7 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" secret_envelope: > alive: " +"2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.399 UTC [gossip.comm] sendToEndpoint -> DEBU 2ab9 Exiting" +"2019-07-20 02:40:28.554 UTC [gossip.comm] func1 -> DEBU 2aba Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.555 UTC [gossip.gossip] handleMessage -> DEBU 2abb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.555 UTC [gossip.pull] HandleMessage -> DEBU 2abc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abd Obtaining identity" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abe Obtaining identity" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2abf Obtaining identity" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac0 Obtaining identity" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac1 Obtaining identity" +"2019-07-20 02:40:28.555 UTC [msp] DeserializeIdentity -> DEBU 2ac2 Obtaining identity" +"2019-07-20 02:40:28.557 UTC [gossip.pull] SendDigest -> DEBU 2ac3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:28.557 UTC [gossip.gossip] handleMessage -> DEBU 2ac4 Exiting" +"2019-07-20 02:40:28.568 UTC [gossip.comm] func1 -> DEBU 2ac5 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.568 UTC [gossip.gossip] handleMessage -> DEBU 2ac7 Exiting" +"2019-07-20 02:40:28.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac8 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.568 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ac9 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:28.568 UTC [msp] DeserializeIdentity -> DEBU 2aca Obtaining identity" +"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2acb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.568 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2acd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ace == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2acf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.568 UTC [policies] Evaluate -> DEBU 2ad0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.568 UTC [cauthdsl] func1 -> DEBU 2ad1 0xc0034f2890 gate 1563590428568875200 evaluation starts" +"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad2 0xc0034f2890 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad3 0xc0034f2890 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.568 UTC [cauthdsl] func2 -> DEBU 2ad4 0xc0034f2890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ad5 0xc0034f2890 principal evaluation fails" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ad6 0xc0034f2890 gate 1563590428568875200 evaluation fails" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ad9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ada 0xc0034f30d0 gate 1563590428569180700 evaluation starts" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0034f30d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0034f30d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2add 0xc0034f30d0 principal matched by identity 0" +"2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2ade Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| +00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" +"2019-07-20 02:40:28.569 UTC [msp.identity] Verify -> DEBU 2adf Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| +00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| +00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| +00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| +00000040 73 f1 a6 87 33 15 00 |s...3..|" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func2 -> DEBU 2ae0 0xc0034f30d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.569 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0034f30d0 gate 1563590428569180700 evaluation succeeds" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.569 UTC [policies] Evaluate -> DEBU 2ae5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 updating membership: timestamp: " +"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae9 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] learnExistingMembers -> DEBU 2aeb Exiting" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aec Exiting" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aed Exiting" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2aee Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2aef Obtaining identity" +"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af0 Obtaining identity" +"2019-07-20 02:40:28.570 UTC [msp] DeserializeIdentity -> DEBU 2af1 Obtaining identity" +"2019-07-20 02:40:28.570 UTC [gossip.comm] Send -> DEBU 2af2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.570 UTC [gossip.discovery] sendMemResponse -> DEBU 2af3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive: alive: " +"2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2af5 Exiting" +"2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +"2019-07-20 02:40:28.719 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" +"2019-07-20 02:40:28.720 UTC [gossip.comm] Send -> DEBU 2af8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2af9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afa Exiting" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afc Exiting" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.720 UTC [gossip.comm] sendToEndpoint -> DEBU 2afe Exiting" +"2019-07-20 02:40:28.723 UTC [gossip.comm] func1 -> DEBU 2aff Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.727 UTC [gossip.gossip] handleMessage -> DEBU 2b00 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.728 UTC [gossip.comm] func1 -> DEBU 2b01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.731 UTC [gossip.comm] func1 -> DEBU 2b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b03 Obtaining identity" +"2019-07-20 02:40:28.733 UTC [msp] DeserializeIdentity -> DEBU 2b05 Obtaining identity" +"2019-07-20 02:40:28.734 UTC [gossip.comm] Send -> DEBU 2b06 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b07 Obtaining identity" +"2019-07-20 02:40:28.734 UTC [msp] DeserializeIdentity -> DEBU 2b08 Obtaining identity" +"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0a Exiting" +"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.735 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0c Exiting" +"2019-07-20 02:40:28.734 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.733 UTC [msp.identity] Verify -> DEBU 2b04 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +"2019-07-20 02:40:28.736 UTC [msp.identity] Verify -> DEBU 2b0f Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +"2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b10 Obtaining identity" +"2019-07-20 02:40:28.736 UTC [msp] DeserializeIdentity -> DEBU 2b11 Obtaining identity" +"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b13 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b14 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.737 UTC [policies] Evaluate -> DEBU 2b16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b18 0xc0032f5cb0 gate 1563590428738122700 evaluation starts" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b19 0xc0032f5cb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1a 0xc0032f5cb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1b 0xc0032f5cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func2 -> DEBU 2b1c 0xc0032f5cb0 principal evaluation fails" +"2019-07-20 02:40:28.738 UTC [cauthdsl] func1 -> DEBU 2b1d 0xc0032f5cb0 gate 1563590428738122700 evaluation fails" +"2019-07-20 02:40:28.738 UTC [policies] Evaluate -> DEBU 2b1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.739 UTC [policies] Evaluate -> DEBU 2b20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.739 UTC [cauthdsl] func1 -> DEBU 2b21 0xc003ba24f0 gate 1563590428739538400 evaluation starts" +"2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b22 0xc003ba24f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.739 UTC [cauthdsl] func2 -> DEBU 2b23 0xc003ba24f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.741 UTC [cauthdsl] func2 -> DEBU 2b24 0xc003ba24f0 principal matched by identity 0" +"2019-07-20 02:40:28.741 UTC [msp.identity] Verify -> DEBU 2b25 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +"2019-07-20 02:40:28.736 UTC [gossip.comm] sendToEndpoint -> DEBU 2b0e Exiting" +"2019-07-20 02:40:28.745 UTC [msp.identity] Verify -> DEBU 2b26 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +"2019-07-20 02:40:28.746 UTC [cauthdsl] func2 -> DEBU 2b27 0xc003ba24f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.746 UTC [cauthdsl] func1 -> DEBU 2b28 0xc003ba24f0 gate 1563590428739538400 evaluation succeeds" +"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.747 UTC [policies] Evaluate -> DEBU 2b2b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.748 UTC [policies] Evaluate -> DEBU 2b2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.748 UTC [msp] DeserializeIdentity -> DEBU 2b2d Obtaining identity" +"2019-07-20 02:40:28.749 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" +"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b30 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b31 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.751 UTC [policies] Evaluate -> DEBU 2b34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.752 UTC [cauthdsl] func1 -> DEBU 2b35 0xc003ba3cc0 gate 1563590428752408800 evaluation starts" +"2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b36 0xc003ba3cc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.752 UTC [cauthdsl] func2 -> DEBU 2b37 0xc003ba3cc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b38 0xc003ba3cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.753 UTC [cauthdsl] func2 -> DEBU 2b39 0xc003ba3cc0 principal evaluation fails" +"2019-07-20 02:40:28.753 UTC [cauthdsl] func1 -> DEBU 2b3a 0xc003ba3cc0 gate 1563590428752408800 evaluation fails" +"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.753 UTC [policies] Evaluate -> DEBU 2b3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.754 UTC [cauthdsl] func1 -> DEBU 2b3e 0xc003d68500 gate 1563590428754307100 evaluation starts" +"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b3f 0xc003d68500 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b40 0xc003d68500 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.754 UTC [cauthdsl] func2 -> DEBU 2b41 0xc003d68500 principal matched by identity 0" +"2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b42 Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:28.754 UTC [msp.identity] Verify -> DEBU 2b43 Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:28.755 UTC [cauthdsl] func2 -> DEBU 2b44 0xc003d68500 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.755 UTC [cauthdsl] func1 -> DEBU 2b45 0xc003d68500 gate 1563590428754307100 evaluation succeeds" +"2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.755 UTC [policies] Evaluate -> DEBU 2b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b48 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.756 UTC [policies] Evaluate -> DEBU 2b49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.757 UTC [msp.identity] Verify -> DEBU 2b4a Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b4b Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.757 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b4d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.757 UTC [policies] Evaluate -> DEBU 2b4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.758 UTC [policies] Evaluate -> DEBU 2b50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.758 UTC [cauthdsl] func1 -> DEBU 2b51 0xc003d69c00 gate 1563590428758639500 evaluation starts" +"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003d69c00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b53 0xc003d69c00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.759 UTC [cauthdsl] func2 -> DEBU 2b54 0xc003d69c00 principal matched by identity 0" +"2019-07-20 02:40:28.759 UTC [msp.identity] Verify -> DEBU 2b55 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2b56 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:28.760 UTC [cauthdsl] func2 -> DEBU 2b57 0xc003d69c00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.760 UTC [cauthdsl] func1 -> DEBU 2b58 0xc003d69c00 gate 1563590428758639500 evaluation succeeds" +"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b59 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.760 UTC [policies] Evaluate -> DEBU 2b5b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.761 UTC [policies] Evaluate -> DEBU 2b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.761 UTC [gossip.gossip] handleMessage -> DEBU 2b5d Exiting" +"2019-07-20 02:40:28.762 UTC [gossip.gossip] handleMessage -> DEBU 2b5f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b60 Obtaining identity" +"2019-07-20 02:40:28.761 UTC [msp] DeserializeIdentity -> DEBU 2b5e Obtaining identity" +"2019-07-20 02:40:28.762 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" +"2019-07-20 02:40:28.763 UTC [gossip.pull] Hello -> DEBU 2b62 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b63 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +"2019-07-20 02:40:28.763 UTC [msp.identity] Verify -> DEBU 2b64 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +"2019-07-20 02:40:28.763 UTC [msp] DeserializeIdentity -> DEBU 2b65 Obtaining identity" +"2019-07-20 02:40:28.764 UTC [msp] DeserializeIdentity -> DEBU 2b66 Obtaining identity" +"2019-07-20 02:40:28.764 UTC [gossip.comm] Send -> DEBU 2b67 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b68 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.764 UTC [gossip.comm] sendToEndpoint -> DEBU 2b69 Exiting" +"2019-07-20 02:40:28.765 UTC [gossip.comm] func1 -> DEBU 2b6a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6b Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:28.765 UTC [msp.identity] Verify -> DEBU 2b6c Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6d Obtaining identity" +"2019-07-20 02:40:28.766 UTC [msp] DeserializeIdentity -> DEBU 2b6e Obtaining identity" +"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b70 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.767 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b71 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.767 UTC [policies] Evaluate -> DEBU 2b72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.768 UTC [policies] Evaluate -> DEBU 2b74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.768 UTC [cauthdsl] func1 -> DEBU 2b75 0xc0039e9890 gate 1563590428768410700 evaluation starts" +"2019-07-20 02:40:28.768 UTC [cauthdsl] func2 -> DEBU 2b76 0xc0039e9890 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b77 0xc0039e9890 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b78 0xc0039e9890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b79 0xc0039e9890 principal evaluation fails" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7a 0xc0039e9890 gate 1563590428768410700 evaluation fails" +"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.769 UTC [policies] Evaluate -> DEBU 2b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func1 -> DEBU 2b7e 0xc003efa0d0 gate 1563590428769550200 evaluation starts" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b7f 0xc003efa0d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b80 0xc003efa0d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.769 UTC [cauthdsl] func2 -> DEBU 2b81 0xc003efa0d0 principal matched by identity 0" +"2019-07-20 02:40:28.769 UTC [msp.identity] Verify -> DEBU 2b82 Verify: digest = 00000000 db d9 6c 3d ae b2 49 9b 1e bc fa dd 1a 19 c7 e0 |..l=..I.........| +00000010 6b 77 83 42 4d 11 be 12 34 d4 87 49 19 f3 77 ad |kw.BM...4..I..w.|" +"2019-07-20 02:40:28.770 UTC [msp.identity] Verify -> DEBU 2b83 Verify: sig = 00000000 30 45 02 21 00 d9 5e 71 f9 e9 e6 01 88 b5 d5 9c |0E.!..^q........| +00000010 60 d8 f8 a8 ce a6 cb 90 fe fe f6 36 a5 a7 cf f6 |`..........6....| +00000020 b9 b8 e9 05 0f 02 20 64 ea 6c ea 74 60 22 6f 59 |...... d.l.t`"oY| +00000030 89 9b 5e 45 97 9b 3d 5d 99 cd d9 00 85 70 d0 13 |..^E..=].....p..| +00000040 7d 24 3e 32 e1 7c 1e |}$>2.|.|" +"2019-07-20 02:40:28.770 UTC [cauthdsl] func2 -> DEBU 2b84 0xc003efa0d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.770 UTC [cauthdsl] func1 -> DEBU 2b85 0xc003efa0d0 gate 1563590428769550200 evaluation succeeds" +"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.770 UTC [policies] Evaluate -> DEBU 2b88 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.771 UTC [policies] Evaluate -> DEBU 2b89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8a Obtaining identity" +"2019-07-20 02:40:28.771 UTC [msp] DeserializeIdentity -> DEBU 2b8b Obtaining identity" +"2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.772 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b8e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.772 UTC [policies] Evaluate -> DEBU 2b91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.772 UTC [cauthdsl] func1 -> DEBU 2b92 0xc003efb8a0 gate 1563590428772520400 evaluation starts" +"2019-07-20 02:40:28.772 UTC [cauthdsl] func2 -> DEBU 2b93 0xc003efb8a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b94 0xc003efb8a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.773 UTC [cauthdsl] func2 -> DEBU 2b95 0xc003efb8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.774 UTC [cauthdsl] func2 -> DEBU 2b96 0xc003efb8a0 principal evaluation fails" +"2019-07-20 02:40:28.774 UTC [cauthdsl] func1 -> DEBU 2b97 0xc003efb8a0 gate 1563590428772520400 evaluation fails" +"2019-07-20 02:40:28.774 UTC [policies] Evaluate -> DEBU 2b98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.775 UTC [policies] Evaluate -> DEBU 2b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.775 UTC [cauthdsl] func1 -> DEBU 2b9b 0xc0006be0e0 gate 1563590428775611400 evaluation starts" +"2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9c 0xc0006be0e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.775 UTC [cauthdsl] func2 -> DEBU 2b9d 0xc0006be0e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.776 UTC [cauthdsl] func2 -> DEBU 2b9e 0xc0006be0e0 principal matched by identity 0" +"2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2b9f Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:28.776 UTC [msp.identity] Verify -> DEBU 2ba0 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:28.777 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc0006be0e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.778 UTC [cauthdsl] func1 -> DEBU 2ba2 0xc0006be0e0 gate 1563590428775611400 evaluation succeeds" +"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.778 UTC [policies] Evaluate -> DEBU 2ba6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.778 UTC [msp] DeserializeIdentity -> DEBU 2ba7 Obtaining identity" +"2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ba9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.779 UTC [policies] Evaluate -> DEBU 2bac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.779 UTC [cauthdsl] func1 -> DEBU 2bad 0xc0006bf1c0 gate 1563590428779691300 evaluation starts" +"2019-07-20 02:40:28.779 UTC [cauthdsl] func2 -> DEBU 2bae 0xc0006bf1c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2baf 0xc0006bf1c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb0 0xc0006bf1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb1 0xc0006bf1c0 principal evaluation fails" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb2 0xc0006bf1c0 gate 1563590428779691300 evaluation fails" +"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.780 UTC [policies] Evaluate -> DEBU 2bb5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func1 -> DEBU 2bb6 0xc0006bfa00 gate 1563590428780810500 evaluation starts" +"2019-07-20 02:40:28.780 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0006bfa00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0006bfa00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc0006bfa00 principal matched by identity 0" +"2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bba Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:28.781 UTC [msp.identity] Verify -> DEBU 2bbb Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:28.781 UTC [cauthdsl] func2 -> DEBU 2bbc 0xc0006bfa00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.781 UTC [cauthdsl] func1 -> DEBU 2bbd 0xc0006bfa00 gate 1563590428780810500 evaluation succeeds" +"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc0 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.782 UTC [policies] Evaluate -> DEBU 2bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc2 Exiting" +"2019-07-20 02:40:28.782 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.782 UTC [msp] DeserializeIdentity -> DEBU 2bc4 Obtaining identity" +"2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc5 Verify: digest = 00000000 bf 89 a0 c2 15 f2 1f 47 a9 0a e4 fe ce 47 c8 59 |.......G.....G.Y| +00000010 80 12 a6 2d 55 bb ca d5 7d a7 44 9b e3 2b d4 f1 |...-U...}.D..+..|" +"2019-07-20 02:40:28.783 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: sig = 00000000 30 45 02 21 00 b9 b7 83 c5 c8 3c c7 34 17 fc d5 |0E.!......<.4...| +00000010 2d 36 6b c6 96 96 36 5b 19 23 6f 02 df 1b f3 db |-6k...6[.#o.....| +00000020 81 32 78 a5 a7 02 20 1f b2 d4 a3 2b e3 65 50 96 |.2x... ....+.eP.| +00000030 f2 21 04 5f 2d 4f 65 29 7e f2 dd de aa cb a0 39 |.!._-Oe)~......9| +00000040 bb 08 c9 6d 24 57 fb |...m$W.|" +"2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc7 Verify: digest = 00000000 9d b1 99 b0 98 03 8e 3d 8d a0 64 c9 ca 82 d1 e9 |.......=..d.....| +00000010 8a 24 0c 94 e8 af 09 8f b3 f4 94 84 4e 9f 10 04 |.$..........N...|" +"2019-07-20 02:40:28.784 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 56 44 b0 15 dd 07 11 c5 d7 08 ef 56 |0D. VD.........V| +00000010 ef 93 39 b0 a5 5c ea 17 11 0e 4c 38 8d 5a 70 2f |..9..\....L8.Zp/| +00000020 45 d8 d0 5d 02 20 3e 37 f6 61 25 63 27 37 cf de |E..]. >7.a%c'7..| +00000030 38 48 9c 7c 92 fb a9 2f 2d 53 e1 69 02 77 ab e6 |8H.|.../-S.i.w..| +00000040 93 08 2f 55 cd 66 |../U.f|" +"2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +"2019-07-20 02:40:28.784 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" +"2019-07-20 02:40:28.784 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.785 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.785 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.785 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0007fc350 gate 1563590428785776500 evaluation starts" +"2019-07-20 02:40:28.785 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0007fc350 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0007fc350 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0007fc350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.786 UTC [cauthdsl] func2 -> DEBU 2bd5 0xc0007fc350 principal evaluation fails" +"2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bd6 0xc0007fc350 gate 1563590428785776500 evaluation fails" +"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.786 UTC [policies] Evaluate -> DEBU 2bd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.786 UTC [cauthdsl] func1 -> DEBU 2bda 0xc0007fcb90 gate 1563590428786851300 evaluation starts" +"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc0007fcb90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdc 0xc0007fcb90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.787 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc0007fcb90 principal matched by identity 0" +"2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bde Verify: digest = 00000000 a6 7c f8 e4 a9 6a f3 1b 94 84 03 dc 4d 39 0e 0a |.|...j......M9..| +00000010 a4 52 43 bd 89 d1 45 19 95 c7 7a 22 f7 c9 47 64 |.RC...E...z"..Gd|" +"2019-07-20 02:40:28.787 UTC [msp.identity] Verify -> DEBU 2bdf Verify: sig = 00000000 30 44 02 20 17 df 2c 2b d3 35 57 7a ad f1 b8 58 |0D. ..,+.5Wz...X| +00000010 6d a8 54 28 32 e1 5d 6e b0 e0 60 a5 b5 49 cf 90 |m.T(2.]n..`..I..| +00000020 25 ab 51 22 02 20 10 2e 5e 4d 2c 32 b0 7f d8 4d |%.Q". ..^M,2...M| +00000030 bc 9e 1b b4 a0 f0 8b cc b2 1a 85 40 87 b7 32 45 |...........@..2E| +00000040 a3 bb 17 85 f1 b2 |......|" +"2019-07-20 02:40:28.788 UTC [cauthdsl] func2 -> DEBU 2be0 0xc0007fcb90 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.788 UTC [cauthdsl] func1 -> DEBU 2be1 0xc0007fcb90 gate 1563590428786851300 evaluation succeeds" +"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.788 UTC [policies] Evaluate -> DEBU 2be5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.788 UTC [msp] DeserializeIdentity -> DEBU 2be6 Obtaining identity" +"2019-07-20 02:40:28.789 UTC [msp] DeserializeIdentity -> DEBU 2be7 Obtaining identity" +"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.789 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bea Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.789 UTC [policies] Evaluate -> DEBU 2beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.790 UTC [policies] Evaluate -> DEBU 2bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.791 UTC [cauthdsl] func1 -> DEBU 2bee 0xc00080a360 gate 1563590428791136600 evaluation starts" +"2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bef 0xc00080a360 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.791 UTC [cauthdsl] func2 -> DEBU 2bf0 0xc00080a360 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf1 0xc00080a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.793 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc00080a360 principal evaluation fails" +"2019-07-20 02:40:28.793 UTC [cauthdsl] func1 -> DEBU 2bf3 0xc00080a360 gate 1563590428791136600 evaluation fails" +"2019-07-20 02:40:28.793 UTC [policies] Evaluate -> DEBU 2bf4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.794 UTC [policies] Evaluate -> DEBU 2bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.794 UTC [cauthdsl] func1 -> DEBU 2bf7 0xc00080aba0 gate 1563590428794390900 evaluation starts" +"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf8 0xc00080aba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bf9 0xc00080aba0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.794 UTC [cauthdsl] func2 -> DEBU 2bfa 0xc00080aba0 principal matched by identity 0" +"2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfb Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +"2019-07-20 02:40:28.794 UTC [msp.identity] Verify -> DEBU 2bfc Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2bfd 0xc00080aba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.795 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc00080aba0 gate 1563590428794390900 evaluation succeeds" +"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2bff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c00 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c01 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.795 UTC [policies] Evaluate -> DEBU 2c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.795 UTC [msp] DeserializeIdentity -> DEBU 2c03 Obtaining identity" +"2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c04 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.796 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c05 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:28.796 UTC [policies] Evaluate -> DEBU 2c08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:28.796 UTC [cauthdsl] func1 -> DEBU 2c09 0xc00080bc80 gate 1563590428796725600 evaluation starts" +"2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0a 0xc00080bc80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.796 UTC [cauthdsl] func2 -> DEBU 2c0b 0xc00080bc80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0c 0xc00080bc80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:28.797 UTC [cauthdsl] func2 -> DEBU 2c0d 0xc00080bc80 principal evaluation fails" +"2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c0e 0xc00080bc80 gate 1563590428796725600 evaluation fails" +"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c0f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:28.797 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:28.797 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0028aa4c0 gate 1563590428797791000 evaluation starts" +"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c13 0xc0028aa4c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0028aa4c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:28.798 UTC [cauthdsl] func2 -> DEBU 2c15 0xc0028aa4c0 principal matched by identity 0" +"2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +"2019-07-20 02:40:28.798 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2c18 0xc0028aa4c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:28.798 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0028aa4c0 gate 1563590428797791000 evaluation succeeds" +"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:28.799 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1e Exiting" +"2019-07-20 02:40:28.799 UTC [gossip.gossip] handleMessage -> DEBU 2c1f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.799 UTC [gossip.pull] HandleMessage -> DEBU 2c20 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.800 UTC [gossip.gossip] handleMessage -> DEBU 2c21 Exiting" +"2019-07-20 02:40:28.878 UTC [gossip.comm] func1 -> DEBU 2c22 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.878 UTC [gossip.gossip] handleMessage -> DEBU 2c23 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.879 UTC [msp] DeserializeIdentity -> DEBU 2c24 Obtaining identity" +"2019-07-20 02:40:28.881 UTC [msp] DeserializeIdentity -> DEBU 2c25 Obtaining identity" +"2019-07-20 02:40:28.882 UTC [gossip.gossip] handleMessage -> DEBU 2c26 Exiting" +"2019-07-20 02:40:28.885 UTC [gossip.comm] func1 -> DEBU 2c27 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.885 UTC [gossip.gossip] handleMessage -> DEBU 2c28 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.886 UTC [msp.identity] Verify -> DEBU 2c29 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2a Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:28.886 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Exiting" +"2019-07-20 02:40:28.889 UTC [gossip.comm] func1 -> DEBU 2c2c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.889 UTC [gossip.gossip] handleMessage -> DEBU 2c2d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.889 UTC [msp.identity] Verify -> DEBU 2c2e Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c2f Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:28.890 UTC [msp] DeserializeIdentity -> DEBU 2c30 Obtaining identity" +"2019-07-20 02:40:28.890 UTC [gossip.gossip] handleMessage -> DEBU 2c31 Exiting" +"2019-07-20 02:40:28.899 UTC [gossip.comm] func1 -> DEBU 2c32 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.900 UTC [gossip.gossip] handleMessage -> DEBU 2c33 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:28.900 UTC [msp.identity] Verify -> DEBU 2c34 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 2c35 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:28.901 UTC [msp] DeserializeIdentity -> DEBU 2c36 Obtaining identity" +"2019-07-20 02:40:28.901 UTC [gossip.gossip] handleMessage -> DEBU 2c37 Exiting" +"2019-07-20 02:40:28.903 UTC [gossip.comm] func1 -> DEBU 2c38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.903 UTC [gossip.gossip] handleMessage -> DEBU 2c39 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.904 UTC [gossip.pull] HandleMessage -> DEBU 2c3a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:28.904 UTC [gossip.pull] SendDigest -> DEBU 2c3b Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:28.904 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" +"2019-07-20 02:40:29.045 UTC [gossip.comm] func1 -> DEBU 2c3d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:29.046 UTC [gossip.gossip] handleMessage -> DEBU 2c3e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c3f Obtaining identity" +"2019-07-20 02:40:29.046 UTC [msp] DeserializeIdentity -> DEBU 2c40 Obtaining identity" +"2019-07-20 02:40:29.047 UTC [msp] DeserializeIdentity -> DEBU 2c41 Obtaining identity" +"2019-07-20 02:40:29.047 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +"2019-07-20 02:40:29.049 UTC [gossip.comm] func1 -> DEBU 2c43 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.049 UTC [gossip.gossip] handleMessage -> DEBU 2c44 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.049 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" +"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c47 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.050 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c48 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:29.050 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:29.050 UTC [cauthdsl] func1 -> DEBU 2c4c 0xc002a37700 gate 1563590429050765400 evaluation starts" +"2019-07-20 02:40:29.050 UTC [cauthdsl] func2 -> DEBU 2c4d 0xc002a37700 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4e 0xc002a37700 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc002a37700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:29.051 UTC [cauthdsl] func2 -> DEBU 2c50 0xc002a37700 principal evaluation fails" +"2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c51 0xc002a37700 gate 1563590429050765400 evaluation fails" +"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c52 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.052 UTC [policies] Evaluate -> DEBU 2c54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:29.052 UTC [cauthdsl] func1 -> DEBU 2c55 0xc002a37f40 gate 1563590429052725600 evaluation starts" +"2019-07-20 02:40:29.052 UTC [cauthdsl] func2 -> DEBU 2c56 0xc002a37f40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c57 0xc002a37f40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c58 0xc002a37f40 principal matched by identity 0" +"2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c59 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:29.053 UTC [msp.identity] Verify -> DEBU 2c5a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:29.053 UTC [cauthdsl] func2 -> DEBU 2c5b 0xc002a37f40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:29.053 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc002a37f40 gate 1563590429052725600 evaluation succeeds" +"2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.053 UTC [policies] Evaluate -> DEBU 2c5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c5f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:29.054 UTC [policies] Evaluate -> DEBU 2c60 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:29.054 UTC [msp] DeserializeIdentity -> DEBU 2c61 Obtaining identity" +"2019-07-20 02:40:29.054 UTC [gossip.gossip] handleMessage -> DEBU 2c62 Exiting" +"2019-07-20 02:40:29.062 UTC [gossip.comm] func1 -> DEBU 2c63 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.063 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.063 UTC [msp] DeserializeIdentity -> DEBU 2c65 Obtaining identity" +"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c67 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.064 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c68 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:29.064 UTC [policies] Evaluate -> DEBU 2c6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:29.065 UTC [policies] Evaluate -> DEBU 2c6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:29.065 UTC [cauthdsl] func1 -> DEBU 2c6c 0xc003c761e0 gate 1563590429065560400 evaluation starts" +"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6d 0xc003c761e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6e 0xc003c761e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c6f 0xc003c761e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:29.065 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003c761e0 principal evaluation fails" +"2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c71 0xc003c761e0 gate 1563590429065560400 evaluation fails" +"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.066 UTC [policies] Evaluate -> DEBU 2c74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:29.066 UTC [cauthdsl] func1 -> DEBU 2c75 0xc003c76a20 gate 1563590429066647500 evaluation starts" +"2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c76 0xc003c76a20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.066 UTC [cauthdsl] func2 -> DEBU 2c77 0xc003c76a20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c78 0xc003c76a20 principal matched by identity 0" +"2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c79 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:29.067 UTC [msp.identity] Verify -> DEBU 2c7a Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:29.067 UTC [cauthdsl] func2 -> DEBU 2c7b 0xc003c76a20 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:29.068 UTC [cauthdsl] func1 -> DEBU 2c7c 0xc003c76a20 gate 1563590429066647500 evaluation succeeds" +"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c7f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:29.068 UTC [policies] Evaluate -> DEBU 2c80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:29.068 UTC [msp] DeserializeIdentity -> DEBU 2c81 Obtaining identity" +"2019-07-20 02:40:29.068 UTC [gossip.gossip] handleMessage -> DEBU 2c82 Exiting" +"2019-07-20 02:40:29.184 UTC [gossip.comm] func1 -> DEBU 2c83 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:29.185 UTC [gossip.gossip] handleMessage -> DEBU 2c84 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:29.185 UTC [msp] DeserializeIdentity -> DEBU 2c85 Obtaining identity" +"2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c86 Obtaining identity" +"2019-07-20 02:40:29.186 UTC [msp] DeserializeIdentity -> DEBU 2c87 Obtaining identity" +"2019-07-20 02:40:29.187 UTC [gossip.gossip] handleMessage -> DEBU 2c88 Exiting" +"2019-07-20 02:40:29.195 UTC [gossip.comm] func1 -> DEBU 2c89 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.195 UTC [gossip.gossip] handleMessage -> DEBU 2c8a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:29.195 UTC [msp] DeserializeIdentity -> DEBU 2c8b Obtaining identity" +"2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:29.196 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.197 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c8f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:29.197 UTC [policies] Evaluate -> DEBU 2c90 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:29.198 UTC [policies] Evaluate -> DEBU 2c91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:29.198 UTC [cauthdsl] func1 -> DEBU 2c92 0xc003b89a10 gate 1563590429198298900 evaluation starts" +"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003b89a10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003b89a10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c95 0xc003b89a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:29.198 UTC [cauthdsl] func2 -> DEBU 2c96 0xc003b89a10 principal evaluation fails" +"2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c97 0xc003b89a10 gate 1563590429198298900 evaluation fails" +"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c98 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:29.199 UTC [policies] Evaluate -> DEBU 2c9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:29.199 UTC [cauthdsl] func1 -> DEBU 2c9b 0xc003e72250 gate 1563590429199406700 evaluation starts" +"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9c 0xc003e72250 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9d 0xc003e72250 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.199 UTC [cauthdsl] func2 -> DEBU 2c9e 0xc003e72250 principal matched by identity 0" +"2019-07-20 02:40:29.199 UTC [msp.identity] Verify -> DEBU 2c9f Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +"2019-07-20 02:40:29.200 UTC [msp.identity] Verify -> DEBU 2ca0 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 2ca1 0xc003e72250 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:29.200 UTC [cauthdsl] func1 -> DEBU 2ca2 0xc003e72250 gate 1563590429199406700 evaluation succeeds" +"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:29.200 UTC [policies] Evaluate -> DEBU 2ca6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:29.201 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +"2019-07-20 02:40:29.201 UTC [gossip.gossip] handleMessage -> DEBU 2ca8 Exiting" +"2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2ca9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.907 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2caa Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:29.907 UTC [policies] Evaluate -> DEBU 2cad == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:29.907 UTC [cauthdsl] func1 -> DEBU 2cae 0xc002a0e280 gate 1563590429907908700 evaluation starts" +"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2caf 0xc002a0e280 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb0 0xc002a0e280 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.908 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc002a0e280 principal matched by identity 0" +"2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb2 Verify: digest = 00000000 66 5c 55 fa 92 62 2b cc 22 38 bc 5a ab e1 99 8b |f\U..b+."8.Z....| +00000010 a3 7e ed 8d 7b d3 7a 83 e9 52 e5 4a 62 c6 47 33 |.~..{.z..R.Jb.G3|" +"2019-07-20 02:40:29.908 UTC [msp.identity] Verify -> DEBU 2cb3 Verify: sig = 00000000 30 44 02 20 01 7e e9 fb f8 ac ac 13 48 6c 04 13 |0D. .~......Hl..| +00000010 74 73 0e 9a ff 6d 09 40 fc 70 78 8b 24 00 cf 5b |ts...m.@.px.$..[| +00000020 e4 01 16 96 02 20 12 c1 64 09 0f 0d 76 d3 a3 a3 |..... ..d...v...| +00000030 43 0b 17 03 66 2e f7 a8 fa 41 d8 8d 8d 6f 8a 41 |C...f....A...o.A| +00000040 f7 d3 15 33 5c e9 |...3\.|" +"2019-07-20 02:40:29.909 UTC [cauthdsl] func2 -> DEBU 2cb4 0xc002a0e280 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:29.909 UTC [cauthdsl] func1 -> DEBU 2cb5 0xc002a0e280 gate 1563590429907908700 evaluation succeeds" +"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:29.910 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:29.910 UTC [blocksProvider] DeliverBlocks -> DEBU 2cba [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbb [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-07-20 02:40:29.910 UTC [gossip.state] addPayload -> DEBU 2cbc Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:40:29.911 UTC [blocksProvider] DeliverBlocks -> DEBU 2cbd [businesschannel] Gossiping block [5], peers number [3]" +"2019-07-20 02:40:29.911 UTC [gossip.channel] AddToMsgStore -> DEBU 2cbe Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:40:29.911 UTC [gossip.pull] Add -> DEBU 2cbf Added 5, total items: 5" +"2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc0 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +"2019-07-20 02:40:29.911 UTC [gossip.state] deliverPayloads -> DEBU 2cc1 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +"2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> INFO 2cc2 [businesschannel] Received block [5] from buffer" +"2019-07-20 02:40:29.911 UTC [gossip.privdata] StoreBlock -> DEBU 2cc3 [businesschannel] Validating block [5]" +"2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc4 [businesschannel] START Block Validation for block [5]" +"2019-07-20 02:40:29.911 UTC [committer.txvalidator] Validate -> DEBU 2cc5 expecting 1 block validation responses" +"2019-07-20 02:40:29.911 UTC [committer.txvalidator] validateTx -> DEBU 2cc6 [businesschannel] validateTx starts for block 0xc003329000 env 0xc003de9680 txn 0" +"2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc7 ValidateTransactionEnvelope starts for envelope 0xc003de9680" +"2019-07-20 02:40:29.912 UTC [protoutils] ValidateTransaction -> DEBU 2cc8 Header is channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " +"2019-07-20 02:40:29.912 UTC [protoutils] validateChannelHeader -> DEBU 2cc9 validateChannelHeader info: header type 3" +"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cca begin" +"2019-07-20 02:40:29.912 UTC [msp] GetManagerForChain -> DEBU 2ccb Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccc creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ccd creator is valid" +"2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2cce Verify: digest = 00000000 fd 67 c4 b0 85 cb 38 56 50 7e bc 5b 91 c9 58 f5 |.g....8VP~.[..X.| +00000010 d8 6f d5 69 72 ea 09 87 2f 36 f6 5d 04 12 22 2b |.o.ir.../6.].."+|" +"2019-07-20 02:40:29.912 UTC [msp.identity] Verify -> DEBU 2ccf Verify: sig = 00000000 30 44 02 20 6c 40 9e 5f c4 72 dd 46 9b 91 56 5c |0D. l@._.r.F..V\| +00000010 4c 18 86 1b c3 d0 4f 1a 42 2d 3b 24 98 d0 7e 33 |L.....O.B-;$..~3| +00000020 8b c1 0d 20 02 20 05 cc d8 dd a6 4e e6 f7 e2 5e |... . .....N...^| +00000030 96 b7 47 f1 4b d9 8a f6 0a 37 5b 58 02 60 01 93 |..G.K....7[X.`..| +00000040 f3 e2 8c ca 4c 85 |....L.|" +"2019-07-20 02:40:29.912 UTC [protoutils] checkSignatureFromCreator -> DEBU 2cd0 exits successfully" +"2019-07-20 02:40:29.912 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd1 validateEndorserTransaction starts for data 0xc003d9d000, header channel_header:"\010\003\032\014\010\233\376\311\351\005\020\220\347\200\220\003\"\017businesschannel*@cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030T\242E]U\237\367\261\027o\270\362U\3555\232A\214\205`\377\361\333\315" " +"2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd2 validateEndorserTransaction info: there are 1 actions" +"2019-07-20 02:40:29.913 UTC [protoutils] validateEndorserTransaction -> DEBU 2cd3 validateEndorserTransaction info: signature header is valid" +"2019-07-20 02:40:29.913 UTC [protoutils] ValidateTransaction -> DEBU 2cd4 ValidateTransactionEnvelope returns err %!s()" +"2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd5 Transaction is for channel businesschannel" +"2019-07-20 02:40:29.913 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2cd6 retrieveTransactionByID() - txId = [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919]" +"2019-07-20 02:40:29.913 UTC [committer.txvalidator] validateTx -> DEBU 2cd7 Validating transaction vscc tx validate" +"2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cd8 [businesschannel] VSCCValidateTx starts for bytes 0xc002a09000" +"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cd9 constructing new query executor txid = [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" +"2019-07-20 02:40:29.913 UTC [stateleveldb] GetState -> DEBU 2cda GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cdb Done with transaction simulation / query execution [365099c3-1ff9-40c5-8e22-ed3d0d6ee917]" +"2019-07-20 02:40:29.913 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2cdc Validating Tx cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cdd constructing new query executor txid = [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" +"2019-07-20 02:40:29.913 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [2cf0f7a6-6bdd-4975-9d35-90dac5c02c2d]" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2cdf 0xc00354b270 gate 1563590429913996900 evaluation starts" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce0 0xc00354b270 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce1 0xc00354b270 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce2 0xc00354b270 principal matched by identity 0" +"2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce3 Verify: digest = 00000000 c6 e1 11 a0 17 7e 2c 9b 0b 87 80 2f b0 af 0b 6b |.....~,..../...k| +00000010 41 9e 7e c6 c5 cf fd af ec 9a 92 18 ac 29 ed 00 |A.~..........)..|" +"2019-07-20 02:40:29.914 UTC [msp.identity] Verify -> DEBU 2ce4 Verify: sig = 00000000 30 44 02 20 0c fc 56 28 ee eb 1a f1 d8 0f 5b 52 |0D. ..V(......[R| +00000010 91 0d 11 5c ab d0 c8 22 b9 b6 e5 18 a2 a5 e5 03 |...\..."........| +00000020 e3 e5 89 8a 02 20 61 9b 09 2a c0 01 99 74 e1 30 |..... a..*...t.0| +00000030 6e 6a 3e cb e8 8b b1 71 d4 cd 93 8b 96 db ba 79 |nj>....q.......y| +00000040 83 ae 49 e9 5e 8d |..I.^.|" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce5 0xc00354b270 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce6 0xc00354b270 signed by 1 principal evaluation starts (used [true])" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce7 0xc00354b270 skipping identity 0 because it has already been used" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func2 -> DEBU 2ce8 0xc00354b270 principal evaluation fails" +"2019-07-20 02:40:29.914 UTC [cauthdsl] func1 -> DEBU 2ce9 0xc00354b270 gate 1563590429913996900 evaluation succeeds" +"2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2cea constructing new query executor txid = [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" +"2019-07-20 02:40:29.914 UTC [lockbasedtxmgr] Done -> DEBU 2ceb Done with transaction simulation / query execution [03a5760c-b4b0-4828-893f-cb7c8d6c1a4f]" +"2019-07-20 02:40:29.914 UTC [vscc] Validate -> DEBU 2cec block 5, namespace: exp02, tx 0 validation results is: " +"2019-07-20 02:40:29.914 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2ced Transaction cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 appears to be valid" +"2019-07-20 02:40:29.914 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2cee [businesschannel] VSCCValidateTx completes env bytes 0xc002a09000" +"2019-07-20 02:40:29.914 UTC [committer.txvalidator] validateTx -> DEBU 2cef [businesschannel] validateTx completes for block 0xc003329000 env 0xc003de9680 txn 0" +"2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> DEBU 2cf0 got result for idx 0, code 0" +"2019-07-20 02:40:29.914 UTC [committer.txvalidator] Validate -> INFO 2cf1 [businesschannel] Validated block [5] in 2ms" +"2019-07-20 02:40:29.914 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2cf2 Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:40:29.914 UTC [gossip.privdata] StoreBlock -> DEBU 2cf3 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:40:29.916 UTC [kvledger] CommitWithPvtData -> DEBU 2cf4 [businesschannel] Validating state for block [5]" +"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf6 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:40:29.916 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2cf7 Validating new block with num trans = [1]" +"2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf8 ValidateAndPrepareBatch() for block number = [5]" +"2019-07-20 02:40:29.916 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2cf9 preprocessing ProtoBlock..." +"2019-07-20 02:40:29.917 UTC [valimpl] preprocessProtoBlock -> DEBU 2cfa txType=ENDORSER_TRANSACTION" +"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfb GetState(). ns=exp02, key=a" +"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfc Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cfd GetState(). ns=exp02, key=b" +"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2cfe Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-07-20 02:40:29.917 UTC [stateleveldb] GetState -> DEBU 2cff GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:29.917 UTC [statebasedval] validateKVRead -> DEBU 2d00 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-07-20 02:40:29.917 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2d01 Block [5] Transaction index [0] TxId [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] marked as valid by state validator" +"2019-07-20 02:40:29.917 UTC [valinternal] ApplyWriteSet -> DEBU 2d02 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0034a4240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0034a4280)}" +"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d03 validating rwset..." +"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d04 postprocessing ProtoBlock..." +"2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d05 Obtaining identity" +"2019-07-20 02:40:29.918 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2d06 ValidateAndPrepareBatch() complete" +"2019-07-20 02:40:29.918 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" +"2019-07-20 02:40:29.918 UTC [kvledger] CommitWithPvtData -> DEBU 2d08 [businesschannel] Adding CommitHash to the block [5]" +"2019-07-20 02:40:29.919 UTC [kvledger] CommitWithPvtData -> DEBU 2d09 [businesschannel] Committing block [5] to storage" +"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0a Obtaining identity" +"2019-07-20 02:40:29.919 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2d0b Writing block [5] to pvt block store" +"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +"2019-07-20 02:40:29.919 UTC [gossip.comm] Send -> DEBU 2d0d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0e Obtaining identity" +"2019-07-20 02:40:29.919 UTC [msp] DeserializeIdentity -> DEBU 2d0f Obtaining identity" +"2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4004 bytes, seq: 5}, Envelope: 4034 bytes, Signature: 0 bytes" +"2019-07-20 02:40:29.919 UTC [gossip.comm] sendToEndpoint -> DEBU 2d11 Exiting" +"2019-07-20 02:40:29.920 UTC [pvtdatastorage] Prepare -> DEBU 2d12 Saved 0 private data write sets for block [5]" +"2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d13 Indexing block [blockNum=5, blockHash=[]byte{0x91, 0x57, 0x90, 0x2d, 0xf6, 0xfd, 0xb5, 0x4d, 0x5e, 0x9f, 0x17, 0xe5, 0xf6, 0x19, 0x33, 0xf, 0xd2, 0x27, 0x45, 0x3, 0x6c, 0x2, 0x3e, 0x8d, 0x6d, 0x3b, 0xa6, 0x3e, 0x8b, 0x83, 0x1b, 0x53} txOffsets= +txId=cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919 locPointer=offset=70, bytesLength=2984 +]" +"2019-07-20 02:40:29.924 UTC [fsblkstorage] indexBlock -> DEBU 2d14 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to txid-index" +"2019-07-20 02:40:29.925 UTC [fsblkstorage] indexBlock -> DEBU 2d15 Adding txLoc [fileSuffixNum=0, offset=80123, bytesLength=2984] for tx number:[0] ID: [cf18601c294ee3fd712c428b3ff4c467647fed6a31fb7d3390fffe7d2970a919] to blockNumTranNum index" +"2019-07-20 02:40:29.935 UTC [fsblkstorage] updateCheckpoint -> DEBU 2d16 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84079], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-07-20 02:40:29.935 UTC [pvtdatastorage] Commit -> DEBU 2d17 Committing private data for block [5]" +"2019-07-20 02:40:29.939 UTC [pvtdatastorage] Commit -> DEBU 2d18 Committed private data for block [5]" +"2019-07-20 02:40:29.940 UTC [kvledger] CommitWithPvtData -> DEBU 2d19 [businesschannel] Committing block [5] transactions to state database" +"2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1a lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:40:29.940 UTC [lockbasedtxmgr] Commit -> DEBU 2d1b Committing updates to state database" +"2019-07-20 02:40:29.941 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2d1c Building the expiry schedules based on the update batch" +"2019-07-20 02:40:29.941 UTC [lockbasedtxmgr] Commit -> DEBU 2d1d Write lock acquired for committing updates to state database" +"2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1e Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-07-20 02:40:29.941 UTC [stateleveldb] ApplyUpdates -> DEBU 2d1f Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] Commit -> DEBU 2d20 Updates committed to state database and the write lock is released" +"2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d21 Preparing potential purge list working-set for expiringAtBlk [6]" +"2019-07-20 02:40:29.943 UTC [leveldbhelper] GetIterator -> DEBU 2d22 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +"2019-07-20 02:40:29.943 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2d23 No expiry entry found for expiringAtBlk [6]" +"2019-07-20 02:40:29.943 UTC [lockbasedtxmgr] func1 -> DEBU 2d24 launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:40:29.943 UTC [kvledger] CommitWithPvtData -> DEBU 2d25 [businesschannel] Committing block [5] transactions to history database" +"2019-07-20 02:40:29.943 UTC [historyleveldb] Commit -> DEBU 2d26 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +"2019-07-20 02:40:29.945 UTC [historyleveldb] Commit -> DEBU 2d27 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +"2019-07-20 02:40:29.945 UTC [kvledger] CommitWithPvtData -> INFO 2d28 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=2ms block_and_pvtdata_commit=21ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +"2019-07-20 02:40:29.945 UTC [msp] GetDefaultSigningIdentity -> DEBU 2d29 Obtaining default signing identity" +"2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2a Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08061A0C0A0565787030321203312E30 " +"2019-07-20 02:40:29.945 UTC [msp.identity] Sign -> DEBU 2d2b Sign: digest: 16B6E3422440EF1113CC2D5AD11B5698025C5C42F9054C40FB3B8C581A28CBBD " +"2019-07-20 02:40:29.945 UTC [gossip.state] commitBlock -> DEBU 2d2c [businesschannel] Committed block [5] with 1 transaction(s)" +"2019-07-20 02:40:30.280 UTC [endorser] ProcessProposal -> DEBU 2d2d Entering: request from 172.18.0.9:58384" +"2019-07-20 02:40:30.280 UTC [protoutils] ValidateProposalMessage -> DEBU 2d2e ValidateProposalMessage starts for signed proposal 0xc003e3fd10" +"2019-07-20 02:40:30.280 UTC [protoutils] validateChannelHeader -> DEBU 2d2f validateChannelHeader info: header type 3" +"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d30 begin" +"2019-07-20 02:40:30.280 UTC [msp] GetManagerForChain -> DEBU 2d31 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d32 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:30.280 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d33 creator is valid" +"2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d34 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| +00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" +"2019-07-20 02:40:30.281 UTC [msp.identity] Verify -> DEBU 2d35 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| +00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| +00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| +00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| +00000040 3d a5 8c db 81 e3 |=.....|" +"2019-07-20 02:40:30.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d36 exits successfully" +"2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d37 validateChaincodeProposalMessage starts for proposal 0xc0029acd90, header 0xc003fb8190" +"2019-07-20 02:40:30.281 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d38 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-07-20 02:40:30.281 UTC [endorser] preProcess -> DEBU 2d39 [businesschannel][2fec28c6] processing txid: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933" +"2019-07-20 02:40:30.282 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d3a retrieveTransactionByID() - txId = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +"2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3b acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-07-20 02:40:30.282 UTC [aclmgmt] CheckACL -> DEBU 2d3c acl check(/Channel/Application/Writers)" +"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:30.282 UTC [policies] Evaluate -> DEBU 2d3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-07-20 02:40:30.283 UTC [cauthdsl] func1 -> DEBU 2d40 0xc00376f160 gate 1563590430283118800 evaluation starts" +"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d41 0xc00376f160 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d42 0xc00376f160 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:30.283 UTC [cauthdsl] func2 -> DEBU 2d43 0xc00376f160 principal matched by identity 0" +"2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d44 Verify: digest = 00000000 5e d6 18 3c 0a 79 f0 77 2c 02 9c da da 10 31 d1 |^..<.y.w,.....1.| +00000010 ae fc 2f 5c 1f d7 4a 3c 1f 83 6a e3 49 aa 67 b4 |../\..J<..j.I.g.|" +"2019-07-20 02:40:30.283 UTC [msp.identity] Verify -> DEBU 2d45 Verify: sig = 00000000 30 44 02 20 5e 94 09 02 ac 34 fe f7 23 67 4b 2f |0D. ^....4..#gK/| +00000010 17 03 0d 5b ea 9d 8f 0f 1c 53 eb 47 91 94 72 1c |...[.....S.G..r.| +00000020 72 f4 06 67 02 20 05 74 bf 98 60 85 b6 95 4a 32 |r..g. .t..`...J2| +00000030 41 5a d3 a2 b9 c9 ed 4f 05 56 74 d1 2e fc c6 42 |AZ.....O.Vt....B| +00000040 3d a5 8c db 81 e3 |=.....|" +"2019-07-20 02:40:30.284 UTC [cauthdsl] func2 -> DEBU 2d46 0xc00376f160 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:30.284 UTC [cauthdsl] func1 -> DEBU 2d47 0xc00376f160 gate 1563590430283118800 evaluation succeeds" +"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d48 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4a Signature set satisfies policy /Channel/Application/Writers" +"2019-07-20 02:40:30.284 UTC [policies] Evaluate -> DEBU 2d4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d4c constructing new tx simulator" +"2019-07-20 02:40:30.284 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d4d constructing new tx simulator txid = [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +"2019-07-20 02:40:30.285 UTC [endorser] SimulateProposal -> DEBU 2d4e [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:30.285 UTC [stateleveldb] GetState -> DEBU 2d4f GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:30.285 UTC [ccprovider] GetChaincodeData -> DEBU 2d50 Getting chaincode data for from cache" +"2019-07-20 02:40:30.285 UTC [endorser] callChaincode -> INFO 2d51 [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:30.285 UTC [chaincode] Execute -> DEBU 2d52 Entry" +"2019-07-20 02:40:30.287 UTC [chaincode] handleMessage -> DEBU 2d53 [2fec28c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d54 [2fec28c6] handling GET_STATE from chaincode" +"2019-07-20 02:40:30.287 UTC [chaincode] HandleGetState -> DEBU 2d55 [2fec28c6] getting state for chaincode exp02, key a, channel businesschannel" +"2019-07-20 02:40:30.287 UTC [stateleveldb] GetState -> DEBU 2d56 GetState(). ns=exp02, key=a" +"2019-07-20 02:40:30.287 UTC [chaincode] HandleTransaction -> DEBU 2d57 [2fec28c6] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:30.288 UTC [chaincode] handleMessage -> DEBU 2d58 [2fec28c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:30.289 UTC [chaincode] Notify -> DEBU 2d59 [2fec28c6] notifying Txid:2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, channelID:businesschannel" +"2019-07-20 02:40:30.289 UTC [chaincode] Execute -> DEBU 2d5a Exit" +"2019-07-20 02:40:30.289 UTC [endorser] callChaincode -> INFO 2d5b [businesschannel][2fec28c6] Exit chaincode: name:"exp02" (4ms)" +"2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d5c Simulation completed, getting simulation results" +"2019-07-20 02:40:30.289 UTC [lockbasedtxmgr] Done -> DEBU 2d5d Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +"2019-07-20 02:40:30.289 UTC [endorser] SimulateProposal -> DEBU 2d5e [businesschannel][2fec28c6] Exit" +"2019-07-20 02:40:30.289 UTC [endorser] endorseProposal -> DEBU 2d5f [businesschannel][2fec28c6] Entry chaincode: name:"exp02" " +"2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d60 [businesschannel][2fec28c6] escc for chaincode name:"exp02" is escc" +"2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d61 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" +"2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d62 Sign: plaintext: 0A2074EF80C23BC6C4E8567CCE74AA7C...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:30.290 UTC [msp.identity] Sign -> DEBU 2d63 Sign: digest: E1CA0B783FA631FD149AA90726F9DC6674E11EE6CAB366B0DAF3B9701126138F " +"2019-07-20 02:40:30.290 UTC [endorser] EndorseWithPlugin -> DEBU 2d64 Exiting {plugin: escc, channel: businesschannel, tx: 2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933, chaincode: exp02}" +"2019-07-20 02:40:30.290 UTC [endorser] endorseProposal -> DEBU 2d65 [businesschannel][2fec28c6] Exit" +"2019-07-20 02:40:30.290 UTC [lockbasedtxmgr] Done -> DEBU 2d66 Done with transaction simulation / query execution [2fec28c69705763f6923c3ac28e179f830d8382f92bcf6b2587855a83205d933]" +"2019-07-20 02:40:30.291 UTC [endorser] func1 -> DEBU 2d67 Exit: request from 172.18.0.9:58384" +"2019-07-20 02:40:30.291 UTC [comm.grpc.server] 1 -> INFO 2d68 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58384 grpc.code=OK grpc.call_duration=11.2701ms +"2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d69 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:30.296 UTC [grpc] infof -> DEBU 2d6a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:30.661 UTC [endorser] ProcessProposal -> DEBU 2d6b Entering: request from 172.18.0.9:58388" +"2019-07-20 02:40:30.661 UTC [protoutils] ValidateProposalMessage -> DEBU 2d6c ValidateProposalMessage starts for signed proposal 0xc003fb92c0" +"2019-07-20 02:40:30.661 UTC [protoutils] validateChannelHeader -> DEBU 2d6d validateChannelHeader info: header type 3" +"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d6e begin" +"2019-07-20 02:40:30.662 UTC [msp] GetManagerForChain -> DEBU 2d6f Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d70 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:30.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d71 creator is valid" +"2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d72 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| +00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" +"2019-07-20 02:40:30.662 UTC [msp.identity] Verify -> DEBU 2d73 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| +00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| +00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| +00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| +00000040 09 34 4d cd e2 e3 |.4M...|" +"2019-07-20 02:40:30.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d74 exits successfully" +"2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d75 validateChaincodeProposalMessage starts for proposal 0xc0029ad2d0, header 0xc003fb96d0" +"2019-07-20 02:40:30.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2d76 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:40:30.663 UTC [endorser] preProcess -> DEBU 2d77 [businesschannel][3bd567df] processing txid: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649" +"2019-07-20 02:40:30.663 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d78 retrieveTransactionByID() - txId = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +"2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2d79 constructing new tx simulator" +"2019-07-20 02:40:30.663 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2d7a constructing new tx simulator txid = [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +"2019-07-20 02:40:30.663 UTC [endorser] SimulateProposal -> DEBU 2d7b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.664 UTC [endorser] callChaincode -> INFO 2d7c [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.664 UTC [chaincode] Execute -> DEBU 2d7d Entry" +"2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7e acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +"2019-07-20 02:40:30.664 UTC [aclmgmt] CheckACL -> DEBU 2d7f acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:30.664 UTC [policies] Evaluate -> DEBU 2d81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:30.665 UTC [policies] Evaluate -> DEBU 2d82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d83 0xc003209920 gate 1563590430665096900 evaluation starts" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d84 0xc003209920 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d85 0xc003209920 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d86 0xc003209920 principal matched by identity 0" +"2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d87 Verify: digest = 00000000 97 7d 67 d5 9d eb 92 a2 0f 91 da 67 a9 90 f4 5d |.}g........g...]| +00000010 d3 1e 49 9f 76 9b 9f d4 26 a2 00 b8 95 53 56 b0 |..I.v...&....SV.|" +"2019-07-20 02:40:30.665 UTC [msp.identity] Verify -> DEBU 2d88 Verify: sig = 00000000 30 44 02 20 48 1e 42 5b da 30 13 bb e6 06 f3 43 |0D. H.B[.0.....C| +00000010 4e 6f b4 35 bf 1d 2a b7 57 79 12 a5 02 fd 6a 3c |No.5..*.Wy....j<| +00000020 5f 64 00 aa 02 20 57 ce 70 9a 14 76 2a 5f e6 a5 |_d... W.p..v*_..| +00000030 8e 13 a4 7f 93 00 62 dc b4 11 9c 96 d7 3f 00 f7 |......b......?..| +00000040 09 34 4d cd e2 e3 |.4M...|" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func2 -> DEBU 2d89 0xc003209920 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:30.665 UTC [cauthdsl] func1 -> DEBU 2d8a 0xc003209920 gate 1563590430665096900 evaluation succeeds" +"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:30.666 UTC [policies] Evaluate -> DEBU 2d8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:30.666 UTC [chaincode] handleMessage -> DEBU 2d8f [3bd567df] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:30.666 UTC [chaincode] HandleTransaction -> DEBU 2d90 [3bd567df] handling GET_STATE from chaincode" +"2019-07-20 02:40:30.666 UTC [chaincode] HandleGetState -> DEBU 2d91 [3bd567df] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-07-20 02:40:30.666 UTC [stateleveldb] GetState -> DEBU 2d92 GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:30.667 UTC [chaincode] HandleTransaction -> DEBU 2d93 [3bd567df] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:30.667 UTC [chaincode] handleMessage -> DEBU 2d94 [3bd567df] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:30.667 UTC [chaincode] Notify -> DEBU 2d95 [3bd567df] notifying Txid:3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, channelID:businesschannel" +"2019-07-20 02:40:30.667 UTC [chaincode] Execute -> DEBU 2d96 Exit" +"2019-07-20 02:40:30.667 UTC [endorser] callChaincode -> INFO 2d97 [businesschannel][3bd567df] Exit chaincode: name:"lscc" (3ms)" +"2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2d98 Simulation completed, getting simulation results" +"2019-07-20 02:40:30.667 UTC [lockbasedtxmgr] Done -> DEBU 2d99 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +"2019-07-20 02:40:30.667 UTC [endorser] SimulateProposal -> DEBU 2d9a [businesschannel][3bd567df] Exit" +"2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9b [businesschannel][3bd567df] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.667 UTC [endorser] endorseProposal -> DEBU 2d9c [businesschannel][3bd567df] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:30.667 UTC [endorser] EndorseWithPlugin -> DEBU 2d9d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" +"2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9e Sign: plaintext: 0A20DC3953394B8B040B6D3F4AA63DE2...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:30.668 UTC [msp.identity] Sign -> DEBU 2d9f Sign: digest: 003A94C9AA19F2A7BD2F4D207C25170F8B0627B182D7989A95B23B911588F6EA " +"2019-07-20 02:40:30.668 UTC [endorser] EndorseWithPlugin -> DEBU 2da0 Exiting {plugin: escc, channel: businesschannel, tx: 3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649, chaincode: lscc}" +"2019-07-20 02:40:30.668 UTC [endorser] endorseProposal -> DEBU 2da1 [businesschannel][3bd567df] Exit" +"2019-07-20 02:40:30.668 UTC [lockbasedtxmgr] Done -> DEBU 2da2 Done with transaction simulation / query execution [3bd567df829ee84174f487933f62e6051fd200894acb51f23e8630f2ca09e649]" +"2019-07-20 02:40:30.668 UTC [endorser] func1 -> DEBU 2da3 Exit: request from 172.18.0.9:58388" +"2019-07-20 02:40:30.668 UTC [comm.grpc.server] 1 -> INFO 2da4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58388 grpc.code=OK grpc.call_duration=8.5178ms +"2019-07-20 02:40:30.671 UTC [grpc] infof -> DEBU 2da5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:30.672 UTC [grpc] warningf -> DEBU 2da6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58388: read: connection reset by peer" +"2019-07-20 02:40:30.672 UTC [grpc] infof -> DEBU 2da7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:30.847 UTC [endorser] ProcessProposal -> DEBU 2da8 Entering: request from 172.18.0.9:58392" +"2019-07-20 02:40:30.848 UTC [protoutils] ValidateProposalMessage -> DEBU 2da9 ValidateProposalMessage starts for signed proposal 0xc003ec28c0" +"2019-07-20 02:40:30.848 UTC [protoutils] validateChannelHeader -> DEBU 2daa validateChannelHeader info: header type 3" +"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dab begin" +"2019-07-20 02:40:30.848 UTC [msp] GetManagerForChain -> DEBU 2dac Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dad creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:30.848 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dae creator is valid" +"2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2daf Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| +00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" +"2019-07-20 02:40:30.848 UTC [msp.identity] Verify -> DEBU 2db0 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| +00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| +00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| +00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| +00000040 54 bb 5c 3a bc ba |T.\:..|" +"2019-07-20 02:40:30.849 UTC [protoutils] checkSignatureFromCreator -> DEBU 2db1 exits successfully" +"2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db2 validateChaincodeProposalMessage starts for proposal 0xc0029ad730, header 0xc003ec2cd0" +"2019-07-20 02:40:30.849 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2db3 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:40:30.849 UTC [endorser] preProcess -> DEBU 2db4 [businesschannel][398ba62b] processing txid: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c" +"2019-07-20 02:40:30.849 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2db5 retrieveTransactionByID() - txId = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +"2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2db6 constructing new tx simulator" +"2019-07-20 02:40:30.849 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2db7 constructing new tx simulator txid = [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +"2019-07-20 02:40:30.849 UTC [endorser] SimulateProposal -> DEBU 2db8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.849 UTC [endorser] callChaincode -> INFO 2db9 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.850 UTC [chaincode] Execute -> DEBU 2dba Entry" +"2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbb acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +"2019-07-20 02:40:30.850 UTC [aclmgmt] CheckACL -> DEBU 2dbc acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:30.850 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:30.850 UTC [cauthdsl] func1 -> DEBU 2dc0 0xc003015bc0 gate 1563590430850677600 evaluation starts" +"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc1 0xc003015bc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc2 0xc003015bc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:30.850 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc003015bc0 principal matched by identity 0" +"2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc4 Verify: digest = 00000000 c1 2e ff b8 10 8a 13 7a d9 e6 50 70 a7 5b 51 82 |.......z..Pp.[Q.| +00000010 88 35 73 4f 94 cb ce df b8 27 1d 78 b9 ba 5e 3f |.5sO.....'.x..^?|" +"2019-07-20 02:40:30.851 UTC [msp.identity] Verify -> DEBU 2dc5 Verify: sig = 00000000 30 44 02 20 3b 72 87 22 7d 62 f5 d7 dc e8 8f 92 |0D. ;r."}b......| +00000010 18 04 94 11 e4 b5 d9 1f 12 d5 d2 b1 96 c6 64 e9 |..............d.| +00000020 b6 ea 84 08 02 20 37 5b 3e b6 14 4f 47 3b 4e 40 |..... 7[>..OG;N@| +00000030 a3 9a ef a3 39 a0 1c 39 9c 9a 62 56 b4 9a 94 03 |....9..9..bV....| +00000040 54 bb 5c 3a bc ba |T.\:..|" +"2019-07-20 02:40:30.851 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc003015bc0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:30.851 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc003015bc0 gate 1563590430850677600 evaluation succeeds" +"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:30.851 UTC [policies] Evaluate -> DEBU 2dca Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:30.852 UTC [policies] Evaluate -> DEBU 2dcb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:30.852 UTC [chaincode] handleMessage -> DEBU 2dcc [398ba62b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dcd [398ba62b] handling GET_STATE from chaincode" +"2019-07-20 02:40:30.852 UTC [chaincode] HandleGetState -> DEBU 2dce [398ba62b] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-07-20 02:40:30.852 UTC [stateleveldb] GetState -> DEBU 2dcf GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:30.852 UTC [chaincode] HandleTransaction -> DEBU 2dd0 [398ba62b] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:30.853 UTC [chaincode] handleMessage -> DEBU 2dd1 [398ba62b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:30.853 UTC [chaincode] Notify -> DEBU 2dd2 [398ba62b] notifying Txid:398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, channelID:businesschannel" +"2019-07-20 02:40:30.853 UTC [chaincode] Execute -> DEBU 2dd3 Exit" +"2019-07-20 02:40:30.853 UTC [endorser] callChaincode -> INFO 2dd4 [businesschannel][398ba62b] Exit chaincode: name:"lscc" (4ms)" +"2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2dd5 Simulation completed, getting simulation results" +"2019-07-20 02:40:30.854 UTC [lockbasedtxmgr] Done -> DEBU 2dd6 Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +"2019-07-20 02:40:30.854 UTC [endorser] SimulateProposal -> DEBU 2dd7 [businesschannel][398ba62b] Exit" +"2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd8 [businesschannel][398ba62b] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:30.854 UTC [endorser] endorseProposal -> DEBU 2dd9 [businesschannel][398ba62b] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:30.854 UTC [endorser] EndorseWithPlugin -> DEBU 2dda Entering endorsement for {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" +"2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddb Sign: plaintext: 0A20676545DA82FF5CBA43B1C4F1D73C...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:30.855 UTC [msp.identity] Sign -> DEBU 2ddc Sign: digest: 73A9A672040DBAA62B4709F7BB22774A13A4BCAA9164D02857C67C58BBC2A3BB " +"2019-07-20 02:40:30.855 UTC [endorser] EndorseWithPlugin -> DEBU 2ddd Exiting {plugin: escc, channel: businesschannel, tx: 398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c, chaincode: lscc}" +"2019-07-20 02:40:30.855 UTC [endorser] endorseProposal -> DEBU 2dde [businesschannel][398ba62b] Exit" +"2019-07-20 02:40:30.855 UTC [lockbasedtxmgr] Done -> DEBU 2ddf Done with transaction simulation / query execution [398ba62b1ed273da67e947cbaac8d1e985b2e14393d80e0ae451d3872829b94c]" +"2019-07-20 02:40:30.855 UTC [endorser] func1 -> DEBU 2de0 Exit: request from 172.18.0.9:58392" +"2019-07-20 02:40:30.855 UTC [comm.grpc.server] 1 -> INFO 2de1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58392 grpc.code=OK grpc.call_duration=7.8945ms +"2019-07-20 02:40:30.859 UTC [grpc] infof -> DEBU 2de2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:30.860 UTC [grpc] infof -> DEBU 2de3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.049 UTC [endorser] ProcessProposal -> DEBU 2de4 Entering: request from 172.18.0.9:58396" +"2019-07-20 02:40:31.049 UTC [protoutils] ValidateProposalMessage -> DEBU 2de5 ValidateProposalMessage starts for signed proposal 0xc003ec3cc0" +"2019-07-20 02:40:31.049 UTC [protoutils] validateChannelHeader -> DEBU 2de6 validateChannelHeader info: header type 3" +"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de7 begin" +"2019-07-20 02:40:31.050 UTC [msp] GetManagerForChain -> DEBU 2de8 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2de9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2dea creator is valid" +"2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2deb Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| +00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" +"2019-07-20 02:40:31.050 UTC [msp.identity] Verify -> DEBU 2dec Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| +00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| +00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| +00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| +00000040 10 aa 91 93 85 f8 de |.......|" +"2019-07-20 02:40:31.050 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ded exits successfully" +"2019-07-20 02:40:31.050 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2dee validateChaincodeProposalMessage starts for proposal 0xc0029adc00, header 0xc0029960f0" +"2019-07-20 02:40:31.051 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2def validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:40:31.051 UTC [endorser] preProcess -> DEBU 2df0 [businesschannel][f13255af] processing txid: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac" +"2019-07-20 02:40:31.051 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2df1 retrieveTransactionByID() - txId = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +"2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2df2 constructing new tx simulator" +"2019-07-20 02:40:31.051 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2df3 constructing new tx simulator txid = [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +"2019-07-20 02:40:31.052 UTC [endorser] SimulateProposal -> DEBU 2df4 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.052 UTC [endorser] callChaincode -> INFO 2df5 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.052 UTC [chaincode] Execute -> DEBU 2df6 Entry" +"2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df7 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +"2019-07-20 02:40:31.052 UTC [aclmgmt] CheckACL -> DEBU 2df8 acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2df9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.052 UTC [policies] Evaluate -> DEBU 2dfb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2dfc 0xc002883cb0 gate 1563590431053104100 evaluation starts" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfd 0xc002883cb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dfe 0xc002883cb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2dff 0xc002883cb0 principal matched by identity 0" +"2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e00 Verify: digest = 00000000 1a 67 04 70 62 a6 98 97 4a 91 c1 8e dc b6 5a 9b |.g.pb...J.....Z.| +00000010 c8 0c 26 a7 35 b0 9e 74 ff 9f 62 a5 dc d9 47 21 |..&.5..t..b...G!|" +"2019-07-20 02:40:31.053 UTC [msp.identity] Verify -> DEBU 2e01 Verify: sig = 00000000 30 45 02 21 00 fe 45 d5 50 3c ae 5f c2 c5 73 b0 |0E.!..E.P<._..s.| +00000010 76 19 31 56 27 69 c0 c3 df 7a ed 95 0e 37 fd 61 |v.1V'i...z...7.a| +00000020 87 3c 13 7e 70 02 20 07 a5 1c 63 f7 a7 2e bf d6 |.<.~p. ...c.....| +00000030 f0 2d d4 65 e8 be 5f 1d 07 95 29 43 9e 25 19 95 |.-.e.._...)C.%..| +00000040 10 aa 91 93 85 f8 de |.......|" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func2 -> DEBU 2e02 0xc002883cb0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.053 UTC [cauthdsl] func1 -> DEBU 2e03 0xc002883cb0 gate 1563590431053104100 evaluation succeeds" +"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e04 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e06 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.054 UTC [policies] Evaluate -> DEBU 2e07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.054 UTC [chaincode] handleMessage -> DEBU 2e08 [f13255af] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e09 [f13255af] handling GET_STATE from chaincode" +"2019-07-20 02:40:31.055 UTC [chaincode] HandleGetState -> DEBU 2e0a [f13255af] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-07-20 02:40:31.055 UTC [stateleveldb] GetState -> DEBU 2e0b GetState(). ns=lscc, key=exp02" +"2019-07-20 02:40:31.055 UTC [chaincode] HandleTransaction -> DEBU 2e0c [f13255af] Completed GET_STATE. Sending RESPONSE" +"2019-07-20 02:40:31.056 UTC [chaincode] handleMessage -> DEBU 2e0d [f13255af] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:31.056 UTC [chaincode] Notify -> DEBU 2e0e [f13255af] notifying Txid:f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, channelID:businesschannel" +"2019-07-20 02:40:31.056 UTC [chaincode] Execute -> DEBU 2e0f Exit" +"2019-07-20 02:40:31.056 UTC [endorser] callChaincode -> INFO 2e10 [businesschannel][f13255af] Exit chaincode: name:"lscc" (4ms)" +"2019-07-20 02:40:31.056 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e11 Simulation completed, getting simulation results" +"2019-07-20 02:40:31.057 UTC [lockbasedtxmgr] Done -> DEBU 2e12 Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +"2019-07-20 02:40:31.057 UTC [endorser] SimulateProposal -> DEBU 2e13 [businesschannel][f13255af] Exit" +"2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e14 [businesschannel][f13255af] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.057 UTC [endorser] endorseProposal -> DEBU 2e15 [businesschannel][f13255af] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:31.057 UTC [endorser] EndorseWithPlugin -> DEBU 2e16 Entering endorsement for {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" +"2019-07-20 02:40:31.057 UTC [msp.identity] Sign -> DEBU 2e17 Sign: plaintext: 0A20DF588A2AEA060081019D422F1E99...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:31.058 UTC [msp.identity] Sign -> DEBU 2e18 Sign: digest: 5FB5760DFBC5340411F4B7D072CF6CC8CD1031849D3597442E767CC02492CC07 " +"2019-07-20 02:40:31.058 UTC [endorser] EndorseWithPlugin -> DEBU 2e19 Exiting {plugin: escc, channel: businesschannel, tx: f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac, chaincode: lscc}" +"2019-07-20 02:40:31.058 UTC [endorser] endorseProposal -> DEBU 2e1a [businesschannel][f13255af] Exit" +"2019-07-20 02:40:31.058 UTC [lockbasedtxmgr] Done -> DEBU 2e1b Done with transaction simulation / query execution [f13255afbf4076af9a0502ef389dc1769b12d08ba00a5bafbba119fa51e683ac]" +"2019-07-20 02:40:31.058 UTC [endorser] func1 -> DEBU 2e1c Exit: request from 172.18.0.9:58396" +"2019-07-20 02:40:31.059 UTC [comm.grpc.server] 1 -> INFO 2e1d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58396 grpc.code=OK grpc.call_duration=9.768ms +"2019-07-20 02:40:31.062 UTC [grpc] infof -> DEBU 2e1e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.063 UTC [grpc] infof -> DEBU 2e1f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.200 UTC [endorser] ProcessProposal -> DEBU 2e20 Entering: request from 172.18.0.9:58400" +"2019-07-20 02:40:31.200 UTC [protoutils] ValidateProposalMessage -> DEBU 2e21 ValidateProposalMessage starts for signed proposal 0xc002997180" +"2019-07-20 02:40:31.200 UTC [protoutils] validateChannelHeader -> DEBU 2e22 validateChannelHeader info: header type 3" +"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e23 begin" +"2019-07-20 02:40:31.200 UTC [msp] GetManagerForChain -> DEBU 2e24 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e25 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:31.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e26 creator is valid" +"2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e27 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| +00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" +"2019-07-20 02:40:31.200 UTC [msp.identity] Verify -> DEBU 2e28 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| +00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| +00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| +00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| +00000040 2f 17 bc cb d3 14 14 |/......|" +"2019-07-20 02:40:31.201 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e29 exits successfully" +"2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2a validateChaincodeProposalMessage starts for proposal 0xc002a5a0e0, header 0xc002997590" +"2019-07-20 02:40:31.201 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e2b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:40:31.201 UTC [endorser] preProcess -> DEBU 2e2c [businesschannel][3d993208] processing txid: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5" +"2019-07-20 02:40:31.201 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e2d retrieveTransactionByID() - txId = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +"2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e2e constructing new tx simulator" +"2019-07-20 02:40:31.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e2f constructing new tx simulator txid = [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +"2019-07-20 02:40:31.201 UTC [endorser] SimulateProposal -> DEBU 2e30 [businesschannel][3d993208] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.201 UTC [endorser] callChaincode -> INFO 2e31 [businesschannel][3d993208] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e32 Entry" +"2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e33 Verify: digest = 00000000 14 99 d2 66 9e c3 35 26 ae d4 50 7d ac 82 40 41 |...f..5&..P}..@A| +00000010 aa 63 90 aa 72 c5 d1 4d 61 45 96 7c 0c 4d e2 6e |.c..r..MaE.|.M.n|" +"2019-07-20 02:40:31.202 UTC [msp.identity] Verify -> DEBU 2e34 Verify: sig = 00000000 30 45 02 21 00 95 4b ba f8 fb 04 c0 e1 f8 cd e1 |0E.!..K.........| +00000010 38 eb 46 ae 85 74 38 33 02 e1 2e d1 ea 50 de d0 |8.F..t83.....P..| +00000020 a6 24 5d b2 48 02 20 31 08 c8 7d 1d e0 28 0a 51 |.$].H. 1..}..(.Q| +00000030 d9 8e cb e6 45 63 87 d4 8b 85 ac a9 44 0a 4a 19 |....Ec......D.J.| +00000040 2f 17 bc cb d3 14 14 |/......|" +"2019-07-20 02:40:31.202 UTC [chaincode] handleMessage -> DEBU 2e35 [3d993208] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:31.202 UTC [chaincode] Notify -> DEBU 2e36 [3d993208] notifying Txid:3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, channelID:businesschannel" +"2019-07-20 02:40:31.202 UTC [chaincode] Execute -> DEBU 2e37 Exit" +"2019-07-20 02:40:31.203 UTC [endorser] callChaincode -> INFO 2e38 [businesschannel][3d993208] Exit chaincode: name:"lscc" (1ms)" +"2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e39 Simulation completed, getting simulation results" +"2019-07-20 02:40:31.203 UTC [lockbasedtxmgr] Done -> DEBU 2e3a Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +"2019-07-20 02:40:31.203 UTC [endorser] SimulateProposal -> DEBU 2e3b [businesschannel][3d993208] Exit" +"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3c [businesschannel][3d993208] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e3d [businesschannel][3d993208] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e3e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" +"2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e3f Sign: plaintext: 0A209E2BEBF5810375D1E37635180076...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:31.203 UTC [msp.identity] Sign -> DEBU 2e40 Sign: digest: 363FCCE3F7DEB930D82E10E0E713734CE9239405AC545754A93FD1B6565EFB75 " +"2019-07-20 02:40:31.203 UTC [endorser] EndorseWithPlugin -> DEBU 2e41 Exiting {plugin: escc, channel: businesschannel, tx: 3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5, chaincode: lscc}" +"2019-07-20 02:40:31.203 UTC [endorser] endorseProposal -> DEBU 2e42 [businesschannel][3d993208] Exit" +"2019-07-20 02:40:31.204 UTC [lockbasedtxmgr] Done -> DEBU 2e43 Done with transaction simulation / query execution [3d993208ce319a26de78bfb9b4a89ec5cefa0098c9d7d6adeb575b43061dd2b5]" +"2019-07-20 02:40:31.204 UTC [endorser] func1 -> DEBU 2e44 Exit: request from 172.18.0.9:58400" +"2019-07-20 02:40:31.204 UTC [comm.grpc.server] 1 -> INFO 2e45 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58400 grpc.code=OK grpc.call_duration=4.198ms +"2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e46 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.207 UTC [grpc] infof -> DEBU 2e47 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.352 UTC [endorser] ProcessProposal -> DEBU 2e48 Entering: request from 172.18.0.9:58404" +"2019-07-20 02:40:31.352 UTC [protoutils] ValidateProposalMessage -> DEBU 2e49 ValidateProposalMessage starts for signed proposal 0xc00399e690" +"2019-07-20 02:40:31.352 UTC [protoutils] validateChannelHeader -> DEBU 2e4a validateChannelHeader info: header type 3" +"2019-07-20 02:40:31.352 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4b begin" +"2019-07-20 02:40:31.352 UTC [msp] GetManagerForChain -> DEBU 2e4c Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e4e creator is valid" +"2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e4f Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| +00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" +"2019-07-20 02:40:31.353 UTC [msp.identity] Verify -> DEBU 2e50 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| +00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| +00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| +00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| +00000040 2f d2 8f aa 25 45 75 |/...%Eu|" +"2019-07-20 02:40:31.353 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e51 exits successfully" +"2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e52 validateChaincodeProposalMessage starts for proposal 0xc002a5ad90, header 0xc00399eaa0" +"2019-07-20 02:40:31.353 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e53 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-07-20 02:40:31.353 UTC [endorser] preProcess -> DEBU 2e54 [businesschannel][7925c232] processing txid: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3" +"2019-07-20 02:40:31.353 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e55 retrieveTransactionByID() - txId = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +"2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2e56 constructing new tx simulator" +"2019-07-20 02:40:31.354 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2e57 constructing new tx simulator txid = [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +"2019-07-20 02:40:31.354 UTC [endorser] SimulateProposal -> DEBU 2e58 [businesschannel][7925c232] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.354 UTC [endorser] callChaincode -> INFO 2e59 [businesschannel][7925c232] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.354 UTC [chaincode] Execute -> DEBU 2e5a Entry" +"2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5b acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +"2019-07-20 02:40:31.354 UTC [aclmgmt] CheckACL -> DEBU 2e5c acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.354 UTC [policies] Evaluate -> DEBU 2e5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e60 0xc003810b80 gate 1563590431355085800 evaluation starts" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e61 0xc003810b80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e62 0xc003810b80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e63 0xc003810b80 principal matched by identity 0" +"2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e64 Verify: digest = 00000000 77 41 14 34 63 ad 27 1e e3 ee 18 4f 8a 36 b2 89 |wA.4c.'....O.6..| +00000010 d9 ca 87 b4 ce 08 5f 15 ae 55 bd 64 24 f0 da e8 |......_..U.d$...|" +"2019-07-20 02:40:31.355 UTC [msp.identity] Verify -> DEBU 2e65 Verify: sig = 00000000 30 45 02 21 00 fb d9 85 24 63 ca d1 96 95 5e 9f |0E.!....$c....^.| +00000010 34 88 fd 08 fa 07 ba 25 55 fe 90 5d 47 f8 15 79 |4......%U..]G..y| +00000020 11 db 91 f6 30 02 20 32 23 11 66 11 96 1f ad e1 |....0. 2#.f.....| +00000030 3b 07 49 49 18 f6 f7 79 29 68 ac 7b df de 77 50 |;.II...y)h.{..wP| +00000040 2f d2 8f aa 25 45 75 |/...%Eu|" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func2 -> DEBU 2e66 0xc003810b80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.355 UTC [cauthdsl] func1 -> DEBU 2e67 0xc003810b80 gate 1563590431355085800 evaluation succeeds" +"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e68 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.355 UTC [policies] Evaluate -> DEBU 2e69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.356 UTC [policies] Evaluate -> DEBU 2e6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.356 UTC [chaincode] handleMessage -> DEBU 2e6c [7925c232] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +"2019-07-20 02:40:31.356 UTC [chaincode] HandleTransaction -> DEBU 2e6d [7925c232] handling GET_STATE_BY_RANGE from chaincode" +"2019-07-20 02:40:31.356 UTC [leveldbhelper] GetIterator -> DEBU 2e6e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +"2019-07-20 02:40:31.356 UTC [rwsetutil] AddResult -> DEBU 2e6f Adding a result" +"2019-07-20 02:40:31.356 UTC [chaincode] HandleGetStateByRange -> DEBU 2e70 Got keys and values. Sending RESPONSE" +"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e71 [7925c232] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +"2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e72 [7925c232] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e73 [7925c232] handling QUERY_STATE_CLOSE from chaincode" +"2019-07-20 02:40:31.365 UTC [chaincode] HandleTransaction -> DEBU 2e74 [7925c232] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +"2019-07-20 02:40:31.365 UTC [chaincode] handleMessage -> DEBU 2e75 [7925c232] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:31.366 UTC [chaincode] Notify -> DEBU 2e76 [7925c232] notifying Txid:7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, channelID:businesschannel" +"2019-07-20 02:40:31.366 UTC [chaincode] Execute -> DEBU 2e77 Exit" +"2019-07-20 02:40:31.366 UTC [endorser] callChaincode -> INFO 2e78 [businesschannel][7925c232] Exit chaincode: name:"lscc" (12ms)" +"2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2e79 Simulation completed, getting simulation results" +"2019-07-20 02:40:31.366 UTC [lockbasedtxmgr] Done -> DEBU 2e7a Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +"2019-07-20 02:40:31.366 UTC [endorser] SimulateProposal -> DEBU 2e7b [businesschannel][7925c232] Exit" +"2019-07-20 02:40:31.366 UTC [endorser] endorseProposal -> DEBU 2e7c [businesschannel][7925c232] Entry chaincode: name:"lscc" " +"2019-07-20 02:40:31.367 UTC [endorser] endorseProposal -> DEBU 2e7d [businesschannel][7925c232] escc for chaincode name:"lscc" is escc" +"2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e7e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" +"2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e7f Sign: plaintext: 0A209AF619A7859ADC410AEE54B475C5...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:31.367 UTC [msp.identity] Sign -> DEBU 2e80 Sign: digest: 66D9F0AE6A8B6D0BDFA74EC725FED4FAB07281773EC61CB4846DDF0E5D851AEF " +"2019-07-20 02:40:31.367 UTC [endorser] EndorseWithPlugin -> DEBU 2e81 Exiting {plugin: escc, channel: businesschannel, tx: 7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3, chaincode: lscc}" +"2019-07-20 02:40:31.368 UTC [endorser] endorseProposal -> DEBU 2e82 [businesschannel][7925c232] Exit" +"2019-07-20 02:40:31.368 UTC [lockbasedtxmgr] Done -> DEBU 2e83 Done with transaction simulation / query execution [7925c2329ea7c2d42d1a34cfb9a604bb88c934c8be51a96f0f35430255768fa3]" +"2019-07-20 02:40:31.368 UTC [endorser] func1 -> DEBU 2e84 Exit: request from 172.18.0.9:58404" +"2019-07-20 02:40:31.368 UTC [comm.grpc.server] 1 -> INFO 2e85 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58404 grpc.code=OK grpc.call_duration=16.3707ms +"2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e86 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.375 UTC [grpc] infof -> DEBU 2e87 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.719 UTC [endorser] ProcessProposal -> DEBU 2e88 Entering: request from 172.18.0.9:58408" +"2019-07-20 02:40:31.719 UTC [protoutils] ValidateProposalMessage -> DEBU 2e89 ValidateProposalMessage starts for signed proposal 0xc003d22410" +"2019-07-20 02:40:31.720 UTC [protoutils] validateChannelHeader -> DEBU 2e8a validateChannelHeader info: header type 3" +"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8b begin" +"2019-07-20 02:40:31.720 UTC [msp] GetManagerForChain -> DEBU 2e8c Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:31.720 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e8e creator is valid" +"2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e8f Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| +00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" +"2019-07-20 02:40:31.720 UTC [msp.identity] Verify -> DEBU 2e90 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| +00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| +00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| +00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| +00000040 d1 d0 19 37 df b2 |...7..|" +"2019-07-20 02:40:31.721 UTC [protoutils] checkSignatureFromCreator -> DEBU 2e91 exits successfully" +"2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e92 validateChaincodeProposalMessage starts for proposal 0xc0029ac1c0, header 0xc003d22870" +"2019-07-20 02:40:31.721 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2e93 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-07-20 02:40:31.721 UTC [endorser] preProcess -> DEBU 2e94 [businesschannel][dd8fd934] processing txid: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a" +"2019-07-20 02:40:31.721 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2e95 retrieveTransactionByID() - txId = [dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a]" +"2019-07-20 02:40:31.721 UTC [endorser] SimulateProposal -> DEBU 2e96 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.721 UTC [endorser] callChaincode -> INFO 2e97 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.721 UTC [chaincode] Execute -> DEBU 2e98 Entry" +"2019-07-20 02:40:31.722 UTC [qscc] Invoke -> DEBU 2e99 Invoke function: GetChainInfo on chain: businesschannel" +"2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-07-20 02:40:31.722 UTC [aclmgmt] CheckACL -> DEBU 2e9b acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.722 UTC [policies] Evaluate -> DEBU 2e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.722 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003b4c0c0 gate 1563590431722676400 evaluation starts" +"2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea0 0xc003b4c0c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.722 UTC [cauthdsl] func2 -> DEBU 2ea1 0xc003b4c0c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc003b4c0c0 principal matched by identity 0" +"2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea3 Verify: digest = 00000000 f3 76 3b 29 1f a0 88 e0 7e 8e a9 4e 87 4a 62 9b |.v;)....~..N.Jb.| +00000010 f0 0f 57 5c 4d e6 bd 4c 15 bd ce f8 e0 77 ab 37 |..W\M..L.....w.7|" +"2019-07-20 02:40:31.723 UTC [msp.identity] Verify -> DEBU 2ea4 Verify: sig = 00000000 30 44 02 20 6f c2 7c 09 cc 43 00 70 86 8e b2 4b |0D. o.|..C.p...K| +00000010 fc a6 ce f6 79 d3 bc db 9a cc 2e 00 58 c5 26 eb |....y.......X.&.| +00000020 fb 4f c1 92 02 20 0f c4 96 3d 20 f8 05 23 86 7d |.O... ...= ..#.}| +00000030 66 6e c2 32 12 9c f0 50 22 92 d8 03 f5 bb 76 62 |fn.2...P".....vb| +00000040 d1 d0 19 37 df b2 |...7..|" +"2019-07-20 02:40:31.723 UTC [cauthdsl] func2 -> DEBU 2ea5 0xc003b4c0c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.723 UTC [cauthdsl] func1 -> DEBU 2ea6 0xc003b4c0c0 gate 1563590431722676400 evaluation succeeds" +"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea7 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.723 UTC [policies] Evaluate -> DEBU 2ea9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.724 UTC [policies] Evaluate -> DEBU 2eaa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.724 UTC [chaincode] handleMessage -> DEBU 2eab [dd8fd934] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:31.724 UTC [chaincode] Notify -> DEBU 2eac [dd8fd934] notifying Txid:dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, channelID:businesschannel" +"2019-07-20 02:40:31.724 UTC [chaincode] Execute -> DEBU 2ead Exit" +"2019-07-20 02:40:31.724 UTC [endorser] callChaincode -> INFO 2eae [businesschannel][dd8fd934] Exit chaincode: name:"qscc" (2ms)" +"2019-07-20 02:40:31.724 UTC [endorser] SimulateProposal -> DEBU 2eaf [businesschannel][dd8fd934] Exit" +"2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb0 [businesschannel][dd8fd934] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.724 UTC [endorser] endorseProposal -> DEBU 2eb1 [businesschannel][dd8fd934] escc for chaincode name:"qscc" is escc" +"2019-07-20 02:40:31.724 UTC [endorser] EndorseWithPlugin -> DEBU 2eb2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" +"2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb3 Sign: plaintext: 0A2070FDD43188AE8CAE2BB47E6B654F...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:31.725 UTC [msp.identity] Sign -> DEBU 2eb4 Sign: digest: FDDD85326B9859D771E0B5898B5DF6BDBAF7EE9E62BB1F52B98D226C565011A3 " +"2019-07-20 02:40:31.725 UTC [endorser] EndorseWithPlugin -> DEBU 2eb5 Exiting {plugin: escc, channel: businesschannel, tx: dd8fd934845813114ae1bbdf0ae33d830d11ffcaa3a2ad58afdc10a7be78882a, chaincode: qscc}" +"2019-07-20 02:40:31.725 UTC [endorser] endorseProposal -> DEBU 2eb6 [businesschannel][dd8fd934] Exit" +"2019-07-20 02:40:31.725 UTC [endorser] func1 -> DEBU 2eb7 Exit: request from 172.18.0.9:58408" +"2019-07-20 02:40:31.725 UTC [comm.grpc.server] 1 -> INFO 2eb8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58408 grpc.code=OK grpc.call_duration=6.2471ms +"2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eb9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.728 UTC [grpc] infof -> DEBU 2eba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.873 UTC [endorser] ProcessProposal -> DEBU 2ebb Entering: request from 172.18.0.9:58412" +"2019-07-20 02:40:31.873 UTC [protoutils] ValidateProposalMessage -> DEBU 2ebc ValidateProposalMessage starts for signed proposal 0xc003d23950" +"2019-07-20 02:40:31.873 UTC [protoutils] validateChannelHeader -> DEBU 2ebd validateChannelHeader info: header type 3" +"2019-07-20 02:40:31.873 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ebe begin" +"2019-07-20 02:40:31.874 UTC [msp] GetManagerForChain -> DEBU 2ebf Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec0 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:31.874 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ec1 creator is valid" +"2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| +00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" +"2019-07-20 02:40:31.874 UTC [msp.identity] Verify -> DEBU 2ec3 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| +00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| +00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| +00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ec4 exits successfully" +"2019-07-20 02:40:31.874 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec5 validateChaincodeProposalMessage starts for proposal 0xc0029ac620, header 0xc003d23db0" +"2019-07-20 02:40:31.875 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ec6 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-07-20 02:40:31.875 UTC [endorser] preProcess -> DEBU 2ec7 [businesschannel][b2c8af94] processing txid: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67" +"2019-07-20 02:40:31.875 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ec8 retrieveTransactionByID() - txId = [b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67]" +"2019-07-20 02:40:31.875 UTC [endorser] SimulateProposal -> DEBU 2ec9 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.875 UTC [endorser] callChaincode -> INFO 2eca [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.875 UTC [chaincode] Execute -> DEBU 2ecb Entry" +"2019-07-20 02:40:31.875 UTC [qscc] Invoke -> DEBU 2ecc Invoke function: GetBlockByNumber on chain: businesschannel" +"2019-07-20 02:40:31.875 UTC [aclmgmt] CheckACL -> DEBU 2ecd acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +"2019-07-20 02:40:31.876 UTC [aclmgmt] CheckACL -> DEBU 2ece acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ecf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.876 UTC [policies] Evaluate -> DEBU 2ed1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.876 UTC [cauthdsl] func1 -> DEBU 2ed2 0xc0003ddce0 gate 1563590431876580200 evaluation starts" +"2019-07-20 02:40:31.876 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003ddce0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003ddce0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.877 UTC [cauthdsl] func2 -> DEBU 2ed5 0xc0003ddce0 principal matched by identity 0" +"2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: digest = 00000000 86 1a 70 e6 b0 17 55 f5 b1 1c fa 99 b5 c1 50 dc |..p...U.......P.| +00000010 ef f1 79 c3 1c fa f0 35 ad 15 f5 3c 97 48 92 00 |..y....5...<.H..|" +"2019-07-20 02:40:31.877 UTC [msp.identity] Verify -> DEBU 2ed7 Verify: sig = 00000000 30 45 02 21 00 cc e3 3a 87 2c 19 de 52 4a 85 64 |0E.!...:.,..RJ.d| +00000010 a7 8d b7 02 1d 56 09 5a 54 e9 b6 9f 8b 1f e9 50 |.....V.ZT......P| +00000020 4f cd 3e 7a db 02 20 01 43 4d 9d bc f9 2f f0 a9 |O.>z.. .CM.../..| +00000030 38 93 42 20 72 e9 78 7f d0 5f 43 47 3c 6a d7 d1 |8.B r.x.._CG DEBU 2ed8 0xc0003ddce0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.877 UTC [cauthdsl] func1 -> DEBU 2ed9 0xc0003ddce0 gate 1563590431876580200 evaluation succeeds" +"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2eda Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.877 UTC [policies] Evaluate -> DEBU 2edc Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.878 UTC [policies] Evaluate -> DEBU 2edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.878 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 2ede retrieveBlockByNumber() - blockNum = [2]" +"2019-07-20 02:40:31.878 UTC [fsblkstorage] newBlockfileStream -> DEBU 2edf newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47677]" +"2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee0 Remaining bytes=[36402], Going to peek [8] bytes" +"2019-07-20 02:40:31.878 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ee1 Returning blockbytes - length=[23781], placementInfo={fileNum=[0], startOffset=[47677], bytesOffset=[47680]}" +"2019-07-20 02:40:31.879 UTC [chaincode] handleMessage -> DEBU 2ee2 [b2c8af94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:31.879 UTC [chaincode] Notify -> DEBU 2ee3 [b2c8af94] notifying Txid:b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, channelID:businesschannel" +"2019-07-20 02:40:31.879 UTC [chaincode] Execute -> DEBU 2ee4 Exit" +"2019-07-20 02:40:31.879 UTC [endorser] callChaincode -> INFO 2ee5 [businesschannel][b2c8af94] Exit chaincode: name:"qscc" (4ms)" +"2019-07-20 02:40:31.879 UTC [endorser] SimulateProposal -> DEBU 2ee6 [businesschannel][b2c8af94] Exit" +"2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee7 [businesschannel][b2c8af94] Entry chaincode: name:"qscc" " +"2019-07-20 02:40:31.880 UTC [endorser] endorseProposal -> DEBU 2ee8 [businesschannel][b2c8af94] escc for chaincode name:"qscc" is escc" +"2019-07-20 02:40:31.880 UTC [endorser] EndorseWithPlugin -> DEBU 2ee9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" +"2019-07-20 02:40:31.880 UTC [msp.identity] Sign -> DEBU 2eea Sign: plaintext: 0A2036A3CDEF14D19587AB9EF2BCE767...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:31.881 UTC [msp.identity] Sign -> DEBU 2eeb Sign: digest: C4F9350E47494E49BCA826CFABD27DC035B15BABCC5B92822587F660B0B5F404 " +"2019-07-20 02:40:31.881 UTC [endorser] EndorseWithPlugin -> DEBU 2eec Exiting {plugin: escc, channel: businesschannel, tx: b2c8af9426bbc94375831b12ee02faa737c2dad9b58e1b1b5a7466e851cb4b67, chaincode: qscc}" +"2019-07-20 02:40:31.881 UTC [endorser] endorseProposal -> DEBU 2eed [businesschannel][b2c8af94] Exit" +"2019-07-20 02:40:31.881 UTC [endorser] func1 -> DEBU 2eee Exit: request from 172.18.0.9:58412" +"2019-07-20 02:40:31.882 UTC [comm.grpc.server] 1 -> INFO 2eef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58412 grpc.code=OK grpc.call_duration=8.8663ms +"2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.887 UTC [grpc] warningf -> DEBU 2ef1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58412: read: connection reset by peer" +"2019-07-20 02:40:31.887 UTC [grpc] infof -> DEBU 2ef2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:31.899 UTC [gossip.comm] func1 -> DEBU 2ef3 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.899 UTC [gossip.gossip] handleMessage -> DEBU 2ef4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.900 UTC [gossip.gossip] handleMessage -> DEBU 2ef5 Exiting" +"2019-07-20 02:40:31.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ef6 Got message: GossipMessage: tag:EMPTY mem_req:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ef7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:31.900 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" +"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ef9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efa Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:31.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.902 UTC [policies] Evaluate -> DEBU 2efe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.902 UTC [cauthdsl] func1 -> DEBU 2eff 0xc0002defe0 gate 1563590431902859400 evaluation starts" +"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f00 0xc0002defe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0002defe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.903 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0002defe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0002defe0 principal evaluation fails" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f04 0xc0002defe0 gate 1563590431902859400 evaluation fails" +"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.904 UTC [policies] Evaluate -> DEBU 2f07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func1 -> DEBU 2f08 0xc0002df830 gate 1563590431904830900 evaluation starts" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f09 0xc0002df830 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0a 0xc0002df830 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.904 UTC [cauthdsl] func2 -> DEBU 2f0b 0xc0002df830 principal matched by identity 0" +"2019-07-20 02:40:31.904 UTC [msp.identity] Verify -> DEBU 2f0c Verify: digest = 00000000 4a 3c a8 97 ce 24 57 51 8e 87 51 64 33 0f 25 92 |J<...$WQ..Qd3.%.| +00000010 d8 a5 69 b9 1a 02 bf 17 f5 e4 d6 78 8a 4c 44 3c |..i........x.LD<|" +"2019-07-20 02:40:31.905 UTC [msp.identity] Verify -> DEBU 2f0d Verify: sig = 00000000 30 45 02 21 00 e7 e9 e4 66 f3 56 fa 3e 9d 43 8d |0E.!....f.V.>.C.| +00000010 c9 39 a6 3b ef 67 3f 6f 88 29 cb 62 a9 23 d5 4c |.9.;.g?o.).b.#.L| +00000020 ba 6f a8 e8 aa 02 20 7a 33 30 08 47 98 6c 93 c9 |.o.... z30.G.l..| +00000030 29 e1 b6 ab 0c 04 cf 3b 7b 3a 5a e4 e1 9a 9b 6b |)......;{:Z....k| +00000040 61 ae 3f 2f 04 68 dc |a.?/.h.|" +"2019-07-20 02:40:31.905 UTC [cauthdsl] func2 -> DEBU 2f0e 0xc0002df830 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.905 UTC [cauthdsl] func1 -> DEBU 2f0f 0xc0002df830 gate 1563590431904830900 evaluation succeeds" +"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f12 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.905 UTC [policies] Evaluate -> DEBU 2f13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f14 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f15 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f16 updating membership: timestamp: " +"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f17 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f18 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f19 Exiting" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f1a Exiting" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" +"2019-07-20 02:40:31.905 UTC [gossip.discovery] sendMemResponse -> DEBU 2f1c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:31.905 UTC [msp] DeserializeIdentity -> DEBU 2f1d Obtaining identity" +"2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1e Obtaining identity" +"2019-07-20 02:40:31.906 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" +"2019-07-20 02:40:31.906 UTC [gossip.comm] Send -> DEBU 2f20 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:31.906 UTC [gossip.discovery] sendMemResponse -> DEBU 2f21 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020'" signature:"0D\002 xO\354w$\350T\201B~\256y\363K\023\326\310\274\353\377r\367\315EQ\205U\370\343Y\2147\002 r\356\0252\357%CLl8<.\234G\234\254W\312\364\270\301\336\013\320at&a\202-D\220" > alive: alive:\235C\215\3119\246;\357g?o\210)\313b\251#\325L\272o\250\350\252\002 z30\010G\230l\223\311)\341\266\253\014\004\317;{:Z\344\341\232\233ka\256?/\004h\334" > alive: " +"2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.906 UTC [gossip.comm] sendToEndpoint -> DEBU 2f23 Exiting" +"2019-07-20 02:40:31.931 UTC [gossip.comm] func1 -> DEBU 2f24 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.931 UTC [gossip.gossip] handleMessage -> DEBU 2f25 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.931 UTC [gossip.pull] HandleMessage -> DEBU 2f26 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:31.931 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" +"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f28 Obtaining identity" +"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2a Obtaining identity" +"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2b Obtaining identity" +"2019-07-20 02:40:31.932 UTC [msp] DeserializeIdentity -> DEBU 2f2c Obtaining identity" +"2019-07-20 02:40:31.933 UTC [gossip.pull] SendDigest -> DEBU 2f2d Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:31.933 UTC [gossip.gossip] handleMessage -> DEBU 2f2e Exiting" +"2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f2f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:31.968 UTC [gossip.election] IsLeader -> DEBU 2f30 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:31.968 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f31 Obtaining default signing identity" +"2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f32 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100B1801 " +"2019-07-20 02:40:31.968 UTC [msp.identity] Sign -> DEBU 2f33 Sign: digest: 2F26E4B97497DB1253FB70B9B9C3E2C6F0505DF73F214674042C23DD57685088 " +"2019-07-20 02:40:31.968 UTC [gossip.election] waitForInterrupt -> DEBU 2f34 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:31.974 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.974 UTC [gossip.gossip] handleMessage -> DEBU 2f37 Exiting" +"2019-07-20 02:40:31.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f38 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.974 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:31.974 UTC [msp] DeserializeIdentity -> DEBU 2f3a Obtaining identity" +"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:31.974 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f3d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:31.975 UTC [policies] Evaluate -> DEBU 2f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:31.975 UTC [cauthdsl] func1 -> DEBU 2f41 0xc000267050 gate 1563590431975107500 evaluation starts" +"2019-07-20 02:40:31.975 UTC [cauthdsl] func2 -> DEBU 2f42 0xc000267050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f43 0xc000267050 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f44 0xc000267050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:31.976 UTC [cauthdsl] func2 -> DEBU 2f45 0xc000267050 principal evaluation fails" +"2019-07-20 02:40:31.976 UTC [cauthdsl] func1 -> DEBU 2f46 0xc000267050 gate 1563590431975107500 evaluation fails" +"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f47 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:31.976 UTC [policies] Evaluate -> DEBU 2f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f4a 0xc0002678d0 gate 1563590431976993400 evaluation starts" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0002678d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4c 0xc0002678d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f4d 0xc0002678d0 principal matched by identity 0" +"2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4e Verify: digest = 00000000 0b 08 da b1 e5 fb 95 4c 01 d7 21 e0 a3 01 36 58 |.......L..!...6X| +00000010 13 e9 fe e7 af 03 d2 1b 72 3d 58 a9 50 b9 92 9e |........r=X.P...|" +"2019-07-20 02:40:31.977 UTC [msp.identity] Verify -> DEBU 2f4f Verify: sig = 00000000 30 45 02 21 00 80 78 32 b8 90 6b ec fc c7 70 c0 |0E.!..x2..k...p.| +00000010 50 95 d1 12 8f e0 41 8b 80 19 9d bc c7 7d 24 f3 |P.....A......}$.| +00000020 e6 f7 30 50 84 02 20 5d b3 a7 9c e9 7a 6b b0 66 |..0P.. ]....zk.f| +00000030 0b 1c a9 aa 1b 3f 6b 33 fa e0 3e c4 3a 77 06 49 |.....?k3..>.:w.I| +00000040 ad 06 35 1a 4b 87 1e |..5.K..|" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func2 -> DEBU 2f50 0xc0002678d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:31.977 UTC [cauthdsl] func1 -> DEBU 2f51 0xc0002678d0 gate 1563590431976993400 evaluation succeeds" +"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f54 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:31.979 UTC [policies] Evaluate -> DEBU 2f55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:31.979 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f58 updating membership: timestamp: " +"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f59 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:31.980 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f5b Exiting" +"2019-07-20 02:40:31.980 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f5c Exiting" +"2019-07-20 02:40:31.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f5d Exiting" +"2019-07-20 02:40:31.980 UTC [gossip.comm] func1 -> DEBU 2f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.980 UTC [msp] DeserializeIdentity -> DEBU 2f5f Obtaining identity" +"2019-07-20 02:40:31.980 UTC [gossip.gossip] handleMessage -> DEBU 2f60 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f61 Exiting" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f62 Obtaining identity" +"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f63 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f64 Obtaining identity" +"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f65 Exiting" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f66 Obtaining identity" +"2019-07-20 02:40:31.981 UTC [gossip.comm] Send -> DEBU 2f68 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:31.981 UTC [gossip.comm] func1 -> DEBU 2f67 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f69 Obtaining identity" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6a Obtaining identity" +"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.981 UTC [gossip.gossip] handleMessage -> DEBU 2f6c Exiting" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f6d Obtaining identity" +"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.981 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f6f Exiting" +"2019-07-20 02:40:31.981 UTC [msp] DeserializeIdentity -> DEBU 2f70 Obtaining identity" +"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f72 Obtaining identity" +"2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f73 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" +"2019-07-20 02:40:31.982 UTC [msp] DeserializeIdentity -> DEBU 2f75 Obtaining identity" +"2019-07-20 02:40:31.982 UTC [gossip.comm] Send -> DEBU 2f76 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.982 UTC [gossip.comm] sendToEndpoint -> DEBU 2f78 Exiting" +"2019-07-20 02:40:31.983 UTC [gossip.comm] sendToEndpoint -> DEBU 2f79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7a Exiting" +"2019-07-20 02:40:31.984 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:31.985 UTC [gossip.comm] sendToEndpoint -> DEBU 2f7c Exiting" +"2019-07-20 02:40:32.226 UTC [gossip.pull] Hello -> DEBU 2f7d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f7e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f7f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:32.227 UTC [gossip.comm] Send -> DEBU 2f80 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.227 UTC [gossip.pull] Hello -> DEBU 2f81 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:32.228 UTC [gossip.comm] Send -> DEBU 2f83 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f84 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f85 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f86 Exiting" +"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f87 Exiting" +"2019-07-20 02:40:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 2f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.228 UTC [gossip.comm] sendToEndpoint -> DEBU 2f88 Exiting" +"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8a Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.230 UTC [gossip.comm] func1 -> DEBU 2f8b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.230 UTC [gossip.gossip] handleMessage -> DEBU 2f8c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.231 UTC [gossip.pull] HandleMessage -> DEBU 2f8d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" +"2019-07-20 02:40:32.231 UTC [gossip.gossip] handleMessage -> DEBU 2f8f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f90 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f91 Exiting" +"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f92 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.232 UTC [gossip.pull] HandleMessage -> DEBU 2f93 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.232 UTC [gossip.gossip] handleMessage -> DEBU 2f94 Exiting" +"2019-07-20 02:40:32.268 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f95 Obtaining default signing identity" +"2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f96 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151024 " +"2019-07-20 02:40:32.268 UTC [msp.identity] Sign -> DEBU 2f97 Sign: digest: 11880CBF20E9DB2890F54E010AACD2C7F187ED0030E16E6018FEB365E8332922 " +"2019-07-20 02:40:32.269 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f98 Obtaining default signing identity" +"2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f99 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:32.269 UTC [msp.identity] Sign -> DEBU 2f9a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:32.269 UTC [msp] DeserializeIdentity -> DEBU 2f9b Obtaining identity" +"2019-07-20 02:40:32.269 UTC [gossip.comm] Send -> DEBU 2f9c Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.270 UTC [msp] DeserializeIdentity -> DEBU 2f9d Obtaining identity" +"2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9e Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.270 UTC [gossip.comm] Send -> DEBU 2f9f Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa1 Exiting" +"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.270 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa3 Exiting" +"2019-07-20 02:40:32.271 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.273 UTC [gossip.comm] sendToEndpoint -> DEBU 2fa6 Exiting" +"2019-07-20 02:40:32.273 UTC [gossip.comm] func1 -> DEBU 2fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.272 UTC [gossip.comm] func1 -> DEBU 2fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2fa9 Exiting" +"2019-07-20 02:40:32.273 UTC [gossip.gossip] handleMessage -> DEBU 2faa Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.274 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fac Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +00000040 2f 63 20 e5 1e f8 |/c ...|" +"2019-07-20 02:40:32.275 UTC [gossip.comm] func1 -> DEBU 2faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.275 UTC [msp.identity] Verify -> DEBU 2fb0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:32.276 UTC [msp.identity] Verify -> DEBU 2fb1 Verify: sig = 00000000 30 44 02 20 02 0e 0b f7 41 03 4f 30 6b c2 7e 44 |0D. ....A.O0k.~D| +00000010 e6 e7 27 82 f5 81 a2 72 0e 8c 08 b3 3b 39 9e 10 |..'....r....;9..| +00000020 37 a2 5f 39 02 20 7b 0d 90 0c 12 0b 34 94 7f 69 |7._9. {.....4..i| +00000030 16 b8 7f 74 d7 c8 92 18 39 d4 02 65 b9 e2 06 33 |...t....9..e...3| +00000040 7d 37 1e 54 64 9f |}7.Td.|" +"2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:32.277 UTC [gossip.discovery] isSentByMe -> DEBU 2fb3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:32.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb4 Exiting" +"2019-07-20 02:40:32.278 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb5 Exiting" +"2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb6 Exiting" +"2019-07-20 02:40:32.278 UTC [gossip.gossip] handleMessage -> DEBU 2fb7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.279 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fb8 Obtaining default signing identity" +"2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151025 " +"2019-07-20 02:40:32.279 UTC [msp.identity] Sign -> DEBU 2fbb Sign: digest: 8009FFDB913E4C620E5BA94DB01E28E781CF96B1CDF79A2614F455E82EFAB0DD " +"2019-07-20 02:40:32.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fbc Obtaining default signing identity" +"2019-07-20 02:40:32.280 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fbd Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbe Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:32.280 UTC [msp.identity] Sign -> DEBU 2fbf Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:32.280 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2fc0 Sleeping 5s" +"2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc1 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +"2019-07-20 02:40:32.281 UTC [msp.identity] Verify -> DEBU 2fc2 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +00000040 26 61 82 2d 44 90 |&a.-D.|" +"2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.281 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fc4 Exiting" +"2019-07-20 02:40:32.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fc5 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:32.282 UTC [msp.identity] Verify -> DEBU 2fc6 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +"2019-07-20 02:40:32.283 UTC [msp.identity] Verify -> DEBU 2fc7 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +00000040 2f 63 20 e5 1e f8 |/c ...|" +"2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc8 Obtaining identity" +"2019-07-20 02:40:32.283 UTC [msp] DeserializeIdentity -> DEBU 2fc9 Obtaining identity" +"2019-07-20 02:40:32.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.283 UTC [gossip.discovery] isSentByMe -> DEBU 2fcb Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fcc Exiting" +"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcd Exiting" +"2019-07-20 02:40:32.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fd0 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:32.284 UTC [gossip.comm] Send -> DEBU 2fce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" +"2019-07-20 02:40:32.285 UTC [gossip.comm] Send -> DEBU 2fd2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.285 UTC [msp] DeserializeIdentity -> DEBU 2fd3 Obtaining identity" +"2019-07-20 02:40:32.285 UTC [msp.identity] Verify -> DEBU 2fd4 Verify: digest = 00000000 11 88 0c bf 20 e9 db 28 90 f5 4e 01 0a ac d2 c7 |.... ..(..N.....| +00000010 f1 87 ed 00 30 e1 6e 60 18 fe b3 65 e8 33 29 22 |....0.n`...e.3)"|" +"2019-07-20 02:40:32.286 UTC [msp.identity] Verify -> DEBU 2fd5 Verify: sig = 00000000 30 44 02 21 00 f1 84 ce 61 31 35 e6 89 89 81 13 |0D.!....a15.....| +00000010 d7 0f 3d ac e1 ee cf 28 b0 bd 0a 13 57 b7 e1 46 |..=....(....W..F| +00000020 cc f8 2f 76 12 02 1f 68 18 82 97 3a f8 1a 27 aa |../v...h...:..'.| +00000030 b0 d3 62 df fa 56 b2 96 41 39 37 d0 09 01 70 93 |..b..V..A97...p.| +00000040 2f 63 20 e5 1e f8 |/c ...|" +"2019-07-20 02:40:32.286 UTC [gossip.comm] Send -> DEBU 2fd6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd8 Exiting" +"2019-07-20 02:40:32.286 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdb Exiting" +"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fdc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.287 UTC [gossip.comm] sendToEndpoint -> DEBU 2fde Exiting" +"2019-07-20 02:40:32.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fda Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.287 UTC [gossip.discovery] isSentByMe -> DEBU 2fdf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fe0 Exiting" +"2019-07-20 02:40:32.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fe1 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:32.288 UTC [msp] DeserializeIdentity -> DEBU 2fe2 Obtaining identity" +"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.289 UTC [policies] Evaluate -> DEBU 2fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.290 UTC [policies] Evaluate -> DEBU 2fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.290 UTC [cauthdsl] func1 -> DEBU 2fe9 0xc00019d7a0 gate 1563590432290108200 evaluation starts" +"2019-07-20 02:40:32.287 UTC [gossip.gossip] handleMessage -> DEBU 2fdd Exiting" +"2019-07-20 02:40:32.290 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00019d7a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.292 UTC [cauthdsl] func2 -> DEBU 2feb 0xc00019d7a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fec 0xc00019d7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.293 UTC [cauthdsl] func2 -> DEBU 2fed 0xc00019d7a0 principal evaluation fails" +"2019-07-20 02:40:32.293 UTC [cauthdsl] func1 -> DEBU 2fee 0xc00019d7a0 gate 1563590432290108200 evaluation fails" +"2019-07-20 02:40:32.293 UTC [policies] Evaluate -> DEBU 2fef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.294 UTC [policies] Evaluate -> DEBU 2ff1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.294 UTC [cauthdsl] func1 -> DEBU 2ff2 0xc00042a050 gate 1563590432294502100 evaluation starts" +"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff3 0xc00042a050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff4 0xc00042a050 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.294 UTC [cauthdsl] func2 -> DEBU 2ff5 0xc00042a050 principal matched by identity 0" +"2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff6 Verify: digest = 00000000 40 2b f7 73 71 07 be 3d 8d 3a 01 a9 b4 d9 fe 90 |@+.sq..=.:......| +00000010 6a c1 c7 c4 33 6e df 0b 76 66 29 af 56 ed 7d 4b |j...3n..vf).V.}K|" +"2019-07-20 02:40:32.295 UTC [msp.identity] Verify -> DEBU 2ff7 Verify: sig = 00000000 30 45 02 21 00 fa 09 c8 75 e9 29 5a 14 9b e7 0e |0E.!....u.)Z....| +00000010 f7 c6 4f 84 1c 13 a9 62 61 1b b7 fb 37 3c d6 d3 |..O....ba...7<..| +00000020 69 a4 91 ec 0e 02 20 37 8d c7 64 07 a9 83 4d de |i..... 7..d...M.| +00000030 20 7b 6c 93 82 bc 01 d2 47 d7 f6 50 ad 2c 70 72 | {l.....G..P.,pr| +00000040 73 f1 a6 87 33 15 00 |s...3..|" +"2019-07-20 02:40:32.295 UTC [cauthdsl] func2 -> DEBU 2ff8 0xc00042a050 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.295 UTC [cauthdsl] func1 -> DEBU 2ff9 0xc00042a050 gate 1563590432294502100 evaluation succeeds" +"2019-07-20 02:40:32.296 UTC [policies] Evaluate -> DEBU 2ffa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffc Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.298 UTC [policies] Evaluate -> DEBU 2ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ffe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.299 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fff Exiting" +"2019-07-20 02:40:32.299 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3000 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3001 Verify: digest = 00000000 ae a7 fd dd bc bd ad 7d 63 74 65 2b 20 63 f1 dd |.......}cte+ c..| +00000010 65 f1 e0 b4 f0 76 63 4b e6 40 e2 10 0f 4b 98 89 |e....vcK.@...K..|" +"2019-07-20 02:40:32.300 UTC [msp.identity] Verify -> DEBU 3002 Verify: sig = 00000000 30 44 02 20 78 4f ec 77 24 e8 54 81 42 7e ae 79 |0D. xO.w$.T.B~.y| +00000010 f3 4b 13 d6 c8 bc eb ff 72 f7 cd 45 51 85 55 f8 |.K......r..EQ.U.| +00000020 e3 59 8c 37 02 20 72 ee 15 32 ef 25 43 4c 6c 38 |.Y.7. r..2.%CLl8| +00000030 3c 2e 9c 47 9c ac 57 ca f4 b8 c1 de 0b d0 61 74 |<..G..W.......at| +00000040 26 61 82 2d 44 90 |&a.-D.|" +"2019-07-20 02:40:32.302 UTC [gossip.discovery] handleAliveMessage -> DEBU 3003 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.303 UTC [gossip.discovery] handleAliveMessage -> DEBU 3004 Exiting" +"2019-07-20 02:40:32.303 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3005 Exiting" +"2019-07-20 02:40:32.333 UTC [gossip.comm] func1 -> DEBU 3006 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 3007 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.335 UTC [gossip.pull] HandleMessage -> DEBU 3008 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.335 UTC [gossip.pull] SendDigest -> DEBU 3009 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:32.335 UTC [gossip.gossip] handleMessage -> DEBU 300a Exiting" +"2019-07-20 02:40:32.340 UTC [gossip.comm] func1 -> DEBU 300b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.340 UTC [gossip.gossip] handleMessage -> DEBU 300d Exiting" +"2019-07-20 02:40:32.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300e Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300f Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3010 Verify: digest = 00000000 3a ad df f3 f8 21 1b 66 29 6b 93 bb b0 c7 a9 21 |:....!.f)k.....!| +00000010 46 2b bb 2d 1d d2 a4 ed fe 33 aa 85 73 15 bf db |F+.-.....3..s...|" +"2019-07-20 02:40:32.342 UTC [msp.identity] Verify -> DEBU 3011 Verify: sig = 00000000 30 44 02 20 2e e6 c6 e9 6a 39 29 84 0d 01 e4 17 |0D. ....j9).....| +00000010 3b cd 3a 85 91 34 dd 08 ce 3a 69 bd 38 8a bc 58 |;.:..4...:i.8..X| +00000020 4c 26 68 2d 02 20 50 b3 06 d9 47 f8 a1 69 f9 fc |L&h-. P...G..i..| +00000030 f0 d3 c4 6f 96 ad 6a 95 06 b1 09 08 7f cb 32 2e |...o..j.......2.| +00000040 03 99 3a 23 cf 54 |..:#.T|" +"2019-07-20 02:40:32.343 UTC [gossip.discovery] handleAliveMessage -> DEBU 3012 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3013 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3014 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3015 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3016 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:32.345 UTC [gossip.discovery] learnExistingMembers -> DEBU 3017 Exiting" +"2019-07-20 02:40:32.346 UTC [gossip.discovery] handleAliveMessage -> DEBU 3018 Exiting" +"2019-07-20 02:40:32.346 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3019 Exiting" +"2019-07-20 02:40:32.347 UTC [gossip.comm] func1 -> DEBU 301a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.347 UTC [gossip.gossip] handleMessage -> DEBU 301c Exiting" +"2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.348 UTC [gossip.discovery] handleMsgFromComm -> DEBU 301e Exiting" +"2019-07-20 02:40:32.348 UTC [msp] DeserializeIdentity -> DEBU 301f Obtaining identity" +"2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3020 Obtaining identity" +"2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3021 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.349 UTC [msp] DeserializeIdentity -> DEBU 3022 Obtaining identity" +"2019-07-20 02:40:32.349 UTC [gossip.comm] Send -> DEBU 3023 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3024 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3025 Exiting" +"2019-07-20 02:40:32.350 UTC [gossip.comm] sendToEndpoint -> DEBU 3026 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3027 Exiting" +"2019-07-20 02:40:32.357 UTC [gossip.comm] func1 -> DEBU 3028 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.357 UTC [gossip.gossip] handleMessage -> DEBU 3029 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.358 UTC [gossip.gossip] handleMessage -> DEBU 302a Exiting" +"2019-07-20 02:40:32.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302b Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 302c Exiting" +"2019-07-20 02:40:32.361 UTC [gossip.comm] func1 -> DEBU 302d Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.361 UTC [gossip.gossip] handleMessage -> DEBU 302f Exiting" +"2019-07-20 02:40:32.363 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3030 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.363 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3031 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3032 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +"2019-07-20 02:40:32.364 UTC [msp.identity] Verify -> DEBU 3033 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +00000040 b4 3a 38 0a 45 dc |.:8.E.|" +"2019-07-20 02:40:32.365 UTC [msp.identity] Verify -> DEBU 3034 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:32.366 UTC [msp.identity] Verify -> DEBU 3035 Verify: sig = 00000000 30 45 02 21 00 d7 b3 77 b9 9c a8 b7 cf 62 94 14 |0E.!...w.....b..| +00000010 1e 48 d0 65 39 ba 66 d5 56 10 15 e8 3a 6c d0 4b |.H.e9.f.V...:l.K| +00000020 5a 40 9d bd 3d 02 20 40 35 bb 23 40 27 a8 c3 2b |Z@..=. @5.#@'..+| +00000030 fa 62 36 d6 d0 83 75 12 06 71 21 86 8a 1b 62 d4 |.b6...u..q!...b.| +00000040 b5 0a 81 7a bb ca 3a |...z..:|" +"2019-07-20 02:40:32.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 3036 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3037 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:32.366 UTC [gossip.discovery] learnExistingMembers -> DEBU 3038 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:32.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 303c Exiting" +"2019-07-20 02:40:32.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 303d Exiting" +"2019-07-20 02:40:32.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303e Exiting" +"2019-07-20 02:40:32.366 UTC [endorser] ProcessProposal -> DEBU 3039 Entering: request from 172.18.0.9:58416" +"2019-07-20 02:40:32.368 UTC [protoutils] ValidateProposalMessage -> DEBU 3040 ValidateProposalMessage starts for signed proposal 0xc000193f40" +"2019-07-20 02:40:32.368 UTC [gossip.discovery] sendMemResponse -> DEBU 303f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:32.368 UTC [protoutils] validateChannelHeader -> DEBU 3041 validateChannelHeader info: header type 3" +"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3042 begin" +"2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3043 Obtaining identity" +"2019-07-20 02:40:32.368 UTC [msp] GetManagerForChain -> DEBU 3044 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:32.368 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is valid" +"2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3048 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| +00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" +"2019-07-20 02:40:32.369 UTC [msp.identity] Verify -> DEBU 3049 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| +00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| +00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| +00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| +00000040 78 fa ad 48 80 25 b3 |x..H.%.|" +"2019-07-20 02:40:32.369 UTC [protoutils] checkSignatureFromCreator -> DEBU 304a exits successfully" +"2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304b validateChaincodeProposalMessage starts for proposal 0xc00015fc00, header 0xc0003b4780" +"2019-07-20 02:40:32.369 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-07-20 02:40:32.368 UTC [msp] DeserializeIdentity -> DEBU 3046 Obtaining identity" +"2019-07-20 02:40:32.370 UTC [endorser] preProcess -> DEBU 304d [businesschannel][334c0366] processing txid: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed" +"2019-07-20 02:40:32.370 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed]" +"2019-07-20 02:40:32.370 UTC [endorser] SimulateProposal -> DEBU 3050 [businesschannel][334c0366] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.370 UTC [endorser] callChaincode -> INFO 3051 [businesschannel][334c0366] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.370 UTC [chaincode] Execute -> DEBU 3052 Entry" +"2019-07-20 02:40:32.370 UTC [gossip.comm] Send -> DEBU 304e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.371 UTC [cscc] Invoke -> DEBU 3053 Invoke function: GetConfigBlock" +"2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3054 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-07-20 02:40:32.371 UTC [aclmgmt] CheckACL -> DEBU 3055 acl check(/Channel/Application/Readers)" +"2019-07-20 02:40:32.371 UTC [gossip.discovery] sendMemResponse -> DEBU 3056 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +"2019-07-20 02:40:32.371 UTC [policies] Evaluate -> DEBU 3057 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.372 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.372 UTC [cauthdsl] func1 -> DEBU 305b 0xc00027f080 gate 1563590432372481400 evaluation starts" +"2019-07-20 02:40:32.372 UTC [cauthdsl] func2 -> DEBU 305c 0xc00027f080 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305d 0xc00027f080 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.371 UTC [gossip.comm] sendToEndpoint -> DEBU 3058 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.373 UTC [cauthdsl] func2 -> DEBU 305e 0xc00027f080 principal matched by identity 0" +"2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3060 Verify: digest = 00000000 e3 1b 8c 63 39 bc 00 d4 f5 b2 a3 1d 7d d3 0f a3 |...c9.......}...| +00000010 ae 8d fc ba dd af 14 e9 c1 34 c8 93 af 43 1c 75 |.........4...C.u|" +"2019-07-20 02:40:32.373 UTC [msp.identity] Verify -> DEBU 3061 Verify: sig = 00000000 30 45 02 21 00 e7 fa f0 2a cd b9 76 e3 3a bb 6d |0E.!....*..v.:.m| +00000010 c6 32 06 b5 16 3b 03 de 3d aa 28 33 f4 6f 6b da |.2...;..=.(3.ok.| +00000020 b0 76 96 0b f9 02 20 64 6b c9 76 46 8b d4 8e 22 |.v.... dk.vF..."| +00000030 03 f9 c9 24 cc 48 f5 e4 4c 3b 09 09 ad 0b df 46 |...$.H..L;.....F| +00000040 78 fa ad 48 80 25 b3 |x..H.%.|" +"2019-07-20 02:40:32.374 UTC [cauthdsl] func2 -> DEBU 3062 0xc00027f080 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.374 UTC [cauthdsl] func1 -> DEBU 3063 0xc00027f080 gate 1563590432372481400 evaluation succeeds" +"2019-07-20 02:40:32.373 UTC [gossip.comm] sendToEndpoint -> DEBU 305f Exiting" +"2019-07-20 02:40:32.374 UTC [policies] Evaluate -> DEBU 3064 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3065 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.375 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.375 UTC [chaincode] handleMessage -> DEBU 3068 [334c0366] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:32.376 UTC [chaincode] Notify -> DEBU 3069 [334c0366] notifying Txid:334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, channelID:businesschannel" +"2019-07-20 02:40:32.376 UTC [chaincode] Execute -> DEBU 306a Exit" +"2019-07-20 02:40:32.376 UTC [endorser] callChaincode -> INFO 306b [businesschannel][334c0366] Exit chaincode: name:"cscc" (6ms)" +"2019-07-20 02:40:32.376 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][334c0366] Exit" +"2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306d [businesschannel][334c0366] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.377 UTC [endorser] endorseProposal -> DEBU 306e [businesschannel][334c0366] escc for chaincode name:"cscc" is escc" +"2019-07-20 02:40:32.377 UTC [endorser] EndorseWithPlugin -> DEBU 306f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" +"2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3070 Sign: plaintext: 0A20C5D1BC40D3FB83F8358FF9F638BD...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:32.377 UTC [msp.identity] Sign -> DEBU 3071 Sign: digest: 0D1E7E24711E974B88D241D66A8434CBF47F1068E52FEF7D15CD5BA472B2DBFF " +"2019-07-20 02:40:32.378 UTC [endorser] EndorseWithPlugin -> DEBU 3072 Exiting {plugin: escc, channel: businesschannel, tx: 334c03669e4265320f8b60486466b23565fa7c475a4b30760b8700111239beed, chaincode: cscc}" +"2019-07-20 02:40:32.378 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][334c0366] Exit" +"2019-07-20 02:40:32.378 UTC [endorser] func1 -> DEBU 3074 Exit: request from 172.18.0.9:58416" +"2019-07-20 02:40:32.378 UTC [comm.grpc.server] 1 -> INFO 3075 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58416 grpc.code=OK grpc.call_duration=12.304ms +"2019-07-20 02:40:32.386 UTC [grpc] infof -> DEBU 3076 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:32.387 UTC [grpc] infof -> DEBU 3077 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:32.522 UTC [gossip.comm] func1 -> DEBU 3078 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3079 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.523 UTC [gossip.pull] HandleMessage -> DEBU 307a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307b Obtaining identity" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307c Obtaining identity" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307d Obtaining identity" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307e Obtaining identity" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 307f Obtaining identity" +"2019-07-20 02:40:32.523 UTC [msp] DeserializeIdentity -> DEBU 3080 Obtaining identity" +"2019-07-20 02:40:32.523 UTC [gossip.pull] SendDigest -> DEBU 3081 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:32.523 UTC [gossip.gossip] handleMessage -> DEBU 3082 Exiting" +"2019-07-20 02:40:32.526 UTC [gossip.comm] func1 -> DEBU 3083 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3084 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.527 UTC [gossip.gossip] handleMessage -> DEBU 3085 Exiting" +"2019-07-20 02:40:32.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3086 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3087 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:32.527 UTC [msp] DeserializeIdentity -> DEBU 3088 Obtaining identity" +"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3089 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.527 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 308b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 308e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 308f 0xc0005866d0 gate 1563590432528178000 evaluation starts" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3090 0xc0005866d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3091 0xc0005866d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3092 0xc0005866d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3093 0xc0005866d0 principal evaluation fails" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3094 0xc0005866d0 gate 1563590432528178000 evaluation fails" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3095 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3096 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.528 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func1 -> DEBU 3098 0xc000586f10 gate 1563590432528554400 evaluation starts" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 3099 0xc000586f10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309a 0xc000586f10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.528 UTC [cauthdsl] func2 -> DEBU 309b 0xc000586f10 principal matched by identity 0" +"2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 75 6b 5a 52 d7 9b 9c d1 44 a1 76 b9 44 34 63 21 |ukZR....D.v.D4c!| +00000010 86 cb 91 26 5b 43 76 58 40 1e 88 3d 21 f8 e0 dd |...&[CvX@..=!...|" +"2019-07-20 02:40:32.528 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 44 02 20 79 1d 35 71 ba 2e 6f 5e 9c a6 04 a9 |0D. y.5q..o^....| +00000010 22 a8 43 04 e4 cf 7d bd 7a 24 a9 62 17 04 48 f9 |".C...}.z$.b..H.| +00000020 df 3a a5 c2 02 20 4e a2 d3 80 b7 b7 43 df db 5d |.:... N.....C..]| +00000030 7c 93 b9 73 1c e2 93 90 04 1c d9 f3 a7 9c 62 a3 ||..s..........b.| +00000040 ad fe ce c4 0b 32 |.....2|" +"2019-07-20 02:40:32.529 UTC [cauthdsl] func2 -> DEBU 309e 0xc000586f10 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.529 UTC [cauthdsl] func1 -> DEBU 309f 0xc000586f10 gate 1563590432528554400 evaluation succeeds" +"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.529 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30a4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a6 updating membership: timestamp: " +"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a7 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 30a9 Exiting" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 30aa Exiting" +"2019-07-20 02:40:32.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ab Exiting" +"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ac Obtaining identity" +"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ad Obtaining identity" +"2019-07-20 02:40:32.533 UTC [msp] DeserializeIdentity -> DEBU 30ae Obtaining identity" +"2019-07-20 02:40:32.538 UTC [gossip.comm] func1 -> DEBU 30af Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" +"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b3 Exiting" +"2019-07-20 02:40:32.542 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Exiting" +"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b8 Exiting" +"2019-07-20 02:40:32.543 UTC [gossip.comm] func1 -> DEBU 30b9 Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.543 UTC [gossip.gossip] handleMessage -> DEBU 30bb Exiting" +"2019-07-20 02:40:32.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bc Got message: GossipMessage: tag:EMPTY mem_req:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.543 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bd Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:32.544 UTC [msp] DeserializeIdentity -> DEBU 30be Obtaining identity" +"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 30bf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.546 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 30c1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.546 UTC [policies] Evaluate -> DEBU 30c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.546 UTC [cauthdsl] func1 -> DEBU 30c5 0xc0006bb3e0 gate 1563590432546561200 evaluation starts" +"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c6 0xc0006bb3e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c7 0xc0006bb3e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.546 UTC [cauthdsl] func2 -> DEBU 30c8 0xc0006bb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30c9 0xc0006bb3e0 principal evaluation fails" +"2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ca 0xc0006bb3e0 gate 1563590432546561200 evaluation fails" +"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.547 UTC [policies] Evaluate -> DEBU 30cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.547 UTC [cauthdsl] func1 -> DEBU 30ce 0xc0006bbc60 gate 1563590432547577600 evaluation starts" +"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30cf 0xc0006bbc60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.547 UTC [cauthdsl] func2 -> DEBU 30d0 0xc0006bbc60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.548 UTC [cauthdsl] func2 -> DEBU 30d1 0xc0006bbc60 principal matched by identity 0" +"2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d2 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| +00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" +"2019-07-20 02:40:32.548 UTC [msp.identity] Verify -> DEBU 30d3 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| +00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| +00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| +00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| +00000040 a7 1d 12 7a d0 f4 9a |...z...|" +"2019-07-20 02:40:32.549 UTC [cauthdsl] func2 -> DEBU 30d4 0xc0006bbc60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.549 UTC [cauthdsl] func1 -> DEBU 30d5 0xc0006bbc60 gate 1563590432547577600 evaluation succeeds" +"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.554 UTC [msp] DeserializeIdentity -> DEBU 30d8 Obtaining identity" +"2019-07-20 02:40:32.554 UTC [policies] Evaluate -> DEBU 30d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.555 UTC [policies] Evaluate -> DEBU 30db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 30dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.555 UTC [msp] DeserializeIdentity -> DEBU 30da Obtaining identity" +"2019-07-20 02:40:32.556 UTC [msp] DeserializeIdentity -> DEBU 30dd Obtaining identity" +"2019-07-20 02:40:32.557 UTC [gossip.comm] Send -> DEBU 30de Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30df Obtaining identity" +"2019-07-20 02:40:32.558 UTC [msp] DeserializeIdentity -> DEBU 30e0 Obtaining identity" +"2019-07-20 02:40:32.558 UTC [gossip.comm] Send -> DEBU 30e1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:32.558 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.559 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e4 updating membership: timestamp: " +"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e7 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e5 Exiting" +"2019-07-20 02:40:32.559 UTC [gossip.comm] sendToEndpoint -> DEBU 30e6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:32.562 UTC [gossip.comm] sendToEndpoint -> DEBU 30ea Exiting" +"2019-07-20 02:40:32.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 30e9 Exiting" +"2019-07-20 02:40:32.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 30eb Exiting" +"2019-07-20 02:40:32.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30ec Exiting" +"2019-07-20 02:40:32.564 UTC [gossip.discovery] sendMemResponse -> DEBU 30ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:32.564 UTC [msp] DeserializeIdentity -> DEBU 30ee Obtaining identity" +"2019-07-20 02:40:32.566 UTC [msp] DeserializeIdentity -> DEBU 30ef Obtaining identity" +"2019-07-20 02:40:32.567 UTC [msp] DeserializeIdentity -> DEBU 30f0 Obtaining identity" +"2019-07-20 02:40:32.567 UTC [gossip.comm] Send -> DEBU 30f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.568 UTC [gossip.discovery] sendMemResponse -> DEBU 30f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:\304:w\006I\255\0065\032K\207\036" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +"2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.568 UTC [gossip.comm] sendToEndpoint -> DEBU 30f4 Exiting" +"2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f5 Obtaining identity" +"2019-07-20 02:40:32.682 UTC [msp] DeserializeIdentity -> DEBU 30f6 Obtaining identity" +"2019-07-20 02:40:32.683 UTC [gossip.comm] Send -> DEBU 30f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30f9 Exiting" +"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fc Exiting" +"2019-07-20 02:40:32.683 UTC [gossip.comm] sendToEndpoint -> DEBU 30fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.685 UTC [gossip.comm] sendToEndpoint -> DEBU 30fd Exiting" +"2019-07-20 02:40:32.685 UTC [gossip.comm] func1 -> DEBU 30fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.685 UTC [gossip.gossip] handleMessage -> DEBU 30ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.686 UTC [msp] DeserializeIdentity -> DEBU 3100 Obtaining identity" +"2019-07-20 02:40:32.686 UTC [gossip.comm] func1 -> DEBU 3101 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.688 UTC [gossip.comm] func1 -> DEBU 3102 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.693 UTC [msp] DeserializeIdentity -> DEBU 3103 Obtaining identity" +"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3104 Obtaining identity" +"2019-07-20 02:40:32.694 UTC [gossip.comm] Send -> DEBU 3105 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3106 Obtaining identity" +"2019-07-20 02:40:32.694 UTC [msp] DeserializeIdentity -> DEBU 3107 Obtaining identity" +"2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3108 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.694 UTC [gossip.comm] sendToEndpoint -> DEBU 3109 Exiting" +"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310b Exiting" +"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.695 UTC [gossip.comm] sendToEndpoint -> DEBU 310d Exiting" +"2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310e Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +"2019-07-20 02:40:32.696 UTC [msp.identity] Verify -> DEBU 310f Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +"2019-07-20 02:40:32.697 UTC [msp.identity] Verify -> DEBU 3110 Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 3111 Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:32.704 UTC [msp] DeserializeIdentity -> DEBU 3112 Obtaining identity" +"2019-07-20 02:40:32.708 UTC [msp] DeserializeIdentity -> DEBU 3113 Obtaining identity" +"2019-07-20 02:40:32.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3114 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3115 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3116 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3117 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.712 UTC [policies] Evaluate -> DEBU 3118 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.713 UTC [policies] Evaluate -> DEBU 3119 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.713 UTC [cauthdsl] func1 -> DEBU 311a 0xc0007d57f0 gate 1563590432713529700 evaluation starts" +"2019-07-20 02:40:32.713 UTC [cauthdsl] func2 -> DEBU 311b 0xc0007d57f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311c 0xc0007d57f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311d 0xc0007d57f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.714 UTC [cauthdsl] func2 -> DEBU 311e 0xc0007d57f0 principal evaluation fails" +"2019-07-20 02:40:32.714 UTC [cauthdsl] func1 -> DEBU 311f 0xc0007d57f0 gate 1563590432713529700 evaluation fails" +"2019-07-20 02:40:32.714 UTC [policies] Evaluate -> DEBU 3120 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.715 UTC [policies] Evaluate -> DEBU 3122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.715 UTC [cauthdsl] func1 -> DEBU 3123 0xc00289c050 gate 1563590432715391700 evaluation starts" +"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3124 0xc00289c050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3125 0xc00289c050 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.715 UTC [cauthdsl] func2 -> DEBU 3126 0xc00289c050 principal matched by identity 0" +"2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3127 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +"2019-07-20 02:40:32.716 UTC [msp.identity] Verify -> DEBU 3128 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 3129 0xc00289c050 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.716 UTC [cauthdsl] func1 -> DEBU 312a 0xc00289c050 gate 1563590432715391700 evaluation succeeds" +"2019-07-20 02:40:32.716 UTC [policies] Evaluate -> DEBU 312b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.717 UTC [policies] Evaluate -> DEBU 312e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 312f Obtaining identity" +"2019-07-20 02:40:32.717 UTC [msp] DeserializeIdentity -> DEBU 3130 Obtaining identity" +"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3131 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3132 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3133 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3134 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.718 UTC [policies] Evaluate -> DEBU 3135 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.719 UTC [policies] Evaluate -> DEBU 3136 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.719 UTC [cauthdsl] func1 -> DEBU 3137 0xc00289d970 gate 1563590432719715300 evaluation starts" +"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3138 0xc00289d970 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 3139 0xc00289d970 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313a 0xc00289d970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.720 UTC [cauthdsl] func2 -> DEBU 313b 0xc00289d970 principal evaluation fails" +"2019-07-20 02:40:32.721 UTC [cauthdsl] func1 -> DEBU 313c 0xc00289d970 gate 1563590432719715300 evaluation fails" +"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.722 UTC [policies] Evaluate -> DEBU 313f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.722 UTC [cauthdsl] func1 -> DEBU 3140 0xc002932230 gate 1563590432722409700 evaluation starts" +"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3141 0xc002932230 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3142 0xc002932230 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.722 UTC [cauthdsl] func2 -> DEBU 3143 0xc002932230 principal matched by identity 0" +"2019-07-20 02:40:32.722 UTC [msp.identity] Verify -> DEBU 3144 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:32.723 UTC [msp.identity] Verify -> DEBU 3145 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:32.723 UTC [cauthdsl] func2 -> DEBU 3146 0xc002932230 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.723 UTC [cauthdsl] func1 -> DEBU 3147 0xc002932230 gate 1563590432722409700 evaluation succeeds" +"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3148 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 3149 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.723 UTC [policies] Evaluate -> DEBU 314a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.724 UTC [msp] DeserializeIdentity -> DEBU 314c Obtaining identity" +"2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 314e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 314f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3150 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.724 UTC [policies] Evaluate -> DEBU 3151 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3152 0xc002933360 gate 1563590432725069500 evaluation starts" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3153 0xc002933360 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3154 0xc002933360 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3155 0xc002933360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func2 -> DEBU 3156 0xc002933360 principal evaluation fails" +"2019-07-20 02:40:32.725 UTC [cauthdsl] func1 -> DEBU 3157 0xc002933360 gate 1563590432725069500 evaluation fails" +"2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3158 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.725 UTC [policies] Evaluate -> DEBU 3159 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.726 UTC [policies] Evaluate -> DEBU 315a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.727 UTC [cauthdsl] func1 -> DEBU 315b 0xc002933ba0 gate 1563590432727412100 evaluation starts" +"2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315c 0xc002933ba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.728 UTC [cauthdsl] func2 -> DEBU 315d 0xc002933ba0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 315e 0xc002933ba0 principal matched by identity 0" +"2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:32.729 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:32.729 UTC [cauthdsl] func2 -> DEBU 3161 0xc002933ba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.729 UTC [cauthdsl] func1 -> DEBU 3162 0xc002933ba0 gate 1563590432727412100 evaluation succeeds" +"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3163 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3164 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3165 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.730 UTC [policies] Evaluate -> DEBU 3166 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3167 Exiting" +"2019-07-20 02:40:32.730 UTC [gossip.gossip] handleMessage -> DEBU 3168 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.730 UTC [msp] DeserializeIdentity -> DEBU 3169 Obtaining identity" +"2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316a Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +"2019-07-20 02:40:32.731 UTC [msp.identity] Verify -> DEBU 316b Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +"2019-07-20 02:40:32.732 UTC [msp.identity] Verify -> DEBU 316c Verify: digest = 00000000 c4 32 e5 36 0c b6 a5 96 ad f4 b7 ca b1 0a 8b 10 |.2.6............| +00000010 49 20 39 00 e9 48 3d 5e 4b f3 49 28 3c 42 f8 d7 |I 9..H=^K.I( DEBU 316d Verify: sig = 00000000 30 45 02 21 00 9e 87 e3 f1 5c 33 b8 d3 29 97 f4 |0E.!.....\3..)..| +00000010 a6 a3 0b 1a a4 82 b9 c9 07 89 6d a4 a9 89 89 2b |..........m....+| +00000020 3c 77 0a 7c e9 02 20 31 f1 b8 42 fe 98 48 c8 15 |{RR...s..| +00000040 5c da 1b 5d 51 48 4f |\..]QHO|" +"2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316e Obtaining identity" +"2019-07-20 02:40:32.733 UTC [msp] DeserializeIdentity -> DEBU 316f Obtaining identity" +"2019-07-20 02:40:32.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3170 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3171 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3172 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3173 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3174 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.734 UTC [policies] Evaluate -> DEBU 3175 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.734 UTC [cauthdsl] func1 -> DEBU 3176 0xc0029d46a0 gate 1563590432734680100 evaluation starts" +"2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3177 0xc0029d46a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.734 UTC [cauthdsl] func2 -> DEBU 3178 0xc0029d46a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.737 UTC [msp] DeserializeIdentity -> DEBU 3179 Obtaining identity" +"2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317a Obtaining identity" +"2019-07-20 02:40:32.741 UTC [gossip.pull] Hello -> DEBU 317b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:32.741 UTC [msp] DeserializeIdentity -> DEBU 317c Obtaining identity" +"2019-07-20 02:40:32.742 UTC [msp] DeserializeIdentity -> DEBU 317d Obtaining identity" +"2019-07-20 02:40:32.743 UTC [gossip.comm] Send -> DEBU 317e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 317f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.744 UTC [gossip.comm] sendToEndpoint -> DEBU 3180 Exiting" +"2019-07-20 02:40:32.740 UTC [cauthdsl] func2 -> DEBU 3181 0xc0029d46a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.747 UTC [cauthdsl] func2 -> DEBU 3182 0xc0029d46a0 principal evaluation fails" +"2019-07-20 02:40:32.749 UTC [cauthdsl] func1 -> DEBU 3183 0xc0029d46a0 gate 1563590432734680100 evaluation fails" +"2019-07-20 02:40:32.749 UTC [policies] Evaluate -> DEBU 3185 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.749 UTC [gossip.comm] func1 -> DEBU 3184 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.751 UTC [policies] Evaluate -> DEBU 3186 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.752 UTC [policies] Evaluate -> DEBU 3187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.752 UTC [cauthdsl] func1 -> DEBU 3188 0xc0029d4ee0 gate 1563590432752494900 evaluation starts" +"2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 3189 0xc0029d4ee0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.752 UTC [cauthdsl] func2 -> DEBU 318a 0xc0029d4ee0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.753 UTC [cauthdsl] func2 -> DEBU 318b 0xc0029d4ee0 principal matched by identity 0" +"2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318c Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:32.753 UTC [msp.identity] Verify -> DEBU 318d Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:32.754 UTC [cauthdsl] func2 -> DEBU 318e 0xc0029d4ee0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.755 UTC [cauthdsl] func1 -> DEBU 318f 0xc0029d4ee0 gate 1563590432752494900 evaluation succeeds" +"2019-07-20 02:40:32.755 UTC [policies] Evaluate -> DEBU 3190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.756 UTC [policies] Evaluate -> DEBU 3191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3192 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.757 UTC [policies] Evaluate -> DEBU 3193 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3194 Obtaining identity" +"2019-07-20 02:40:32.757 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +"2019-07-20 02:40:32.761 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.763 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.765 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.766 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.767 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.768 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.769 UTC [cauthdsl] func1 -> DEBU 319c 0xc002a626c0 gate 1563590432769533600 evaluation starts" +"2019-07-20 02:40:32.769 UTC [cauthdsl] func2 -> DEBU 319d 0xc002a626c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319e 0xc002a626c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.770 UTC [cauthdsl] func2 -> DEBU 319f 0xc002a626c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.771 UTC [cauthdsl] func2 -> DEBU 31a0 0xc002a626c0 principal evaluation fails" +"2019-07-20 02:40:32.771 UTC [cauthdsl] func1 -> DEBU 31a1 0xc002a626c0 gate 1563590432769533600 evaluation fails" +"2019-07-20 02:40:32.771 UTC [policies] Evaluate -> DEBU 31a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.772 UTC [policies] Evaluate -> DEBU 31a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.773 UTC [policies] Evaluate -> DEBU 31a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.773 UTC [cauthdsl] func1 -> DEBU 31a5 0xc002a63010 gate 1563590432773220600 evaluation starts" +"2019-07-20 02:40:32.773 UTC [cauthdsl] func2 -> DEBU 31a6 0xc002a63010 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.774 UTC [cauthdsl] func2 -> DEBU 31a7 0xc002a63010 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.775 UTC [cauthdsl] func2 -> DEBU 31a8 0xc002a63010 principal matched by identity 0" +"2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31a9 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:32.775 UTC [msp.identity] Verify -> DEBU 31aa Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:32.776 UTC [cauthdsl] func2 -> DEBU 31ab 0xc002a63010 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.776 UTC [cauthdsl] func1 -> DEBU 31ac 0xc002a63010 gate 1563590432773220600 evaluation succeeds" +"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.777 UTC [policies] Evaluate -> DEBU 31af Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.779 UTC [policies] Evaluate -> DEBU 31b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.780 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +"2019-07-20 02:40:32.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.781 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31b3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.782 UTC [policies] Evaluate -> DEBU 31b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31b7 0xc002a920f0 gate 1563590432789206000 evaluation starts" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b8 0xc002a920f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31b9 0xc002a920f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31ba 0xc002a920f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31bb 0xc002a920f0 principal evaluation fails" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31bc 0xc002a920f0 gate 1563590432789206000 evaluation fails" +"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.789 UTC [policies] Evaluate -> DEBU 31bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func1 -> DEBU 31c0 0xc002a92930 gate 1563590432789572500 evaluation starts" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c1 0xc002a92930 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c2 0xc002a92930 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.789 UTC [cauthdsl] func2 -> DEBU 31c3 0xc002a92930 principal matched by identity 0" +"2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c4 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:32.812 UTC [msp.identity] Verify -> DEBU 31c5 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:32.812 UTC [cauthdsl] func2 -> DEBU 31c6 0xc002a92930 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.812 UTC [cauthdsl] func1 -> DEBU 31c7 0xc002a92930 gate 1563590432789572500 evaluation succeeds" +"2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.812 UTC [policies] Evaluate -> DEBU 31c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31ca Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.815 UTC [policies] Evaluate -> DEBU 31cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cc Exiting" +"2019-07-20 02:40:32.816 UTC [gossip.gossip] handleMessage -> DEBU 31cd Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31ce Verify: digest = 00000000 9f 8f 9b a1 87 e3 d7 ad 25 ad ab 38 0d 04 a5 8c |........%..8....| +00000010 68 23 aa db bc 65 06 40 b8 18 d6 d1 7b ca 76 4a |h#...e.@....{.vJ|" +"2019-07-20 02:40:32.818 UTC [msp.identity] Verify -> DEBU 31cf Verify: sig = 00000000 30 45 02 21 00 d8 f7 08 f7 bf 60 0d 29 78 cc 26 |0E.!......`.)x.&| +00000010 6a cd 49 eb f2 70 92 ea 6b c3 ba 46 85 e3 c8 a8 |j.I..p..k..F....| +00000020 dc 51 b2 81 a1 02 20 58 6f 60 8f 36 7f 89 51 df |.Q.... Xo`.6..Q.| +00000030 41 75 e6 8a fd eb 5c 0f 1d c1 79 6a 30 91 d9 6e |Au....\...yj0..n| +00000040 2b 57 b0 3f 1d 87 45 |+W.?..E|" +"2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d0 Obtaining identity" +"2019-07-20 02:40:32.820 UTC [msp] DeserializeIdentity -> DEBU 31d1 Obtaining identity" +"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.822 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31d4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.822 UTC [policies] Evaluate -> DEBU 31d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.823 UTC [policies] Evaluate -> DEBU 31d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.824 UTC [cauthdsl] func1 -> DEBU 31d8 0xc002aa0b10 gate 1563590432824014900 evaluation starts" +"2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31d9 0xc002aa0b10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.826 UTC [cauthdsl] func2 -> DEBU 31da 0xc002aa0b10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31db 0xc002aa0b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.827 UTC [cauthdsl] func2 -> DEBU 31dc 0xc002aa0b10 principal evaluation fails" +"2019-07-20 02:40:32.827 UTC [cauthdsl] func1 -> DEBU 31dd 0xc002aa0b10 gate 1563590432824014900 evaluation fails" +"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.827 UTC [policies] Evaluate -> DEBU 31e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.829 UTC [cauthdsl] func1 -> DEBU 31e1 0xc002aa1350 gate 1563590432829076500 evaluation starts" +"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e2 0xc002aa1350 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e3 0xc002aa1350 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.830 UTC [cauthdsl] func2 -> DEBU 31e4 0xc002aa1350 principal matched by identity 0" +"2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e5 Verify: digest = 00000000 ab 13 8b 0f 3e 07 d2 20 2f 1e 0f fc 82 d8 85 a7 |....>.. /.......| +00000010 b6 68 f7 25 c0 d5 96 59 07 9b 47 02 de 3c fc bc |.h.%...Y..G..<..|" +"2019-07-20 02:40:32.830 UTC [msp.identity] Verify -> DEBU 31e6 Verify: sig = 00000000 30 44 02 20 0d 82 5c 28 9e 91 04 75 4e d8 4e e7 |0D. ..\(...uN.N.| +00000010 f8 5c 75 b4 47 e3 61 e1 e7 1c 3c 68 79 a5 c8 da |.\u.G.a... DEBU 31e7 0xc002aa1350 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.832 UTC [cauthdsl] func1 -> DEBU 31e8 0xc002aa1350 gate 1563590432829076500 evaluation succeeds" +"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31eb Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.835 UTC [policies] Evaluate -> DEBU 31ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.836 UTC [msp] DeserializeIdentity -> DEBU 31ed Obtaining identity" +"2019-07-20 02:40:32.837 UTC [msp] DeserializeIdentity -> DEBU 31ee Obtaining identity" +"2019-07-20 02:40:32.837 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.838 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.838 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.838 UTC [cauthdsl] func1 -> DEBU 31f5 0xc002ed0b50 gate 1563590432838821700 evaluation starts" +"2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f6 0xc002ed0b50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.839 UTC [cauthdsl] func2 -> DEBU 31f7 0xc002ed0b50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f8 0xc002ed0b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:32.840 UTC [cauthdsl] func2 -> DEBU 31f9 0xc002ed0b50 principal evaluation fails" +"2019-07-20 02:40:32.840 UTC [cauthdsl] func1 -> DEBU 31fa 0xc002ed0b50 gate 1563590432838821700 evaluation fails" +"2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.841 UTC [policies] Evaluate -> DEBU 31fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.861 UTC [policies] Evaluate -> DEBU 31fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:32.861 UTC [cauthdsl] func1 -> DEBU 31ff 0xc002ed1390 gate 1563590432861553500 evaluation starts" +"2019-07-20 02:40:32.862 UTC [cauthdsl] func2 -> DEBU 3200 0xc002ed1390 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3201 0xc002ed1390 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.850 UTC [gossip.comm] func1 -> DEBU 31fd Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.865 UTC [cauthdsl] func2 -> DEBU 3202 0xc002ed1390 principal matched by identity 0" +"2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3203 Verify: digest = 00000000 f0 2a bf 7b cd 8b ef 4b f7 18 c6 78 69 23 f9 70 |.*.{...K...xi#.p| +00000010 11 4c 76 6b 55 f1 eb 9d d4 fc 28 ef d1 57 a3 e3 |.LvkU.....(..W..|" +"2019-07-20 02:40:32.868 UTC [msp.identity] Verify -> DEBU 3204 Verify: sig = 00000000 30 44 02 20 0b cd 24 d8 f9 9c 49 f7 99 e3 f8 9c |0D. ..$...I.....| +00000010 b4 59 f0 0d b0 f0 7b 0f e0 24 fa 9c d2 52 ff ad |.Y....{..$...R..| +00000020 8f 1e b0 78 02 20 05 b9 48 eb b3 22 bc b2 68 8b |...x. ..H.."..h.| +00000030 55 c7 b9 f2 4d 0e e8 06 50 fb a9 4b 65 fb 2f ac |U...M...P..Ke./.| +00000040 86 55 07 8f d3 65 |.U...e|" +"2019-07-20 02:40:32.869 UTC [cauthdsl] func2 -> DEBU 3205 0xc002ed1390 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.869 UTC [cauthdsl] func1 -> DEBU 3206 0xc002ed1390 gate 1563590432861553500 evaluation succeeds" +"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3207 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3208 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 3209 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.871 UTC [policies] Evaluate -> DEBU 320a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.873 UTC [msp.identity] Verify -> DEBU 320b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:32.879 UTC [msp.identity] Verify -> DEBU 320c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.880 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 320f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 3211 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3212 0xc002f5cb10 gate 1563590432880334600 evaluation starts" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3213 0xc002f5cb10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3214 0xc002f5cb10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3215 0xc002f5cb10 principal matched by identity 0" +"2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3216 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:32.880 UTC [msp.identity] Verify -> DEBU 3217 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func2 -> DEBU 3218 0xc002f5cb10 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:32.880 UTC [cauthdsl] func1 -> DEBU 3219 0xc002f5cb10 gate 1563590432880334600 evaluation succeeds" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:32.880 UTC [policies] Evaluate -> DEBU 321d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:32.880 UTC [gossip.gossip] handleMessage -> DEBU 321e Exiting" +"2019-07-20 02:40:32.881 UTC [gossip.gossip] handleMessage -> DEBU 321f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.883 UTC [gossip.comm] func1 -> DEBU 3220 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.884 UTC [gossip.comm] func1 -> DEBU 3221 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.886 UTC [gossip.pull] HandleMessage -> DEBU 3222 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3223 Exiting" +"2019-07-20 02:40:32.886 UTC [gossip.gossip] handleMessage -> DEBU 3224 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.886 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +"2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3226 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.891 UTC [msp] DeserializeIdentity -> DEBU 3227 Obtaining identity" +"2019-07-20 02:40:32.891 UTC [gossip.comm] func1 -> DEBU 3228 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.892 UTC [gossip.gossip] handleMessage -> DEBU 3229 Exiting" +"2019-07-20 02:40:32.906 UTC [gossip.gossip] handleMessage -> DEBU 322a Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.906 UTC [msp.identity] Verify -> DEBU 322b Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:32.908 UTC [msp.identity] Verify -> DEBU 322c Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322d Exiting" +"2019-07-20 02:40:32.917 UTC [gossip.gossip] handleMessage -> DEBU 322e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.918 UTC [gossip.pull] HandleMessage -> DEBU 322f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:32.918 UTC [gossip.pull] SendDigest -> DEBU 3230 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3231 Exiting" +"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3232 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3233 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:32.930 UTC [msp.identity] Verify -> DEBU 3234 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:32.930 UTC [msp] DeserializeIdentity -> DEBU 3235 Obtaining identity" +"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3236 Exiting" +"2019-07-20 02:40:32.930 UTC [gossip.gossip] handleMessage -> DEBU 3237 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:32.931 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:32.931 UTC [msp] DeserializeIdentity -> DEBU 323a Obtaining identity" +"2019-07-20 02:40:32.931 UTC [gossip.gossip] handleMessage -> DEBU 323b Exiting" +"2019-07-20 02:40:32.997 UTC [endorser] ProcessProposal -> DEBU 323c Entering: request from 172.18.0.9:58420" +"2019-07-20 02:40:32.997 UTC [protoutils] ValidateProposalMessage -> DEBU 323d ValidateProposalMessage starts for signed proposal 0xc00080e5f0" +"2019-07-20 02:40:32.997 UTC [protoutils] validateChannelHeader -> DEBU 323e validateChannelHeader info: header type 3" +"2019-07-20 02:40:32.997 UTC [protoutils] checkSignatureFromCreator -> DEBU 323f begin" +"2019-07-20 02:40:32.998 UTC [msp] GetManagerForChain -> DEBU 3240 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3241 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:32.998 UTC [protoutils] checkSignatureFromCreator -> DEBU 3242 creator is valid" +"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3243 Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| +00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" +"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 3244 Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| +00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3245 exits successfully" +"2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3246 validateChaincodeProposalMessage starts for proposal 0xc000407260, header 0xc00080ea50" +"2019-07-20 02:40:32.998 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3247 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-07-20 02:40:32.998 UTC [endorser] preProcess -> DEBU 3248 [businesschannel][1bc589c4] processing txid: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53" +"2019-07-20 02:40:32.998 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3249 retrieveTransactionByID() - txId = [1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53]" +"2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 324a [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 324b [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 324c Entry" +"2019-07-20 02:40:32.998 UTC [cscc] Invoke -> DEBU 324d Invoke function: GetChannels" +"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324e Verify: digest = 00000000 8c 8e 59 c1 1a 67 22 ba cb 5d 17 7f 38 30 0d ce |..Y..g"..]..80..| +00000010 66 bb fc ee dc a3 5c 3b 14 72 f7 3e 63 86 d8 18 |f.....\;.r.>c...|" +"2019-07-20 02:40:32.998 UTC [msp.identity] Verify -> DEBU 324f Verify: sig = 00000000 30 45 02 21 00 a4 17 dc d8 21 6b 0b cc 0a a3 93 |0E.!.....!k.....| +00000010 d8 b0 72 98 36 a2 3c 42 50 65 8c 68 9f 4f 13 4d |..r.6. DEBU 3250 [1bc589c4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:32.998 UTC [chaincode] Notify -> DEBU 3251 [1bc589c4] notifying Txid:1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, channelID:businesschannel" +"2019-07-20 02:40:32.998 UTC [chaincode] Execute -> DEBU 3252 Exit" +"2019-07-20 02:40:32.998 UTC [endorser] callChaincode -> INFO 3253 [businesschannel][1bc589c4] Exit chaincode: name:"cscc" (0ms)" +"2019-07-20 02:40:32.998 UTC [endorser] SimulateProposal -> DEBU 3254 [businesschannel][1bc589c4] Exit" +"2019-07-20 02:40:32.998 UTC [endorser] endorseProposal -> DEBU 3255 [businesschannel][1bc589c4] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 3256 [businesschannel][1bc589c4] escc for chaincode name:"cscc" is escc" +"2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 3257 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" +"2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3258 Sign: plaintext: 0A20881317A66318D893408174F0D476...455254494649434154452D2D2D2D2D0A " +"2019-07-20 02:40:32.999 UTC [msp.identity] Sign -> DEBU 3259 Sign: digest: CC8B57189048DE397745C7CBCF9841266EBCAC1099F471FFCA261265DA217119 " +"2019-07-20 02:40:32.999 UTC [endorser] EndorseWithPlugin -> DEBU 325a Exiting {plugin: escc, channel: businesschannel, tx: 1bc589c48c56e0aa44c979307919d8b1730df8507b017f6f07be012906657d53, chaincode: cscc}" +"2019-07-20 02:40:32.999 UTC [endorser] endorseProposal -> DEBU 325b [businesschannel][1bc589c4] Exit" +"2019-07-20 02:40:32.999 UTC [endorser] func1 -> DEBU 325c Exit: request from 172.18.0.9:58420" +"2019-07-20 02:40:32.999 UTC [comm.grpc.server] 1 -> INFO 325d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58420 grpc.code=OK grpc.call_duration=1.6457ms +"2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:33.005 UTC [grpc] infof -> DEBU 325f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:33.008 UTC [gossip.comm] func1 -> DEBU 3260 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:33.008 UTC [gossip.gossip] handleMessage -> DEBU 3261 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:33.008 UTC [msp] DeserializeIdentity -> DEBU 3262 Obtaining identity" +"2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3263 Obtaining identity" +"2019-07-20 02:40:33.009 UTC [msp] DeserializeIdentity -> DEBU 3264 Obtaining identity" +"2019-07-20 02:40:33.009 UTC [gossip.gossip] handleMessage -> DEBU 3265 Exiting" +"2019-07-20 02:40:33.019 UTC [gossip.comm] func1 -> DEBU 3266 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.020 UTC [gossip.gossip] handleMessage -> DEBU 3267 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.021 UTC [msp] DeserializeIdentity -> DEBU 3268 Obtaining identity" +"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.021 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 326e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 326f 0xc002fe9bb0 gate 1563590433021464800 evaluation starts" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3270 0xc002fe9bb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3271 0xc002fe9bb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3272 0xc002fe9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3273 0xc002fe9bb0 principal evaluation fails" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3274 0xc002fe9bb0 gate 1563590433021464800 evaluation fails" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3275 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3276 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.021 UTC [policies] Evaluate -> DEBU 3277 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func1 -> DEBU 3278 0xc0030da410 gate 1563590433021793500 evaluation starts" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 3279 0xc0030da410 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327a 0xc0030da410 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.021 UTC [cauthdsl] func2 -> DEBU 327b 0xc0030da410 principal matched by identity 0" +"2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:33.021 UTC [msp.identity] Verify -> DEBU 327d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:33.022 UTC [cauthdsl] func2 -> DEBU 327e 0xc0030da410 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.022 UTC [cauthdsl] func1 -> DEBU 327f 0xc0030da410 gate 1563590433021793500 evaluation succeeds" +"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3280 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3281 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3282 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:33.022 UTC [policies] Evaluate -> DEBU 3283 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:33.022 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" +"2019-07-20 02:40:33.022 UTC [gossip.gossip] handleMessage -> DEBU 3285 Exiting" +"2019-07-20 02:40:33.029 UTC [gossip.comm] func1 -> DEBU 3286 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.029 UTC [gossip.gossip] handleMessage -> DEBU 3287 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.029 UTC [msp] DeserializeIdentity -> DEBU 3288 Obtaining identity" +"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3289 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.030 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 328b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.030 UTC [policies] Evaluate -> DEBU 328e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 328f 0xc0030dbf30 gate 1563590433031507100 evaluation starts" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3290 0xc0030dbf30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3291 0xc0030dbf30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3292 0xc0030dbf30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func2 -> DEBU 3293 0xc0030dbf30 principal evaluation fails" +"2019-07-20 02:40:33.031 UTC [cauthdsl] func1 -> DEBU 3294 0xc0030dbf30 gate 1563590433031507100 evaluation fails" +"2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3295 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.031 UTC [policies] Evaluate -> DEBU 3296 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.032 UTC [policies] Evaluate -> DEBU 3297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:33.032 UTC [cauthdsl] func1 -> DEBU 3298 0xc0030f2770 gate 1563590433032125000 evaluation starts" +"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 3299 0xc0030f2770 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329a 0xc0030f2770 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329b 0xc0030f2770 principal matched by identity 0" +"2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329c Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:33.032 UTC [msp.identity] Verify -> DEBU 329d Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:33.032 UTC [cauthdsl] func2 -> DEBU 329e 0xc0030f2770 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.033 UTC [cauthdsl] func1 -> DEBU 329f 0xc0030f2770 gate 1563590433032125000 evaluation succeeds" +"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:33.033 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:33.033 UTC [msp] DeserializeIdentity -> DEBU 32a4 Obtaining identity" +"2019-07-20 02:40:33.033 UTC [gossip.gossip] handleMessage -> DEBU 32a5 Exiting" +"2019-07-20 02:40:33.151 UTC [gossip.comm] func1 -> DEBU 32a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32a7 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a8 Obtaining identity" +"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32a9 Obtaining identity" +"2019-07-20 02:40:33.152 UTC [msp] DeserializeIdentity -> DEBU 32aa Obtaining identity" +"2019-07-20 02:40:33.152 UTC [gossip.gossip] handleMessage -> DEBU 32ab Exiting" +"2019-07-20 02:40:33.163 UTC [gossip.comm] func1 -> DEBU 32ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.165 UTC [gossip.gossip] handleMessage -> DEBU 32ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:33.165 UTC [msp] DeserializeIdentity -> DEBU 32ae Obtaining identity" +"2019-07-20 02:40:33.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:33.166 UTC [policies] Evaluate -> DEBU 32b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32b5 0xc0031162a0 gate 1563590433175568500 evaluation starts" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b6 0xc0031162a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b7 0xc0031162a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b8 0xc0031162a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32b9 0xc0031162a0 principal evaluation fails" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32ba 0xc0031162a0 gate 1563590433175568500 evaluation fails" +"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:33.175 UTC [policies] Evaluate -> DEBU 32bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func1 -> DEBU 32be 0xc003116c00 gate 1563590433175929200 evaluation starts" +"2019-07-20 02:40:33.175 UTC [cauthdsl] func2 -> DEBU 32bf 0xc003116c00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c0 0xc003116c00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c1 0xc003116c00 principal matched by identity 0" +"2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c2 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:33.176 UTC [msp.identity] Verify -> DEBU 32c3 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:33.176 UTC [cauthdsl] func2 -> DEBU 32c4 0xc003116c00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:33.176 UTC [cauthdsl] func1 -> DEBU 32c5 0xc003116c00 gate 1563590433175929200 evaluation succeeds" +"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:33.176 UTC [policies] Evaluate -> DEBU 32c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:33.176 UTC [msp] DeserializeIdentity -> DEBU 32ca Obtaining identity" +"2019-07-20 02:40:33.176 UTC [gossip.gossip] handleMessage -> DEBU 32cb Exiting" +"2019-07-20 02:40:35.901 UTC [gossip.comm] func1 -> DEBU 32cc Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32cd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.901 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +"2019-07-20 02:40:35.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32cf Got message: GossipMessage: tag:EMPTY mem_req:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32d0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:35.901 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" +"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32d2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:35.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32d4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:35.901 UTC [policies] Evaluate -> DEBU 32d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32d8 0xc003124d50 gate 1563590435902157400 evaluation starts" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32d9 0xc003124d50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32da 0xc003124d50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32db 0xc003124d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32dc 0xc003124d50 principal evaluation fails" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32dd 0xc003124d50 gate 1563590435902157400 evaluation fails" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e1 0xc003125620 gate 1563590435902535500 evaluation starts" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e2 0xc003125620 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e3 0xc003125620 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e4 0xc003125620 principal matched by identity 0" +"2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e5 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| +00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" +"2019-07-20 02:40:35.902 UTC [msp.identity] Verify -> DEBU 32e6 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| +00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| +00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| +00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| +00000040 27 bf 33 e5 cf 8a 00 |'.3....|" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003125620 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:35.902 UTC [cauthdsl] func1 -> DEBU 32e8 0xc003125620 gate 1563590435902535500 evaluation succeeds" +"2019-07-20 02:40:35.902 UTC [policies] Evaluate -> DEBU 32e9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32eb Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:35.903 UTC [policies] Evaluate -> DEBU 32ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32ed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ee Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32ef updating membership: timestamp: " +"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f0 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 32f2 Exiting" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 32f3 Exiting" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32f4 Exiting" +"2019-07-20 02:40:35.903 UTC [gossip.discovery] sendMemResponse -> DEBU 32f5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f6 Obtaining identity" +"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f7 Obtaining identity" +"2019-07-20 02:40:35.903 UTC [msp] DeserializeIdentity -> DEBU 32f8 Obtaining identity" +"2019-07-20 02:40:35.903 UTC [gossip.comm] Send -> DEBU 32f9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:35.904 UTC [gossip.discovery] sendMemResponse -> DEBU 32fa Exiting, replying with alive:\026)\315.9\377\212\300\"Kd3e\002 F\235#\317/\t\364\350\237Q7\200]C\031\224g6\327\363\032M}\317\247\247\035\022z\320\364\232" > alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020)" signature:"0D\002 L#Od\274\342\017\374\341\210\303\356\267U\376\227$\377`\350\244\243\364H\215\260\232`\n\24161\002 \037\305\261\316\335\014\220\341\016\r\264D\277\r\352]\333\253\254\001\317\223@\323\370\251\264:8\nE\334" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +"2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.904 UTC [gossip.comm] sendToEndpoint -> DEBU 32fc Exiting" +"2019-07-20 02:40:35.930 UTC [gossip.comm] func1 -> DEBU 32fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.930 UTC [gossip.gossip] handleMessage -> DEBU 32fe Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.930 UTC [gossip.pull] HandleMessage -> DEBU 32ff GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3300 Obtaining identity" +"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3301 Obtaining identity" +"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3302 Obtaining identity" +"2019-07-20 02:40:35.930 UTC [msp] DeserializeIdentity -> DEBU 3303 Obtaining identity" +"2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3304 Obtaining identity" +"2019-07-20 02:40:35.931 UTC [msp] DeserializeIdentity -> DEBU 3305 Obtaining identity" +"2019-07-20 02:40:35.931 UTC [gossip.pull] SendDigest -> DEBU 3306 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:35.931 UTC [gossip.gossip] handleMessage -> DEBU 3307 Exiting" +"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 3308 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 3309 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.228 UTC [gossip.pull] Hello -> DEBU 330c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:36.228 UTC [gossip.comm] Send -> DEBU 330d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.228 UTC [gossip.comm] sendToEndpoint -> DEBU 330e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 330f Exiting" +"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3310 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3312 Exiting" +"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.229 UTC [gossip.comm] sendToEndpoint -> DEBU 3313 Exiting" +"2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3314 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3315 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 3316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3317 Exiting" +"2019-07-20 02:40:36.240 UTC [gossip.comm] func1 -> DEBU 3318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 3319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.pull] HandleMessage -> DEBU 331a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.240 UTC [gossip.gossip] handleMessage -> DEBU 331b Exiting" +"2019-07-20 02:40:36.242 UTC [gossip.comm] func1 -> DEBU 331c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.242 UTC [gossip.pull] HandleMessage -> DEBU 331e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.242 UTC [gossip.gossip] handleMessage -> DEBU 331f Exiting" +"2019-07-20 02:40:36.270 UTC [msp] GetDefaultSigningIdentity -> DEBU 3320 Obtaining default signing identity" +"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151026 " +"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3322 Sign: digest: BD9726F5555E2FF5198D8FD774556AA7FA82CA21D8859FCBF5A7FCF75D6CA8FE " +"2019-07-20 02:40:36.271 UTC [msp] GetDefaultSigningIdentity -> DEBU 3323 Obtaining default signing identity" +"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:36.271 UTC [msp.identity] Sign -> DEBU 3325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.271 UTC [msp] DeserializeIdentity -> DEBU 3327 Obtaining identity" +"2019-07-20 02:40:36.271 UTC [gossip.comm] Send -> DEBU 3328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.272 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" +"2019-07-20 02:40:36.272 UTC [gossip.comm] Send -> DEBU 332a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332c Exiting" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332e Exiting" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 332f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3330 Exiting" +"2019-07-20 02:40:36.273 UTC [gossip.comm] func1 -> DEBU 3331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3332 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.273 UTC [gossip.gossip] handleMessage -> DEBU 3333 Exiting" +"2019-07-20 02:40:36.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3334 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.273 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3335 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3336 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 3337 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +00000040 b4 3a 38 0a 45 dc |.:8.E.|" +"2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3338 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:36.274 UTC [gossip.discovery] handleAliveMessage -> DEBU 3339 Exiting" +"2019-07-20 02:40:36.274 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 333a Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.274 UTC [gossip.gossip] handleMessage -> DEBU 333c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333d Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +"2019-07-20 02:40:36.274 UTC [gossip.comm] func1 -> DEBU 333e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.274 UTC [msp.identity] Verify -> DEBU 333f Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +00000040 bb c9 ea 46 07 8a 5e |...F..^|" +"2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3340 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.275 UTC [gossip.discovery] isSentByMe -> DEBU 3341 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.275 UTC [gossip.discovery] handleAliveMessage -> DEBU 3342 Exiting" +"2019-07-20 02:40:36.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3343 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:36.275 UTC [msp] DeserializeIdentity -> DEBU 3344 Obtaining identity" +"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3345 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3346 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.275 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3347 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3348 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3349 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 334a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 334b 0xc003223710 gate 1563590436275755700 evaluation starts" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334c 0xc003223710 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334d 0xc003223710 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334e 0xc003223710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func2 -> DEBU 334f 0xc003223710 principal evaluation fails" +"2019-07-20 02:40:36.275 UTC [cauthdsl] func1 -> DEBU 3350 0xc003223710 gate 1563590436275755700 evaluation fails" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3351 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3352 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.275 UTC [policies] Evaluate -> DEBU 3353 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 3354 0xc003223f60 gate 1563590436276119600 evaluation starts" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3355 0xc003223f60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3356 0xc003223f60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 3357 0xc003223f60 principal matched by identity 0" +"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3358 Verify: digest = 00000000 97 29 f6 9f 38 86 61 bb 16 0a 4f 52 c6 72 50 9c |.)..8.a...OR.rP.| +00000010 0e 82 23 bc b2 0c d2 17 f9 8f 15 65 06 cd a4 71 |..#........e...q|" +"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3359 Verify: sig = 00000000 30 45 02 21 00 c4 d2 fc 2d b2 50 19 d8 0e b4 3e |0E.!....-.P....>| +00000010 6c 72 21 ca 32 cc d1 27 26 1c 01 ae 22 d2 5d 8e |lr!.2..'&...".].| +00000020 83 44 e7 1a bd 02 20 3d 6e 75 83 04 f8 9c 46 3d |.D.... =nu....F=| +00000030 86 e4 0e 70 a0 54 bf c3 63 c6 94 97 0d 71 3e cb |...p.T..c....q>.| +00000040 27 bf 33 e5 cf 8a 00 |'.3....|" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func2 -> DEBU 335a 0xc003223f60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.276 UTC [cauthdsl] func1 -> DEBU 335b 0xc003223f60 gate 1563590436276119600 evaluation succeeds" +"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.276 UTC [policies] Evaluate -> DEBU 335f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3360 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleAliveMessage -> DEBU 3361 Exiting" +"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3362 Exiting" +"2019-07-20 02:40:36.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3363 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.276 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3364 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3365 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +"2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3366 Exiting" +"2019-07-20 02:40:36.276 UTC [gossip.gossip] handleMessage -> DEBU 3367 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.276 UTC [msp.identity] Verify -> DEBU 3368 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +00000040 bb c9 ea 46 07 8a 5e |...F..^|" +"2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 3369 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:36.277 UTC [msp.identity] Verify -> DEBU 336a Verify: sig = 00000000 30 45 02 21 00 a5 09 35 d9 10 ed dc 71 72 14 b0 |0E.!...5....qr..| +00000010 82 63 5c ab 58 b6 65 75 18 f5 ea 47 eb ea e0 22 |.c\.X.eu...G..."| +00000020 38 8a 66 cb 74 02 20 51 55 63 f4 c9 d9 6f 05 65 |8.f.t. QUc...o.e| +00000030 90 5e b5 2d fb b2 4a 51 63 f8 5c f3 ef 53 a4 a0 |.^.-..JQc.\..S..| +00000040 d9 93 20 d9 c3 e3 02 |.. ....|" +"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:36.277 UTC [gossip.discovery] isSentByMe -> DEBU 336c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleAliveMessage -> DEBU 336d Exiting" +"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336e Exiting" +"2019-07-20 02:40:36.277 UTC [gossip.discovery] handleMsgFromComm -> DEBU 336f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.277 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3370 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:36.278 UTC [gossip.gossip] handleMessage -> DEBU 3371 Exiting" +"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3372 Verify: digest = 00000000 0a e7 48 5b 6d 0f 47 95 31 12 c2 7d b0 9e 45 73 |..H[m.G.1..}..Es| +00000010 42 8c ae 47 db 8f 7e 68 55 9a 72 8f a0 d2 78 15 |B..G..~hU.r...x.|" +"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3373 Verify: sig = 00000000 30 44 02 20 4c 23 4f 64 bc e2 0f fc e1 88 c3 ee |0D. L#Od........| +00000010 b7 55 fe 97 24 ff 60 e8 a4 a3 f4 48 8d b0 9a 60 |.U..$.`....H...`| +00000020 0a a1 36 31 02 20 1f c5 b1 ce dd 0c 90 e1 0e 0d |..61. ..........| +00000030 b4 44 bf 0d ea 5d db ab ac 01 cf 93 40 d3 f8 a9 |.D...]......@...| +00000040 b4 3a 38 0a 45 dc |.:8.E.|" +"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3374 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3375 Exiting" +"2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3376 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3377 Verify: digest = 00000000 bd 97 26 f5 55 5e 2f f5 19 8d 8f d7 74 55 6a a7 |..&.U^/.....tUj.| +00000010 fa 82 ca 21 d8 85 9f cb f5 a7 fc f7 5d 6c a8 fe |...!........]l..|" +"2019-07-20 02:40:36.278 UTC [msp.identity] Verify -> DEBU 3378 Verify: sig = 00000000 30 45 02 21 00 95 ce 72 36 79 59 00 55 fd f3 ff |0E.!...r6yY.U...| +00000010 71 5e da 07 25 3b 9a 54 b1 b2 fa b0 4f a7 62 3d |q^..%;.T....O.b=| +00000020 b4 d6 77 99 93 02 20 1d be 58 86 85 e6 4f fc c2 |..w... ..X...O..| +00000030 c2 0e e9 63 eb 89 23 36 20 ec 4d d7 85 67 aa 0f |...c..#6 .M..g..| +00000040 bb c9 ea 46 07 8a 5e |...F..^|" +"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 3379 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.278 UTC [gossip.discovery] isSentByMe -> DEBU 337a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.278 UTC [gossip.discovery] handleAliveMessage -> DEBU 337b Exiting" +"2019-07-20 02:40:36.278 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 337c Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:36.278 UTC [msp] DeserializeIdentity -> DEBU 337d Obtaining identity" +"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 337e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 337f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.279 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3380 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3384 0xc0033fe550 gate 1563590436279236500 evaluation starts" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3385 0xc0033fe550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3386 0xc0033fe550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3387 0xc0033fe550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3388 0xc0033fe550 principal evaluation fails" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3389 0xc0033fe550 gate 1563590436279236500 evaluation fails" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 338c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 338d 0xc0033fefe0 gate 1563590436279489000 evaluation starts" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338e 0xc0033fefe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 338f 0xc0033fefe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3390 0xc0033fefe0 principal matched by identity 0" +"2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3391 Verify: digest = 00000000 d2 d4 95 34 c5 7c dd ee c2 94 69 b1 d1 26 4c d7 |...4.|....i..&L.| +00000010 40 ff ea 97 8d 6f 55 a3 e4 ff 62 0d 3e 07 5e ef |@....oU...b.>.^.|" +"2019-07-20 02:40:36.279 UTC [msp.identity] Verify -> DEBU 3392 Verify: sig = 00000000 30 45 02 21 00 f3 38 c9 26 96 2b 11 5d 0b 81 e2 |0E.!..8.&.+.]...| +00000010 04 af 5e 83 86 28 b7 3e 16 29 cd 2e 39 ff 8a c0 |..^..(.>.)..9...| +00000020 22 4b 64 33 65 02 20 46 9d 23 cf 2f 09 f4 e8 9f |"Kd3e. F.#./....| +00000030 51 37 80 5d 43 19 94 67 36 d7 f3 1a 4d 7d cf a7 |Q7.]C..g6...M}..| +00000040 a7 1d 12 7a d0 f4 9a |...z...|" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func2 -> DEBU 3393 0xc0033fefe0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.279 UTC [cauthdsl] func1 -> DEBU 3394 0xc0033fefe0 gate 1563590436279489000 evaluation succeeds" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3397 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.279 UTC [policies] Evaluate -> DEBU 3398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 3399 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleAliveMessage -> DEBU 339a Exiting" +"2019-07-20 02:40:36.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 339b Exiting" +"2019-07-20 02:40:36.334 UTC [gossip.comm] func1 -> DEBU 339c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 339d Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.334 UTC [gossip.pull] HandleMessage -> DEBU 339e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.334 UTC [gossip.pull] SendDigest -> DEBU 339f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:36.334 UTC [gossip.gossip] handleMessage -> DEBU 33a0 Exiting" +"2019-07-20 02:40:36.356 UTC [gossip.comm] func1 -> DEBU 33a1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.356 UTC [gossip.gossip] handleMessage -> DEBU 33a3 Exiting" +"2019-07-20 02:40:36.356 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a4 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.356 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33a5 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a6 Verify: digest = 00000000 bf e2 70 70 3b c9 af 04 88 68 c0 25 62 b0 c1 87 |..pp;....h.%b...| +00000010 0e 4c 72 03 b6 4d db 15 8a 80 e6 7d b1 e4 f2 77 |.Lr..M.....}...w|" +"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a7 Verify: sig = 00000000 30 44 02 20 28 df c9 fb 93 61 15 b4 ca d0 2e 53 |0D. (....a.....S| +00000010 1f 6b 28 45 16 9c 6a c0 55 0a 61 c0 74 7d b5 30 |.k(E..j.U.a.t}.0| +00000020 b1 8c a7 d5 02 20 7d 03 4d 41 f9 c9 5b dc 85 f5 |..... }.MA..[...| +00000030 24 1b a5 72 0b a9 d2 65 21 a7 a9 d7 66 be ab ab |$..r...e!...f...| +00000040 d5 6d 82 e1 fd f8 |.m....|" +"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:36.357 UTC [msp.identity] Verify -> DEBU 33a9 Verify: sig = 00000000 30 44 02 20 42 62 be ee 71 e2 97 23 1a 72 f7 54 |0D. Bb..q..#.r.T| +00000010 be 0d 92 c7 64 25 98 b6 48 51 40 33 f5 ba 18 4f |....d%..HQ@3...O| +00000020 b8 38 23 a1 02 20 1d 27 ec 74 10 b6 a3 72 4b 14 |.8#.. .'.t...rK.| +00000030 ae 32 b3 d5 fd 80 18 14 95 3c cf b3 4f bb c5 c1 |.2.......<..O...| +00000040 43 db 68 e8 b6 65 |C.h..e|" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33aa Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ac updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ad Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ae Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] learnExistingMembers -> DEBU 33af Exiting" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b0 Exiting" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Exiting" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b3 Obtaining identity" +"2019-07-20 02:40:36.358 UTC [msp] DeserializeIdentity -> DEBU 33b4 Obtaining identity" +"2019-07-20 02:40:36.358 UTC [gossip.comm] Send -> DEBU 33b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.358 UTC [gossip.discovery] sendMemResponse -> DEBU 33b6 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" secret_envelope: > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +"2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.359 UTC [gossip.comm] sendToEndpoint -> DEBU 33b8 Exiting" +"2019-07-20 02:40:36.524 UTC [gossip.comm] func1 -> DEBU 33b9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.524 UTC [gossip.gossip] handleMessage -> DEBU 33ba Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.524 UTC [gossip.pull] HandleMessage -> DEBU 33bb GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bc Obtaining identity" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bd Obtaining identity" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33be Obtaining identity" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33bf Obtaining identity" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +"2019-07-20 02:40:36.524 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" +"2019-07-20 02:40:36.525 UTC [gossip.pull] SendDigest -> DEBU 33c2 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:36.525 UTC [gossip.gossip] handleMessage -> DEBU 33c3 Exiting" +"2019-07-20 02:40:36.544 UTC [gossip.comm] func1 -> DEBU 33c4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.544 UTC [gossip.gossip] handleMessage -> DEBU 33c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.545 UTC [gossip.gossip] handleMessage -> DEBU 33c6 Exiting" +"2019-07-20 02:40:36.545 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.545 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33c8 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:36.545 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cb Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.545 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33cc Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d0 0xc0035100a0 gate 1563590436545487300 evaluation starts" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d1 0xc0035100a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d2 0xc0035100a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d3 0xc0035100a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33d4 0xc0035100a0 principal evaluation fails" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d5 0xc0035100a0 gate 1563590436545487300 evaluation fails" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.545 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0035108e0 gate 1563590436545752600 evaluation starts" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33da 0xc0035108e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33db 0xc0035108e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.545 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0035108e0 principal matched by identity 0" +"2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33dd Verify: digest = 00000000 7b 8f 87 ef db 70 1f 05 1f dc 0f ad fb ae e8 3a |{....p.........:| +00000010 7d e3 42 b9 c2 d9 da 90 6f 32 4f b1 c0 e2 97 12 |}.B.....o2O.....|" +"2019-07-20 02:40:36.545 UTC [msp.identity] Verify -> DEBU 33de Verify: sig = 00000000 30 45 02 21 00 89 81 30 96 cd db 39 a2 b8 66 ff |0E.!...0...9..f.| +00000010 4c 07 4f 87 55 6d dd bf 0b 25 de 6e 64 4d f0 c5 |L.O.Um...%.ndM..| +00000020 0b 47 1a ac 2f 02 20 35 cc ec 2c ca 41 16 06 0e |.G../. 5..,.A...| +00000030 69 26 87 96 ca b0 04 57 a5 4f 0c ae 65 ab 89 cd |i&.....W.O..e...| +00000040 a3 c2 07 ee 3b da 97 |....;..|" +"2019-07-20 02:40:36.546 UTC [cauthdsl] func2 -> DEBU 33df 0xc0035108e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.546 UTC [cauthdsl] func1 -> DEBU 33e0 0xc0035108e0 gate 1563590436545752600 evaluation succeeds" +"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.546 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33e5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e7 updating membership: timestamp: " +"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e8 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33e9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ea Exiting" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleAliveMessage -> DEBU 33eb Exiting" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33ec Exiting" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33ed Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ee Obtaining identity" +"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33ef Obtaining identity" +"2019-07-20 02:40:36.546 UTC [msp] DeserializeIdentity -> DEBU 33f0 Obtaining identity" +"2019-07-20 02:40:36.546 UTC [gossip.comm] Send -> DEBU 33f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.546 UTC [gossip.discovery] sendMemResponse -> DEBU 33f2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020*" signature:"0D\002 (\337\311\373\223a\025\264\312\320.S\037k(E\026\234j\300U\na\300t}\2650\261\214\247\325\002 }\003MA\371\311[\334\205\365$\033\245r\013\251\322e!\247\251\327f\276\253\253\325m\202\341\375\370" > alive: alive:lr!\3122\314\321'&\034\001\256\"\322]\216\203D\347\032\275\002 =nu\203\004\370\234F=\206\344\016p\240T\277\303c\306\224\227\rq>\313'\2773\345\317\212\000" > alive:\251u\007\3026W\021\002 h\233Ap\301U\030q\370\346\350\240\005\251\257\354\336{\234n \013G\007v{!E\023\376\253\344" > " +"2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.546 UTC [gossip.comm] sendToEndpoint -> DEBU 33f4 Exiting" +"2019-07-20 02:40:36.682 UTC [msp] DeserializeIdentity -> DEBU 33f5 Obtaining identity" +"2019-07-20 02:40:36.683 UTC [msp] DeserializeIdentity -> DEBU 33f6 Obtaining identity" +"2019-07-20 02:40:36.683 UTC [gossip.comm] Send -> DEBU 33f7 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33f9 Exiting" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fb Exiting" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.683 UTC [gossip.comm] sendToEndpoint -> DEBU 33fd Exiting" +"2019-07-20 02:40:36.684 UTC [gossip.comm] func1 -> DEBU 33fe Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.684 UTC [gossip.gossip] handleMessage -> DEBU 33ff Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3400 Obtaining identity" +"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3401 Obtaining identity" +"2019-07-20 02:40:36.684 UTC [msp] DeserializeIdentity -> DEBU 3402 Obtaining identity" +"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3403 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3404 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.684 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3405 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3406 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3407 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.684 UTC [policies] Evaluate -> DEBU 3408 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.684 UTC [cauthdsl] func1 -> DEBU 3409 0xc0035b47f0 gate 1563590436684969900 evaluation starts" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340a 0xc0035b47f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340b 0xc0035b47f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340c 0xc0035b47f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 340d 0xc0035b47f0 principal evaluation fails" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 340e 0xc0035b47f0 gate 1563590436684969900 evaluation fails" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 340f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 3411 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3412 0xc0035b5040 gate 1563590436685298700 evaluation starts" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3413 0xc0035b5040 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3414 0xc0035b5040 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3415 0xc0035b5040 principal matched by identity 0" +"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3416 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 3417 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func2 -> DEBU 3418 0xc0035b5040 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.685 UTC [cauthdsl] func1 -> DEBU 3419 0xc0035b5040 gate 1563590436685298700 evaluation succeeds" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.685 UTC [policies] Evaluate -> DEBU 341d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341e Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:36.685 UTC [msp.identity] Verify -> DEBU 341f Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3420 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:36.686 UTC [msp.identity] Verify -> DEBU 3421 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" +"2019-07-20 02:40:36.686 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" +"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3424 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3425 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3426 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.686 UTC [policies] Evaluate -> DEBU 3429 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.686 UTC [cauthdsl] func1 -> DEBU 342a 0xc003647650 gate 1563590436686687400 evaluation starts" +"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342b 0xc003647650 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342c 0xc003647650 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342d 0xc003647650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.686 UTC [cauthdsl] func2 -> DEBU 342e 0xc003647650 principal evaluation fails" +"2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 342f 0xc003647650 gate 1563590436686687400 evaluation fails" +"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3430 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3431 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.687 UTC [policies] Evaluate -> DEBU 3432 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.687 UTC [cauthdsl] func1 -> DEBU 3433 0xc003647fb0 gate 1563590436687349300 evaluation starts" +"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3434 0xc003647fb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3435 0xc003647fb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.687 UTC [cauthdsl] func2 -> DEBU 3436 0xc003647fb0 principal matched by identity 0" +"2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3437 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:36.687 UTC [msp.identity] Verify -> DEBU 3438 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:36.688 UTC [cauthdsl] func2 -> DEBU 3439 0xc003647fb0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.688 UTC [cauthdsl] func1 -> DEBU 343a 0xc003647fb0 gate 1563590436687349300 evaluation succeeds" +"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.688 UTC [policies] Evaluate -> DEBU 343e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.688 UTC [gossip.gossip] handleMessage -> DEBU 343f Exiting" +"2019-07-20 02:40:36.692 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.692 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3442 Obtaining identity" +"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3443 Obtaining identity" +"2019-07-20 02:40:36.692 UTC [msp] DeserializeIdentity -> DEBU 3444 Obtaining identity" +"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3445 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3446 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.693 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 344a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 344b 0xc003541730 gate 1563590436693379500 evaluation starts" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344c 0xc003541730 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344d 0xc003541730 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344e 0xc003541730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 344f 0xc003541730 principal evaluation fails" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3450 0xc003541730 gate 1563590436693379500 evaluation fails" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3451 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3452 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.693 UTC [policies] Evaluate -> DEBU 3453 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func1 -> DEBU 3454 0xc003541f70 gate 1563590436693729200 evaluation starts" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3455 0xc003541f70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3456 0xc003541f70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.693 UTC [cauthdsl] func2 -> DEBU 3457 0xc003541f70 principal matched by identity 0" +"2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3458 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:36.693 UTC [msp.identity] Verify -> DEBU 3459 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:36.694 UTC [cauthdsl] func2 -> DEBU 345a 0xc003541f70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.694 UTC [cauthdsl] func1 -> DEBU 345b 0xc003541f70 gate 1563590436693729200 evaluation succeeds" +"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.694 UTC [policies] Evaluate -> DEBU 345f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3460 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3461 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3462 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:36.694 UTC [msp.identity] Verify -> DEBU 3463 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" +"2019-07-20 02:40:36.695 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" +"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3466 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3467 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3468 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 346b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 346c 0xc0036866f0 gate 1563590436695671100 evaluation starts" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346d 0xc0036866f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346e 0xc0036866f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 346f 0xc0036866f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func2 -> DEBU 3470 0xc0036866f0 principal evaluation fails" +"2019-07-20 02:40:36.695 UTC [cauthdsl] func1 -> DEBU 3471 0xc0036866f0 gate 1563590436695671100 evaluation fails" +"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.695 UTC [policies] Evaluate -> DEBU 3473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 3475 0xc003687050 gate 1563590436696063500 evaluation starts" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3476 0xc003687050 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3477 0xc003687050 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 3478 0xc003687050 principal matched by identity 0" +"2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 3479 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:36.696 UTC [msp.identity] Verify -> DEBU 347a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func2 -> DEBU 347b 0xc003687050 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.696 UTC [cauthdsl] func1 -> DEBU 347c 0xc003687050 gate 1563590436696063500 evaluation succeeds" +"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 347f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.696 UTC [policies] Evaluate -> DEBU 3480 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.696 UTC [gossip.gossip] handleMessage -> DEBU 3481 Exiting" +"2019-07-20 02:40:36.697 UTC [gossip.comm] func1 -> DEBU 3482 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.697 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3484 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3485 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3486 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:36.698 UTC [msp.identity] Verify -> DEBU 3487 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3488 Obtaining identity" +"2019-07-20 02:40:36.698 UTC [msp] DeserializeIdentity -> DEBU 3489 Obtaining identity" +"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 348a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 348c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 348f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3490 0xc00369fb60 gate 1563590436699245600 evaluation starts" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3491 0xc00369fb60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3492 0xc00369fb60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3493 0xc00369fb60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 3494 0xc00369fb60 principal evaluation fails" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3495 0xc00369fb60 gate 1563590436699245600 evaluation fails" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3496 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 3498 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 3499 0xc0036b24b0 gate 1563590436699489000 evaluation starts" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349a 0xc0036b24b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349b 0xc0036b24b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349c 0xc0036b24b0 principal matched by identity 0" +"2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349d Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:36.699 UTC [msp.identity] Verify -> DEBU 349e Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func2 -> DEBU 349f 0xc0036b24b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.699 UTC [cauthdsl] func1 -> DEBU 34a0 0xc0036b24b0 gate 1563590436699489000 evaluation succeeds" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.699 UTC [policies] Evaluate -> DEBU 34a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a5 Obtaining identity" +"2019-07-20 02:40:36.699 UTC [msp] DeserializeIdentity -> DEBU 34a6 Obtaining identity" +"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34a9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34ad 0xc0036b3c80 gate 1563590436700195900 evaluation starts" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34ae 0xc0036b3c80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34af 0xc0036b3c80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b0 0xc0036b3c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b1 0xc0036b3c80 principal evaluation fails" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b2 0xc0036b3c80 gate 1563590436700195900 evaluation fails" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.700 UTC [policies] Evaluate -> DEBU 34b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func1 -> DEBU 34b6 0xc0036c4500 gate 1563590436700460800 evaluation starts" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b7 0xc0036c4500 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b8 0xc0036c4500 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.700 UTC [cauthdsl] func2 -> DEBU 34b9 0xc0036c4500 principal matched by identity 0" +"2019-07-20 02:40:36.700 UTC [msp.identity] Verify -> DEBU 34ba Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:36.704 UTC [msp.identity] Verify -> DEBU 34bb Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:36.704 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0036c4500 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.704 UTC [cauthdsl] func1 -> DEBU 34bd 0xc0036c4500 gate 1563590436700460800 evaluation succeeds" +"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.704 UTC [policies] Evaluate -> DEBU 34c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.704 UTC [gossip.gossip] handleMessage -> DEBU 34c2 Exiting" +"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c3 Obtaining identity" +"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c4 Obtaining identity" +"2019-07-20 02:40:36.745 UTC [gossip.pull] Hello -> DEBU 34c5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c6 Obtaining identity" +"2019-07-20 02:40:36.745 UTC [msp] DeserializeIdentity -> DEBU 34c7 Obtaining identity" +"2019-07-20 02:40:36.746 UTC [gossip.comm] Send -> DEBU 34c8 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34c9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.746 UTC [gossip.comm] sendToEndpoint -> DEBU 34ca Exiting" +"2019-07-20 02:40:36.747 UTC [gossip.comm] func1 -> DEBU 34cb Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.748 UTC [gossip.gossip] handleMessage -> DEBU 34cc Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.749 UTC [gossip.pull] HandleMessage -> DEBU 34cd GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.750 UTC [gossip.gossip] handleMessage -> DEBU 34ce Exiting" +"2019-07-20 02:40:36.844 UTC [gossip.comm] func1 -> DEBU 34cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.844 UTC [gossip.gossip] handleMessage -> DEBU 34d0 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d1 Obtaining identity" +"2019-07-20 02:40:36.844 UTC [msp] DeserializeIdentity -> DEBU 34d2 Obtaining identity" +"2019-07-20 02:40:36.845 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Exiting" +"2019-07-20 02:40:36.880 UTC [gossip.comm] func1 -> DEBU 34d4 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.880 UTC [gossip.pull] HandleMessage -> DEBU 34d6 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:36.880 UTC [gossip.pull] SendDigest -> DEBU 34d7 Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:36.880 UTC [gossip.gossip] handleMessage -> DEBU 34d8 Exiting" +"2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:36.970 UTC [gossip.election] IsLeader -> DEBU 34da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:36.970 UTC [msp] GetDefaultSigningIdentity -> DEBU 34db Obtaining default signing identity" +"2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dc Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100C1801 " +"2019-07-20 02:40:36.970 UTC [msp.identity] Sign -> DEBU 34dd Sign: digest: 1B78485C66C4756B9D42225FAB4CE1C790E01C21A93694B1C2B8F1C403FEBC34 " +"2019-07-20 02:40:36.970 UTC [gossip.election] waitForInterrupt -> DEBU 34de c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:36.971 UTC [gossip.comm] func1 -> DEBU 34df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e0 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.971 UTC [gossip.gossip] handleMessage -> DEBU 34e1 Exiting" +"2019-07-20 02:40:36.971 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34e3 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:36.971 UTC [msp] DeserializeIdentity -> DEBU 34e4 Obtaining identity" +"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34e5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.971 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34e7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34eb 0xc0036eb550 gate 1563590436971658300 evaluation starts" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ec 0xc0036eb550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ed 0xc0036eb550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ee 0xc0036eb550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func2 -> DEBU 34ef 0xc0036eb550 principal evaluation fails" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f0 0xc0036eb550 gate 1563590436971658300 evaluation fails" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:36.971 UTC [policies] Evaluate -> DEBU 34f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:36.971 UTC [cauthdsl] func1 -> DEBU 34f4 0xc0036ebd90 gate 1563590436971953500 evaluation starts" +"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f5 0xc0036ebd90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f6 0xc0036ebd90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34f7 0xc0036ebd90 principal matched by identity 0" +"2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f8 Verify: digest = 00000000 26 df 49 f8 3f 7b e1 94 4e 01 29 2d c7 af 47 40 |&.I.?{..N.)-..G@| +00000010 4c 78 11 f1 2b f8 e2 79 69 30 ff 55 94 2d 6e 4a |Lx..+..yi0.U.-nJ|" +"2019-07-20 02:40:36.972 UTC [msp.identity] Verify -> DEBU 34f9 Verify: sig = 00000000 30 45 02 21 00 df 98 33 75 f9 69 d0 40 55 0a 3b |0E.!...3u.i.@U.;| +00000010 da de 7c a1 0c 38 ed 61 63 71 ba ab 2a 7d 6e a6 |..|..8.acq..*}n.| +00000020 7f 2c 2c 42 8c 02 20 66 14 35 b5 9e f3 a6 dc 45 |.,,B.. f.5.....E| +00000030 13 fd 9f 8e 41 72 6e e2 53 88 4e 4b 1d 8b e2 d2 |....Arn.S.NK....| +00000040 b4 07 5f 1d c2 61 08 |.._..a.|" +"2019-07-20 02:40:36.972 UTC [cauthdsl] func2 -> DEBU 34fa 0xc0036ebd90 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:36.972 UTC [cauthdsl] func1 -> DEBU 34fb 0xc0036ebd90 gate 1563590436971953500 evaluation succeeds" +"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34fe Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:36.972 UTC [policies] Evaluate -> DEBU 34ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3500 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3501 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3502 updating membership: timestamp: " +"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3503 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3504 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] learnExistingMembers -> DEBU 3505 Exiting" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 3506 Exiting" +"2019-07-20 02:40:36.972 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3507 Exiting" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3508 Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3509 Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350a Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350b Obtaining identity" +"2019-07-20 02:40:36.974 UTC [gossip.comm] Send -> DEBU 350c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350d Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350e Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 350f Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3510 Obtaining identity" +"2019-07-20 02:40:36.974 UTC [msp] DeserializeIdentity -> DEBU 3511 Obtaining identity" +"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3512 Obtaining identity" +"2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3514 Obtaining identity" +"2019-07-20 02:40:36.975 UTC [msp] DeserializeIdentity -> DEBU 3515 Obtaining identity" +"2019-07-20 02:40:36.975 UTC [gossip.comm] Send -> DEBU 3516 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3517 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3518 Exiting" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 3519 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351a Exiting" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.comm] sendToEndpoint -> DEBU 351c Exiting" +"2019-07-20 02:40:36.975 UTC [gossip.comm] func1 -> DEBU 351d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.gossip] handleMessage -> DEBU 351f Exiting" +"2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3520 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3521 Exiting" +"2019-07-20 02:40:36.979 UTC [gossip.comm] func1 -> DEBU 3522 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3523 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.979 UTC [gossip.gossip] handleMessage -> DEBU 3524 Exiting" +"2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:36.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3526 Exiting" +"2019-07-20 02:40:37.007 UTC [gossip.comm] func1 -> DEBU 3527 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:37.007 UTC [gossip.gossip] handleMessage -> DEBU 3528 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 3529 Obtaining identity" +"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352a Obtaining identity" +"2019-07-20 02:40:37.008 UTC [msp] DeserializeIdentity -> DEBU 352b Obtaining identity" +"2019-07-20 02:40:37.008 UTC [gossip.gossip] handleMessage -> DEBU 352c Exiting" +"2019-07-20 02:40:37.146 UTC [gossip.comm] func1 -> DEBU 352d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:37.146 UTC [gossip.gossip] handleMessage -> DEBU 352e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" +"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +"2019-07-20 02:40:37.147 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" +"2019-07-20 02:40:37.147 UTC [gossip.gossip] handleMessage -> DEBU 3532 Exiting" +"2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3533 Obtaining default signing identity" +"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3534 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151027 " +"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3535 Sign: digest: EF598D4BA71D68883581531AA57270E0ABB11DBA25246FB693F61EFAC554FFBB " +"2019-07-20 02:40:37.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 3536 Obtaining default signing identity" +"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3537 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:37.282 UTC [msp.identity] Sign -> DEBU 3538 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:37.282 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3539 Sleeping 5s" +"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" +"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" +"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" +"2019-07-20 02:40:37.287 UTC [gossip.comm] Send -> DEBU 353d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:37.287 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +"2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 353f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:37.288 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3541 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3542 Exiting" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.288 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" +"2019-07-20 02:40:37.337 UTC [gossip.comm] func1 -> DEBU 3547 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3548 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.337 UTC [gossip.gossip] handleMessage -> DEBU 3549 Exiting" +"2019-07-20 02:40:37.337 UTC [gossip.discovery] handleMsgFromComm -> DEBU 354a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.337 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 354b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354c Verify: digest = 00000000 98 8b b6 ea 63 6c 28 c5 81 cc fc 32 bc ba 47 44 |....cl(....2..GD| +00000010 ea 06 ac a5 80 7a 18 18 87 75 03 4d ed 29 ca 31 |.....z...u.M.).1|" +"2019-07-20 02:40:37.338 UTC [msp.identity] Verify -> DEBU 354d Verify: sig = 00000000 30 45 02 21 00 e4 0c 73 62 cd e2 a3 44 56 f0 91 |0E.!...sb...DV..| +00000010 df b4 11 07 ac ff 34 83 0c 60 55 4a a5 7d fe 3d |......4..`UJ.}.=| +00000020 4d 38 05 0f 3a 02 20 78 12 92 81 07 2e 52 0a c9 |M8..:. x.....R..| +00000030 7f 39 b6 dc 66 ea 24 d3 0d 45 66 11 e6 6e 93 4f |.9..f.$..Ef..n.O| +00000040 51 bb f6 02 a4 ee 6d |Q.....m|" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 354e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 Exiting" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleAliveMessage -> DEBU 3554 Exiting" +"2019-07-20 02:40:37.338 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3555 Exiting" +"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" +"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 3558 Obtaining identity" +"2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 3559 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:37.341 UTC [msp] DeserializeIdentity -> DEBU 355a Obtaining identity" +"2019-07-20 02:40:37.341 UTC [gossip.comm] Send -> DEBU 355b Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355d Exiting" +"2019-07-20 02:40:37.341 UTC [gossip.comm] sendToEndpoint -> DEBU 355e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.342 UTC [gossip.comm] sendToEndpoint -> DEBU 355f Exiting" +"2019-07-20 02:40:37.342 UTC [gossip.comm] func1 -> DEBU 3560 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3561 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.342 UTC [gossip.gossip] handleMessage -> DEBU 3562 Exiting" +"2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3563 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3564 Exiting" +"2019-07-20 02:40:37.349 UTC [gossip.comm] func1 -> DEBU 3565 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3566 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.349 UTC [gossip.gossip] handleMessage -> DEBU 3567 Exiting" +"2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3568 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:37.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3569 Exiting" +"2019-07-20 02:40:37.521 UTC [gossip.comm] func1 -> DEBU 356a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.521 UTC [gossip.gossip] handleMessage -> DEBU 356c Exiting" +"2019-07-20 02:40:37.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 356d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 356e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:37.522 UTC [msp] DeserializeIdentity -> DEBU 356f Obtaining identity" +"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3570 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3571 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:37.523 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3572 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3573 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3574 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3575 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3576 0xc0039bcdf0 gate 1563590437523295700 evaluation starts" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3577 0xc0039bcdf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3578 0xc0039bcdf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3579 0xc0039bcdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 357a 0xc0039bcdf0 principal evaluation fails" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357b 0xc0039bcdf0 gate 1563590437523295700 evaluation fails" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 357e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 357f 0xc0039bd630 gate 1563590437523623400 evaluation starts" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3580 0xc0039bd630 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3581 0xc0039bd630 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3582 0xc0039bd630 principal matched by identity 0" +"2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3583 Verify: digest = 00000000 26 fc 28 ac 88 f9 f3 87 de 93 74 3c 3d 76 8e 42 |&.(.......t<=v.B| +00000010 b5 84 89 8d f7 05 59 de 8b 52 64 19 7f b9 a0 ff |......Y..Rd.....|" +"2019-07-20 02:40:37.523 UTC [msp.identity] Verify -> DEBU 3584 Verify: sig = 00000000 30 44 02 20 65 be 11 a3 8d 9c 28 c9 4d 98 c2 b4 |0D. e.....(.M...| +00000010 0d 34 0c 31 29 b9 f4 36 51 01 aa 83 98 69 9f 86 |.4.1)..6Q....i..| +00000020 4a bc c1 f1 02 20 3f 80 eb de c3 95 42 34 e2 f1 |J.... ?.....B4..| +00000030 7e 58 a1 ce 51 ae 5d d4 34 a1 82 2e ca 2c 53 95 |~X..Q.].4....,S.| +00000040 ee 18 7e 26 ce 0a |..~&..|" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func2 -> DEBU 3585 0xc0039bd630 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:37.523 UTC [cauthdsl] func1 -> DEBU 3586 0xc0039bd630 gate 1563590437523623400 evaluation succeeds" +"2019-07-20 02:40:37.523 UTC [policies] Evaluate -> DEBU 3587 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3588 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 3589 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:37.524 UTC [policies] Evaluate -> DEBU 358a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 358b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358d updating membership: timestamp: " +"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358e Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 358f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:37.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 3590 Exiting" +"2019-07-20 02:40:37.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 3591 Exiting" +"2019-07-20 02:40:37.526 UTC [gossip.comm] func1 -> DEBU 3592 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3593 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.525 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3594 Exiting" +"2019-07-20 02:40:37.526 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" +"2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3597 Exiting" +"2019-07-20 02:40:37.533 UTC [gossip.comm] func1 -> DEBU 3598 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 3599 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.533 UTC [gossip.gossip] handleMessage -> DEBU 359a Exiting" +"2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359c Exiting" +"2019-07-20 02:40:37.535 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359e Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 359f Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a0 Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a1 Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a2 Obtaining identity" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" +"2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:37.536 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" +"2019-07-20 02:40:37.536 UTC [gossip.comm] Send -> DEBU 35a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a8 Exiting" +"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:37.537 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Exiting" +"2019-07-20 02:40:39.900 UTC [gossip.comm] func1 -> DEBU 35ab Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ac Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.903 UTC [gossip.gossip] handleMessage -> DEBU 35ad Exiting" +"2019-07-20 02:40:39.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35af Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:39.905 UTC [msp] DeserializeIdentity -> DEBU 35b0 Obtaining identity" +"2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35b1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:39.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:39.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35b3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:39.906 UTC [policies] Evaluate -> DEBU 35b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:39.907 UTC [cauthdsl] func1 -> DEBU 35b7 0xc003a8ce70 gate 1563590439907231300 evaluation starts" +"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b8 0xc003a8ce70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35b9 0xc003a8ce70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:39.908 UTC [cauthdsl] func2 -> DEBU 35ba 0xc003a8ce70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:39.909 UTC [cauthdsl] func2 -> DEBU 35bb 0xc003a8ce70 principal evaluation fails" +"2019-07-20 02:40:39.909 UTC [cauthdsl] func1 -> DEBU 35bc 0xc003a8ce70 gate 1563590439907231300 evaluation fails" +"2019-07-20 02:40:39.909 UTC [policies] Evaluate -> DEBU 35bd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:39.910 UTC [policies] Evaluate -> DEBU 35bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:39.910 UTC [cauthdsl] func1 -> DEBU 35c0 0xc003a8d6b0 gate 1563590439910435600 evaluation starts" +"2019-07-20 02:40:39.910 UTC [cauthdsl] func2 -> DEBU 35c1 0xc003a8d6b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c2 0xc003a8d6b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:39.911 UTC [cauthdsl] func2 -> DEBU 35c3 0xc003a8d6b0 principal matched by identity 0" +"2019-07-20 02:40:39.911 UTC [msp.identity] Verify -> DEBU 35c4 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| +00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" +"2019-07-20 02:40:39.912 UTC [msp.identity] Verify -> DEBU 35c5 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| +00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| +00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| +00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| +00000040 e6 b6 2c 4d af 22 19 |..,M.".|" +"2019-07-20 02:40:39.912 UTC [cauthdsl] func2 -> DEBU 35c6 0xc003a8d6b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:39.912 UTC [cauthdsl] func1 -> DEBU 35c7 0xc003a8d6b0 gate 1563590439910435600 evaluation succeeds" +"2019-07-20 02:40:39.912 UTC [policies] Evaluate -> DEBU 35c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35ca Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:39.913 UTC [policies] Evaluate -> DEBU 35cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:39.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 35cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35ce updating membership: timestamp: " +"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35cf Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:39.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:39.915 UTC [gossip.discovery] learnExistingMembers -> DEBU 35d1 Exiting" +"2019-07-20 02:40:39.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d2 Exiting" +"2019-07-20 02:40:39.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35d3 Exiting" +"2019-07-20 02:40:39.915 UTC [gossip.discovery] sendMemResponse -> DEBU 35d4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d5 Obtaining identity" +"2019-07-20 02:40:39.915 UTC [msp] DeserializeIdentity -> DEBU 35d6 Obtaining identity" +"2019-07-20 02:40:39.916 UTC [msp] DeserializeIdentity -> DEBU 35d7 Obtaining identity" +"2019-07-20 02:40:39.916 UTC [gossip.comm] Send -> DEBU 35d8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35d9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.916 UTC [gossip.comm] sendToEndpoint -> DEBU 35da Exiting" +"2019-07-20 02:40:39.916 UTC [gossip.discovery] sendMemResponse -> DEBU 35db Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020+" signature:"0E\002!\000\344\014sb\315\342\243DV\360\221\337\264\021\007\254\3774\203\014`UJ\245}\376=M8\005\017:\002 x\022\222\201\007.R\n\311\1779\266\334f\352$\323\rEf\021\346n\223OQ\273\366\002\244\356m" > alive: alive: alive: " +"2019-07-20 02:40:39.932 UTC [gossip.comm] func1 -> DEBU 35dc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.932 UTC [gossip.gossip] handleMessage -> DEBU 35dd Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.932 UTC [gossip.pull] HandleMessage -> DEBU 35de GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:39.932 UTC [msp] DeserializeIdentity -> DEBU 35df Obtaining identity" +"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e0 Obtaining identity" +"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e1 Obtaining identity" +"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e2 Obtaining identity" +"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e3 Obtaining identity" +"2019-07-20 02:40:39.933 UTC [msp] DeserializeIdentity -> DEBU 35e4 Obtaining identity" +"2019-07-20 02:40:39.933 UTC [gossip.pull] SendDigest -> DEBU 35e5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:39.934 UTC [gossip.gossip] handleMessage -> DEBU 35e6 Exiting" +"2019-07-20 02:40:40.231 UTC [gossip.pull] Hello -> DEBU 35e7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:40.231 UTC [gossip.comm] Send -> DEBU 35e8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.232 UTC [gossip.comm] sendToEndpoint -> DEBU 35ea Exiting" +"2019-07-20 02:40:40.234 UTC [gossip.comm] func1 -> DEBU 35eb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.232 UTC [gossip.pull] Hello -> DEBU 35ec Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ed Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.234 UTC [gossip.pull] Hello -> DEBU 35ee Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:40.234 UTC [gossip.comm] Send -> DEBU 35ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.234 UTC [gossip.comm] sendToEndpoint -> DEBU 35f1 Exiting" +"2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.235 UTC [gossip.comm] sendToEndpoint -> DEBU 35f3 Exiting" +"2019-07-20 02:40:40.235 UTC [gossip.gossip] handleMessage -> DEBU 35f4 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.236 UTC [gossip.pull] HandleMessage -> DEBU 35f5 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.237 UTC [gossip.gossip] handleMessage -> DEBU 35f7 Exiting" +"2019-07-20 02:40:40.236 UTC [gossip.comm] func1 -> DEBU 35f6 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.238 UTC [gossip.pull] HandleMessage -> DEBU 35f9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.238 UTC [gossip.gossip] handleMessage -> DEBU 35fa Exiting" +"2019-07-20 02:40:40.239 UTC [gossip.comm] func1 -> DEBU 35fb Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.239 UTC [gossip.gossip] handleMessage -> DEBU 35fc Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.239 UTC [gossip.pull] HandleMessage -> DEBU 35fd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.240 UTC [gossip.gossip] handleMessage -> DEBU 35fe Exiting" +"2019-07-20 02:40:40.273 UTC [msp] GetDefaultSigningIdentity -> DEBU 35ff Obtaining default signing identity" +"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3600 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151028 " +"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3601 Sign: digest: 0A3BB45DB1F5C8EAA3328930FC5D9B22EF7414C203CE4D29C9118912D79EAC98 " +"2019-07-20 02:40:40.274 UTC [msp] GetDefaultSigningIdentity -> DEBU 3602 Obtaining default signing identity" +"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3603 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:40.274 UTC [msp.identity] Sign -> DEBU 3604 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:40.274 UTC [gossip.comm] Send -> DEBU 3605 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3606 Obtaining identity" +"2019-07-20 02:40:40.275 UTC [gossip.comm] Send -> DEBU 3607 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.275 UTC [msp] DeserializeIdentity -> DEBU 3608 Obtaining identity" +"2019-07-20 02:40:40.276 UTC [gossip.comm] Send -> DEBU 3609 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360b Exiting" +"2019-07-20 02:40:40.276 UTC [gossip.comm] sendToEndpoint -> DEBU 360c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.277 UTC [gossip.comm] sendToEndpoint -> DEBU 360d Exiting" +"2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 360e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 3611 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.279 UTC [gossip.gossip] handleMessage -> DEBU 3612 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3610 Exiting" +"2019-07-20 02:40:40.280 UTC [gossip.gossip] handleMessage -> DEBU 3613 Exiting" +"2019-07-20 02:40:40.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3614 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.281 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3615 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3616 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +"2019-07-20 02:40:40.279 UTC [gossip.comm] func1 -> DEBU 360f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.282 UTC [gossip.gossip] handleMessage -> DEBU 3618 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.282 UTC [gossip.comm] func1 -> DEBU 3617 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.282 UTC [msp.identity] Verify -> DEBU 3619 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +00000040 df fe cf 90 da 0d 55 |......U|" +"2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:40.283 UTC [msp.identity] Verify -> DEBU 361b Verify: sig = 00000000 30 45 02 21 00 bd 14 2e 87 ca ed f1 6f d1 29 68 |0E.!........o.)h| +00000010 7d 2a 6f e8 b1 f6 83 ed da fb 4f a9 6d ea 92 5b |}*o.......O.m..[| +00000020 db a3 ff 5d 5f 02 20 12 d9 06 3d f1 de 82 e1 d3 |...]_. ...=.....| +00000030 97 44 5a 18 4c f8 48 62 8a 53 0c ad a5 cc 41 b3 |.DZ.L.Hb.S....A.| +00000040 30 53 5a 99 d3 4d 7f |0SZ..M.|" +"2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:40.283 UTC [gossip.discovery] isSentByMe -> DEBU 361d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:40.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 361e Exiting" +"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 361f Exiting" +"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3620 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3621 Exiting" +"2019-07-20 02:40:40.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3622 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:40.284 UTC [gossip.gossip] handleMessage -> DEBU 3623 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3624 Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +"2019-07-20 02:40:40.284 UTC [msp.identity] Verify -> DEBU 3625 Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +00000040 df fe cf 90 da 0d 55 |......U|" +"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3626 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:40.284 UTC [gossip.discovery] isSentByMe -> DEBU 3627 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:40.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 3628 Exiting" +"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3629 Exiting" +"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 362a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 362b Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:40.285 UTC [gossip.gossip] handleMessage -> DEBU 362c Exiting" +"2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 0a 3b b4 5d b1 f5 c8 ea a3 32 89 30 fc 5d 9b 22 |.;.].....2.0.]."| +00000010 ef 74 14 c2 03 ce 4d 29 c9 11 89 12 d7 9e ac 98 |.t....M)........|" +"2019-07-20 02:40:40.285 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 45 02 21 00 d5 96 08 29 85 19 b7 63 dc 90 f9 |0E.!....)...c...| +00000010 17 43 8b 66 ef 43 4f 89 25 09 8c de c6 51 b2 50 |.C.f.CO.%....Q.P| +00000020 57 c0 28 eb 3a 02 20 78 64 74 5c ae 23 40 ed 77 |W.(.:. xdt\.#@.w| +00000030 5b c8 42 49 45 ba 60 a8 df 37 3b 2f 73 5a c0 22 |[.BIE.`..7;/sZ."| +00000040 df fe cf 90 da 0d 55 |......U|" +"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 362f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:40.285 UTC [gossip.discovery] isSentByMe -> DEBU 3630 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:40.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3631 Exiting" +"2019-07-20 02:40:40.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3632 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:40.285 UTC [msp] DeserializeIdentity -> DEBU 3633 Obtaining identity" +"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3634 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3635 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3636 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3637 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3638 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.286 UTC [policies] Evaluate -> DEBU 3639 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363a 0xc003c5cbf0 gate 1563590440286448700 evaluation starts" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363b 0xc003c5cbf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363c 0xc003c5cbf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363d 0xc003c5cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func2 -> DEBU 363e 0xc003c5cbf0 principal evaluation fails" +"2019-07-20 02:40:40.286 UTC [cauthdsl] func1 -> DEBU 363f 0xc003c5cbf0 gate 1563590440286448700 evaluation fails" +"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3640 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.287 UTC [policies] Evaluate -> DEBU 3642 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.287 UTC [cauthdsl] func1 -> DEBU 3643 0xc003c5d430 gate 1563590440287616200 evaluation starts" +"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3644 0xc003c5d430 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3645 0xc003c5d430 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.287 UTC [cauthdsl] func2 -> DEBU 3646 0xc003c5d430 principal matched by identity 0" +"2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3647 Verify: digest = 00000000 07 c5 67 64 18 c9 af 45 eb ea b4 3c e4 72 7f f4 |..gd...E...<.r..| +00000010 a8 65 2a 77 67 3f e6 41 18 ac 7f ff a1 21 68 cd |.e*wg?.A.....!h.|" +"2019-07-20 02:40:40.288 UTC [msp.identity] Verify -> DEBU 3648 Verify: sig = 00000000 30 45 02 21 00 c8 c1 65 36 7e 3f c1 76 7e 65 68 |0E.!...e6~?.v~eh| +00000010 f6 e4 70 a6 3a c2 a8 19 6d 5a 77 2e ef 9e a2 18 |..p.:...mZw.....| +00000020 0e f0 6b 43 e6 02 20 7a 9a 49 ed 81 29 91 fd 63 |..kC.. z.I..)..c| +00000030 ee 2f a2 21 39 66 69 d6 ee cf dd 9c 61 6a de a6 |./.!9fi.....aj..| +00000040 e6 b6 2c 4d af 22 19 |..,M.".|" +"2019-07-20 02:40:40.288 UTC [cauthdsl] func2 -> DEBU 3649 0xc003c5d430 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.288 UTC [cauthdsl] func1 -> DEBU 364a 0xc003c5d430 gate 1563590440287616200 evaluation succeeds" +"2019-07-20 02:40:40.288 UTC [policies] Evaluate -> DEBU 364b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.289 UTC [policies] Evaluate -> DEBU 364c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.290 UTC [policies] Evaluate -> DEBU 364e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 364f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3650 Exiting" +"2019-07-20 02:40:40.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3651 Exiting" +"2019-07-20 02:40:40.335 UTC [gossip.comm] func1 -> DEBU 3652 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.335 UTC [gossip.gossip] handleMessage -> DEBU 3653 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.336 UTC [gossip.pull] HandleMessage -> DEBU 3654 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.336 UTC [gossip.pull] SendDigest -> DEBU 3655 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:40.337 UTC [gossip.gossip] handleMessage -> DEBU 3656 Exiting" +"2019-07-20 02:40:40.358 UTC [gossip.comm] func1 -> DEBU 3657 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.358 UTC [gossip.gossip] handleMessage -> DEBU 3658 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.359 UTC [gossip.gossip] handleMessage -> DEBU 3659 Exiting" +"2019-07-20 02:40:40.359 UTC [gossip.discovery] handleMsgFromComm -> DEBU 365a Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.360 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 365b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365c Verify: digest = 00000000 fb dc 02 43 57 88 bb 80 98 63 10 d2 3f 04 93 d2 |...CW....c..?...| +00000010 93 84 7e 83 65 4b 08 94 62 c6 2f 60 b1 ed ae 3b |..~.eK..b./`...;|" +"2019-07-20 02:40:40.361 UTC [msp.identity] Verify -> DEBU 365d Verify: sig = 00000000 30 44 02 20 19 8c a5 29 75 ff 31 ca 2c fd 17 48 |0D. ...)u.1.,..H| +00000010 66 f2 fd fd db 73 53 2f 7f 26 3f ef 96 f5 9a bd |f....sS/.&?.....| +00000020 1c 0c 88 e9 02 20 32 8c 99 1d 21 5a de 73 c3 dd |..... 2...!Z.s..| +00000030 36 93 18 43 30 6b cd 7a 56 eb f7 63 2a f9 3f ef |6..C0k.zV..c*.?.| +00000040 b0 4e 51 c0 54 c3 |.NQ.T.|" +"2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365e Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:40.362 UTC [msp.identity] Verify -> DEBU 365f Verify: sig = 00000000 30 44 02 20 64 89 b2 7f d6 93 e1 aa 26 0e 23 01 |0D. d.......&.#.| +00000010 18 0b f4 7e 51 5a d6 7d 7a aa 6f 90 77 af 57 69 |...~QZ.}z.o.w.Wi| +00000020 c5 20 b3 61 02 20 7e 33 7f 90 90 ec 6f 5e bc 9a |. .a. ~3....o^..| +00000030 cc ff 54 37 03 96 f5 87 ed ce ba 6e fe 55 e8 31 |..T7.......n.U.1| +00000040 01 1c 4b f1 54 f4 |..K.T.|" +"2019-07-20 02:40:40.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3660 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:40.363 UTC [gossip.discovery] learnExistingMembers -> DEBU 3661 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3662 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3663 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3664 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:40.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 3665 Exiting" +"2019-07-20 02:40:40.364 UTC [gossip.discovery] handleAliveMessage -> DEBU 3666 Exiting" +"2019-07-20 02:40:40.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3667 Exiting" +"2019-07-20 02:40:40.365 UTC [gossip.discovery] sendMemResponse -> DEBU 3668 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 3669 Obtaining identity" +"2019-07-20 02:40:40.365 UTC [msp] DeserializeIdentity -> DEBU 366a Obtaining identity" +"2019-07-20 02:40:40.366 UTC [gossip.comm] Send -> DEBU 366b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.366 UTC [gossip.discovery] sendMemResponse -> DEBU 366c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" secret_envelope: > alive: " +"2019-07-20 02:40:40.366 UTC [gossip.comm] sendToEndpoint -> DEBU 366d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.367 UTC [gossip.comm] sendToEndpoint -> DEBU 366e Exiting" +"2019-07-20 02:40:40.524 UTC [gossip.comm] func1 -> DEBU 366f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.525 UTC [gossip.gossip] handleMessage -> DEBU 3670 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.525 UTC [gossip.pull] HandleMessage -> DEBU 3671 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.525 UTC [msp] DeserializeIdentity -> DEBU 3672 Obtaining identity" +"2019-07-20 02:40:40.526 UTC [msp] DeserializeIdentity -> DEBU 3673 Obtaining identity" +"2019-07-20 02:40:40.527 UTC [msp] DeserializeIdentity -> DEBU 3674 Obtaining identity" +"2019-07-20 02:40:40.528 UTC [msp] DeserializeIdentity -> DEBU 3675 Obtaining identity" +"2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3676 Obtaining identity" +"2019-07-20 02:40:40.529 UTC [msp] DeserializeIdentity -> DEBU 3677 Obtaining identity" +"2019-07-20 02:40:40.529 UTC [gossip.pull] SendDigest -> DEBU 3678 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:40.529 UTC [gossip.gossip] handleMessage -> DEBU 3679 Exiting" +"2019-07-20 02:40:40.546 UTC [gossip.comm] func1 -> DEBU 367a Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.546 UTC [gossip.gossip] handleMessage -> DEBU 367c Exiting" +"2019-07-20 02:40:40.547 UTC [gossip.discovery] handleMsgFromComm -> DEBU 367d Got message: GossipMessage: tag:EMPTY mem_req:|l\036v\n\020\365\366\202TE\261u\344\013D" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 367e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:40.548 UTC [msp] DeserializeIdentity -> DEBU 367f Obtaining identity" +"2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3680 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.548 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3681 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.549 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3682 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3683 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3684 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 3685 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 3686 0xc003d44800 gate 1563590440550548800 evaluation starts" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3687 0xc003d44800 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3688 0xc003d44800 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3689 0xc003d44800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 368a 0xc003d44800 principal evaluation fails" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368b 0xc003d44800 gate 1563590440550548800 evaluation fails" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.550 UTC [policies] Evaluate -> DEBU 368e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func1 -> DEBU 368f 0xc003d45040 gate 1563590440550925000 evaluation starts" +"2019-07-20 02:40:40.550 UTC [cauthdsl] func2 -> DEBU 3690 0xc003d45040 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3691 0xc003d45040 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3692 0xc003d45040 principal matched by identity 0" +"2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3693 Verify: digest = 00000000 5f f2 6b 78 bc a6 fb 49 6d f3 62 88 dc 48 6c 55 |_.kx...Im.b..HlU| +00000010 16 57 83 14 e8 fb a8 28 77 08 c6 70 0f 6e 7b dd |.W.....(w..p.n{.|" +"2019-07-20 02:40:40.551 UTC [msp.identity] Verify -> DEBU 3694 Verify: sig = 00000000 30 44 02 20 54 be fe 36 a5 43 b2 55 ab 8e 71 5e |0D. T..6.C.U..q^| +00000010 39 d1 80 9b 97 1e 33 a3 b0 f2 53 e2 1a c2 f7 d1 |9.....3...S.....| +00000020 f0 0f 25 f9 02 20 34 5c b7 f5 2c 4b 34 49 6c f6 |..%.. 4\..,K4Il.| +00000030 59 f6 21 76 6e 3e 7c 6c 1e 76 0a 10 f5 f6 82 54 |Y.!vn>|l.v.....T| +00000040 45 b1 75 e4 0b 44 |E.u..D|" +"2019-07-20 02:40:40.551 UTC [cauthdsl] func2 -> DEBU 3695 0xc003d45040 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.551 UTC [cauthdsl] func1 -> DEBU 3696 0xc003d45040 gate 1563590440550925000 evaluation succeeds" +"2019-07-20 02:40:40.551 UTC [policies] Evaluate -> DEBU 3697 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.552 UTC [policies] Evaluate -> DEBU 3698 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 3699 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.553 UTC [policies] Evaluate -> DEBU 369a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 369b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:40.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 369c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369d updating membership: timestamp: " +"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:40.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Exiting" +"2019-07-20 02:40:40.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a1 Exiting" +"2019-07-20 02:40:40.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a2 Exiting" +"2019-07-20 02:40:40.555 UTC [gossip.discovery] sendMemResponse -> DEBU 36a3 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:40.555 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +"2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a5 Obtaining identity" +"2019-07-20 02:40:40.556 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +"2019-07-20 02:40:40.556 UTC [gossip.comm] Send -> DEBU 36a7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.557 UTC [gossip.discovery] sendMemResponse -> DEBU 36a8 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020," signature:"0D\002 \031\214\245)u\3771\312,\375\027Hf\362\375\375\333sS/\177&?\357\226\365\232\275\034\014\210\351\002 2\214\231\035!Z\336s\303\3356\223\030C0k\315zV\353\367c*\371?\357\260NQ\300T\303" > alive:|l\036v\n\020\365\366\202TE\261u\344\013D" > alive: alive: " +"2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.557 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Exiting" +"2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ab Obtaining identity" +"2019-07-20 02:40:40.683 UTC [msp] DeserializeIdentity -> DEBU 36ac Obtaining identity" +"2019-07-20 02:40:40.683 UTC [gossip.comm] Send -> DEBU 36ad Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36af Exiting" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b1 Exiting" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.683 UTC [gossip.comm] sendToEndpoint -> DEBU 36b3 Exiting" +"2019-07-20 02:40:40.686 UTC [gossip.comm] func1 -> DEBU 36b4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.686 UTC [gossip.gossip] handleMessage -> DEBU 36b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b6 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b7 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b8 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:40.686 UTC [msp.identity] Verify -> DEBU 36b9 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36ba Obtaining identity" +"2019-07-20 02:40:40.687 UTC [msp] DeserializeIdentity -> DEBU 36bb Obtaining identity" +"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36bc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36be Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c2 0xc003dc47c0 gate 1563590440687798600 evaluation starts" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003dc47c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c4 0xc003dc47c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c5 0xc003dc47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003dc47c0 principal evaluation fails" +"2019-07-20 02:40:40.687 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003dc47c0 gate 1563590440687798600 evaluation fails" +"2019-07-20 02:40:40.687 UTC [policies] Evaluate -> DEBU 36c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36cb 0xc003dc5030 gate 1563590440688085400 evaluation starts" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cc 0xc003dc5030 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36cd 0xc003dc5030 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36ce 0xc003dc5030 principal matched by identity 0" +"2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36cf Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:40.688 UTC [msp.identity] Verify -> DEBU 36d0 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func2 -> DEBU 36d1 0xc003dc5030 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.688 UTC [cauthdsl] func1 -> DEBU 36d2 0xc003dc5030 gate 1563590440688085400 evaluation succeeds" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.688 UTC [policies] Evaluate -> DEBU 36d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.688 UTC [msp] DeserializeIdentity -> DEBU 36d7 Obtaining identity" +"2019-07-20 02:40:40.691 UTC [msp] DeserializeIdentity -> DEBU 36d8 Obtaining identity" +"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36da Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36db Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.692 UTC [policies] Evaluate -> DEBU 36de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.693 UTC [cauthdsl] func1 -> DEBU 36df 0xc003e14800 gate 1563590440693923400 evaluation starts" +"2019-07-20 02:40:40.693 UTC [cauthdsl] func2 -> DEBU 36e0 0xc003e14800 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e1 0xc003e14800 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e2 0xc003e14800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.694 UTC [cauthdsl] func2 -> DEBU 36e3 0xc003e14800 principal evaluation fails" +"2019-07-20 02:40:40.694 UTC [cauthdsl] func1 -> DEBU 36e4 0xc003e14800 gate 1563590440693923400 evaluation fails" +"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.694 UTC [policies] Evaluate -> DEBU 36e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.696 UTC [cauthdsl] func1 -> DEBU 36e8 0xc003e15160 gate 1563590440694341600 evaluation starts" +"2019-07-20 02:40:40.696 UTC [cauthdsl] func2 -> DEBU 36e9 0xc003e15160 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36ea 0xc003e15160 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.697 UTC [cauthdsl] func2 -> DEBU 36eb 0xc003e15160 principal matched by identity 0" +"2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ec Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:40.697 UTC [msp.identity] Verify -> DEBU 36ed Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:40.699 UTC [cauthdsl] func2 -> DEBU 36ee 0xc003e15160 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.699 UTC [cauthdsl] func1 -> DEBU 36ef 0xc003e15160 gate 1563590440694341600 evaluation succeeds" +"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.699 UTC [policies] Evaluate -> DEBU 36f2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f4 Exiting" +"2019-07-20 02:40:40.700 UTC [gossip.comm] func1 -> DEBU 36f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.700 UTC [gossip.gossip] handleMessage -> DEBU 36f6 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f7 Obtaining identity" +"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f8 Obtaining identity" +"2019-07-20 02:40:40.700 UTC [msp] DeserializeIdentity -> DEBU 36f9 Obtaining identity" +"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 36ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3700 0xc003e330d0 gate 1563590440700808900 evaluation starts" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3701 0xc003e330d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3702 0xc003e330d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3703 0xc003e330d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func2 -> DEBU 3704 0xc003e330d0 principal evaluation fails" +"2019-07-20 02:40:40.700 UTC [cauthdsl] func1 -> DEBU 3705 0xc003e330d0 gate 1563590440700808900 evaluation fails" +"2019-07-20 02:40:40.700 UTC [policies] Evaluate -> DEBU 3706 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3707 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3709 0xc003e33910 gate 1563590440701086700 evaluation starts" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370a 0xc003e33910 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370b 0xc003e33910 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370c 0xc003e33910 principal matched by identity 0" +"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370d Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 370e Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func2 -> DEBU 370f 0xc003e33910 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.701 UTC [cauthdsl] func1 -> DEBU 3710 0xc003e33910 gate 1563590440701086700 evaluation succeeds" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3711 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3712 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.701 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3715 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:40.701 UTC [msp.identity] Verify -> DEBU 3716 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3717 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:40.702 UTC [msp.identity] Verify -> DEBU 3718 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 3719 Obtaining identity" +"2019-07-20 02:40:40.702 UTC [msp] DeserializeIdentity -> DEBU 371a Obtaining identity" +"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 371b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 371f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3721 0xc003f4bf90 gate 1563590440702568500 evaluation starts" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3722 0xc003f4bf90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3723 0xc003f4bf90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3724 0xc003f4bf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 3725 0xc003f4bf90 principal evaluation fails" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 3726 0xc003f4bf90 gate 1563590440702568500 evaluation fails" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3727 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.702 UTC [policies] Evaluate -> DEBU 3729 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func1 -> DEBU 372a 0xc003f7c830 gate 1563590440702846900 evaluation starts" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372b 0xc003f7c830 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372c 0xc003f7c830 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.702 UTC [cauthdsl] func2 -> DEBU 372d 0xc003f7c830 principal matched by identity 0" +"2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372e Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:40.703 UTC [msp.identity] Verify -> DEBU 372f Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:40.703 UTC [cauthdsl] func2 -> DEBU 3730 0xc003f7c830 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.703 UTC [cauthdsl] func1 -> DEBU 3731 0xc003f7c830 gate 1563590440702846900 evaluation succeeds" +"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3732 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3733 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3734 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.703 UTC [policies] Evaluate -> DEBU 3735 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3736 Exiting" +"2019-07-20 02:40:40.703 UTC [gossip.comm] func1 -> DEBU 3737 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.703 UTC [gossip.gossip] handleMessage -> DEBU 3738 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 3739 Obtaining identity" +"2019-07-20 02:40:40.703 UTC [msp] DeserializeIdentity -> DEBU 373a Obtaining identity" +"2019-07-20 02:40:40.707 UTC [gossip.privdata] run -> DEBU 373b Start reconcile missing private info" +"2019-07-20 02:40:40.707 UTC [leveldbhelper] GetIterator -> DEBU 373c Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-07-20 02:40:40.707 UTC [msp] DeserializeIdentity -> DEBU 373d Obtaining identity" +"2019-07-20 02:40:40.707 UTC [gossip.privdata] reconcile -> DEBU 373e Reconciliation cycle finished successfully. no items to reconcile" +"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 373f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3740 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3741 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3742 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3743 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.708 UTC [policies] Evaluate -> DEBU 3744 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.708 UTC [cauthdsl] func1 -> DEBU 3745 0xc0029c84a0 gate 1563590440708859500 evaluation starts" +"2019-07-20 02:40:40.708 UTC [cauthdsl] func2 -> DEBU 3746 0xc0029c84a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.712 UTC [cauthdsl] func2 -> DEBU 3747 0xc0029c84a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3748 0xc0029c84a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.713 UTC [cauthdsl] func2 -> DEBU 3749 0xc0029c84a0 principal evaluation fails" +"2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374a 0xc0029c84a0 gate 1563590440708859500 evaluation fails" +"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.715 UTC [policies] Evaluate -> DEBU 374d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.715 UTC [cauthdsl] func1 -> DEBU 374e 0xc0029c8ce0 gate 1563590440715840100 evaluation starts" +"2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 374f 0xc0029c8ce0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.715 UTC [cauthdsl] func2 -> DEBU 3750 0xc0029c8ce0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3751 0xc0029c8ce0 principal matched by identity 0" +"2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3752 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:40.716 UTC [msp.identity] Verify -> DEBU 3753 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:40.716 UTC [cauthdsl] func2 -> DEBU 3754 0xc0029c8ce0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.716 UTC [cauthdsl] func1 -> DEBU 3755 0xc0029c8ce0 gate 1563590440715840100 evaluation succeeds" +"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3756 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3757 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3758 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.716 UTC [policies] Evaluate -> DEBU 3759 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:40.718 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375c Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:40.719 UTC [msp.identity] Verify -> DEBU 375d Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375e Obtaining identity" +"2019-07-20 02:40:40.720 UTC [msp] DeserializeIdentity -> DEBU 375f Obtaining identity" +"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3760 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3761 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3762 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3763 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3764 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:40.720 UTC [policies] Evaluate -> DEBU 3765 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:40.720 UTC [cauthdsl] func1 -> DEBU 3766 0xc002f47300 gate 1563590440720911600 evaluation starts" +"2019-07-20 02:40:40.720 UTC [cauthdsl] func2 -> DEBU 3767 0xc002f47300 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3768 0xc002f47300 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 3769 0xc002f47300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:40.721 UTC [cauthdsl] func2 -> DEBU 376a 0xc002f47300 principal evaluation fails" +"2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376b 0xc002f47300 gate 1563590440720911600 evaluation fails" +"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:40.727 UTC [policies] Evaluate -> DEBU 376e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:40.727 UTC [cauthdsl] func1 -> DEBU 376f 0xc002f47b50 gate 1563590440727644500 evaluation starts" +"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3770 0xc002f47b50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3771 0xc002f47b50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:40.727 UTC [cauthdsl] func2 -> DEBU 3772 0xc002f47b50 principal matched by identity 0" +"2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3773 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:40.727 UTC [msp.identity] Verify -> DEBU 3774 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:40.728 UTC [cauthdsl] func2 -> DEBU 3775 0xc002f47b50 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:40.728 UTC [cauthdsl] func1 -> DEBU 3776 0xc002f47b50 gate 1563590440727644500 evaluation succeeds" +"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3777 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3778 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 3779 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:40.728 UTC [policies] Evaluate -> DEBU 377a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:40.728 UTC [gossip.gossip] handleMessage -> DEBU 377b Exiting" +"2019-07-20 02:40:40.746 UTC [msp] DeserializeIdentity -> DEBU 377c Obtaining identity" +"2019-07-20 02:40:40.747 UTC [msp] DeserializeIdentity -> DEBU 377d Obtaining identity" +"2019-07-20 02:40:40.748 UTC [gossip.pull] Hello -> DEBU 377e Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:40.748 UTC [msp] DeserializeIdentity -> DEBU 377f Obtaining identity" +"2019-07-20 02:40:40.749 UTC [msp] DeserializeIdentity -> DEBU 3780 Obtaining identity" +"2019-07-20 02:40:40.749 UTC [gossip.comm] Send -> DEBU 3781 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3782 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.750 UTC [gossip.comm] sendToEndpoint -> DEBU 3783 Exiting" +"2019-07-20 02:40:40.751 UTC [gossip.comm] func1 -> DEBU 3784 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3785 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.751 UTC [gossip.pull] HandleMessage -> DEBU 3786 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.751 UTC [gossip.gossip] handleMessage -> DEBU 3787 Exiting" +"2019-07-20 02:40:40.842 UTC [gossip.comm] func1 -> DEBU 3788 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 3789 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378a Obtaining identity" +"2019-07-20 02:40:40.843 UTC [msp] DeserializeIdentity -> DEBU 378b Obtaining identity" +"2019-07-20 02:40:40.843 UTC [gossip.gossip] handleMessage -> DEBU 378c Exiting" +"2019-07-20 02:40:40.881 UTC [gossip.comm] func1 -> DEBU 378d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 378e Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.882 UTC [gossip.pull] HandleMessage -> DEBU 378f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:40.882 UTC [gossip.pull] SendDigest -> DEBU 3790 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:40.882 UTC [gossip.gossip] handleMessage -> DEBU 3791 Exiting" +"2019-07-20 02:40:41.008 UTC [gossip.comm] func1 -> DEBU 3792 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:41.008 UTC [gossip.gossip] handleMessage -> DEBU 3793 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3794 Obtaining identity" +"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3795 Obtaining identity" +"2019-07-20 02:40:41.008 UTC [msp] DeserializeIdentity -> DEBU 3796 Obtaining identity" +"2019-07-20 02:40:41.009 UTC [gossip.gossip] handleMessage -> DEBU 3797 Exiting" +"2019-07-20 02:40:41.146 UTC [gossip.comm] func1 -> DEBU 3798 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:41.147 UTC [gossip.gossip] handleMessage -> DEBU 3799 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379a Obtaining identity" +"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379b Obtaining identity" +"2019-07-20 02:40:41.147 UTC [msp] DeserializeIdentity -> DEBU 379c Obtaining identity" +"2019-07-20 02:40:41.148 UTC [gossip.gossip] handleMessage -> DEBU 379d Exiting" +"2019-07-20 02:40:41.977 UTC [gossip.election] waitForInterrupt -> DEBU 379e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:41.977 UTC [gossip.election] IsLeader -> DEBU 379f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:41.977 UTC [msp] GetDefaultSigningIdentity -> DEBU 37a0 Obtaining default signing identity" +"2019-07-20 02:40:41.977 UTC [msp.identity] Sign -> DEBU 37a1 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100D1801 " +"2019-07-20 02:40:41.978 UTC [msp.identity] Sign -> DEBU 37a2 Sign: digest: 90CF7BA600D99E7061E75602966A7ACEBD4D65E00E52CA59FBA09EBA2578E66C " +"2019-07-20 02:40:41.978 UTC [gossip.election] waitForInterrupt -> DEBU 37a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:41.982 UTC [gossip.comm] func1 -> DEBU 37a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:41.982 UTC [gossip.gossip] handleMessage -> DEBU 37a6 Exiting" +"2019-07-20 02:40:41.982 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:41.983 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:41.983 UTC [msp] DeserializeIdentity -> DEBU 37a9 Obtaining identity" +"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ab Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:41.983 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37ae This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:41.983 UTC [policies] Evaluate -> DEBU 37af == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:41.983 UTC [cauthdsl] func1 -> DEBU 37b0 0xc00379b440 gate 1563590441983735900 evaluation starts" +"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00379b440 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00379b440 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:41.983 UTC [cauthdsl] func2 -> DEBU 37b3 0xc00379b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37b4 0xc00379b440 principal evaluation fails" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b5 0xc00379b440 gate 1563590441983735900 evaluation fails" +"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:41.984 UTC [policies] Evaluate -> DEBU 37b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func1 -> DEBU 37b9 0xc00379bc80 gate 1563590441984447200 evaluation starts" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00379bc80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bb 0xc00379bc80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:41.984 UTC [cauthdsl] func2 -> DEBU 37bc 0xc00379bc80 principal matched by identity 0" +"2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37bd Verify: digest = 00000000 6a d4 8c 78 44 12 7c 84 07 4f 31 f8 71 4b 46 8c |j..xD.|..O1.qKF.| +00000010 59 e9 55 6f cb 0a d5 40 e8 f3 82 ba 01 92 53 d7 |Y.Uo...@......S.|" +"2019-07-20 02:40:41.984 UTC [msp.identity] Verify -> DEBU 37be Verify: sig = 00000000 30 45 02 21 00 d1 61 2a 45 0d fb 73 e0 58 2a 80 |0E.!..a*E..s.X*.| +00000010 a0 53 59 88 00 24 11 25 b3 fa b1 59 ab 5f 88 84 |.SY..$.%...Y._..| +00000020 57 0b f9 a6 c2 02 20 10 64 04 4b 06 fe ec 7b 58 |W..... .d.K...{X| +00000030 2e f0 0a 57 ad fa bd d3 42 6b d8 1b 4f a9 9c 8e |...W....Bk..O...| +00000040 76 03 d0 44 2a 69 f7 |v..D*i.|" +"2019-07-20 02:40:41.985 UTC [cauthdsl] func2 -> DEBU 37bf 0xc00379bc80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:41.985 UTC [cauthdsl] func1 -> DEBU 37c0 0xc00379bc80 gate 1563590441984447200 evaluation succeeds" +"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c3 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:41.985 UTC [policies] Evaluate -> DEBU 37c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:41.986 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c7 updating membership: timestamp: " +"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c8 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:41.986 UTC [gossip.discovery] learnExistingMembers -> DEBU 37c9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:41.987 UTC [gossip.discovery] learnExistingMembers -> DEBU 37ca Exiting" +"2019-07-20 02:40:41.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 37cb Exiting" +"2019-07-20 02:40:41.987 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37cc Exiting" +"2019-07-20 02:40:42.004 UTC [gossip.comm] func1 -> DEBU 37cd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37ce Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.004 UTC [gossip.gossip] handleMessage -> DEBU 37cf Exiting" +"2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d1 Exiting" +"2019-07-20 02:40:42.007 UTC [gossip.comm] func1 -> DEBU 37d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d3 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.007 UTC [gossip.gossip] handleMessage -> DEBU 37d4 Exiting" +"2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.007 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d6 Exiting" +"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d7 Obtaining identity" +"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d8 Obtaining identity" +"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37d9 Obtaining identity" +"2019-07-20 02:40:42.007 UTC [msp] DeserializeIdentity -> DEBU 37da Obtaining identity" +"2019-07-20 02:40:42.007 UTC [gossip.comm] Send -> DEBU 37db Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37dd Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37df Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e0 Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e1 Obtaining identity" +"2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e3 Obtaining identity" +"2019-07-20 02:40:42.008 UTC [msp] DeserializeIdentity -> DEBU 37e4 Obtaining identity" +"2019-07-20 02:40:42.008 UTC [gossip.comm] Send -> DEBU 37e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e7 Exiting" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37e9 Exiting" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.009 UTC [gossip.comm] sendToEndpoint -> DEBU 37eb Exiting" +"2019-07-20 02:40:42.285 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ec Obtaining default signing identity" +"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151029 " +"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37ee Sign: digest: 94EFC5E19F8DD13AD2602D31D781B764FAB9DD7174490DFBF95DEC6967F5BDC4 " +"2019-07-20 02:40:42.286 UTC [msp] GetDefaultSigningIdentity -> DEBU 37ef Obtaining default signing identity" +"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f0 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:42.286 UTC [msp.identity] Sign -> DEBU 37f1 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:42.286 UTC [gossip.discovery] periodicalSendAlive -> DEBU 37f2 Sleeping 5s" +"2019-07-20 02:40:42.297 UTC [msp] DeserializeIdentity -> DEBU 37f3 Obtaining identity" +"2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f4 Obtaining identity" +"2019-07-20 02:40:42.298 UTC [msp] DeserializeIdentity -> DEBU 37f5 Obtaining identity" +"2019-07-20 02:40:42.298 UTC [gossip.comm] Send -> DEBU 37f6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.299 UTC [msp] DeserializeIdentity -> DEBU 37f7 Obtaining identity" +"2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.299 UTC [gossip.comm] Send -> DEBU 37f9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.299 UTC [gossip.comm] sendToEndpoint -> DEBU 37fb Exiting" +"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fd Exiting" +"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37fe Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:42.300 UTC [gossip.comm] sendToEndpoint -> DEBU 37ff Exiting" +"2019-07-20 02:40:42.341 UTC [gossip.comm] func1 -> DEBU 3800 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3801 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.342 UTC [gossip.gossip] handleMessage -> DEBU 3802 Exiting" +"2019-07-20 02:40:42.342 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3803 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.343 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3804 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3805 Verify: digest = 00000000 6e 25 38 69 35 0a 9a dc 10 bb 95 88 85 ae 8f 00 |n%8i5...........| +00000010 ac be 7b 41 91 22 32 ef ff ac ef b4 6a 54 27 d7 |..{A."2.....jT'.|" +"2019-07-20 02:40:42.344 UTC [msp.identity] Verify -> DEBU 3806 Verify: sig = 00000000 30 44 02 20 3f 2a 3f 73 a4 52 9b 59 d6 ad d5 53 |0D. ?*?s.R.Y...S| +00000010 e4 6f 34 43 48 06 7a 71 0c 9a c2 bd 2d 7a 1a 29 |.o4CH.zq....-z.)| +00000020 c2 5f 21 fd 02 20 27 4f ba b8 95 b6 ff f8 ec b8 |._!.. 'O........| +00000030 ac 68 dd da f3 b4 bb 76 f4 0e 59 aa 66 14 6f 56 |.h.....v..Y.f.oV| +00000040 4a b8 dd f8 bc 62 |J....b|" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 3807 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3808 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 3809 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380a Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c Exiting" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleAliveMessage -> DEBU 380d Exiting" +"2019-07-20 02:40:42.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 380e Exiting" +"2019-07-20 02:40:42.357 UTC [gossip.comm] func1 -> DEBU 380f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3810 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.357 UTC [gossip.gossip] handleMessage -> DEBU 3811 Exiting" +"2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.357 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3813 Exiting" +"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3814 Obtaining identity" +"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3815 Obtaining identity" +"2019-07-20 02:40:42.358 UTC [msp] DeserializeIdentity -> DEBU 3816 Obtaining identity" +"2019-07-20 02:40:42.358 UTC [gossip.comm] Send -> DEBU 3817 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3818 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.358 UTC [gossip.comm] sendToEndpoint -> DEBU 3819 Exiting" +"2019-07-20 02:40:42.386 UTC [gossip.comm] func1 -> DEBU 381a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.387 UTC [gossip.gossip] handleMessage -> DEBU 381b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.388 UTC [gossip.gossip] handleMessage -> DEBU 381c Exiting" +"2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.388 UTC [gossip.discovery] handleMsgFromComm -> DEBU 381e Exiting" +"2019-07-20 02:40:42.389 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +"2019-07-20 02:40:42.390 UTC [gossip.comm] Send -> DEBU 3820 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3821 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.390 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Exiting" +"2019-07-20 02:40:42.531 UTC [gossip.comm] func1 -> DEBU 3823 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3824 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.532 UTC [gossip.gossip] handleMessage -> DEBU 3825 Exiting" +"2019-07-20 02:40:42.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3827 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:42.532 UTC [msp] DeserializeIdentity -> DEBU 3828 Obtaining identity" +"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3829 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:42.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:42.532 UTC [policies] Evaluate -> DEBU 382e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:42.532 UTC [cauthdsl] func1 -> DEBU 382f 0xc003efbca0 gate 1563590442532929200 evaluation starts" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3830 0xc003efbca0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3831 0xc003efbca0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3832 0xc003efbca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3833 0xc003efbca0 principal evaluation fails" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3834 0xc003efbca0 gate 1563590442532929200 evaluation fails" +"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3835 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3836 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:42.533 UTC [policies] Evaluate -> DEBU 3837 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func1 -> DEBU 3838 0xc003e724e0 gate 1563590442533746600 evaluation starts" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 3839 0xc003e724e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383a 0xc003e724e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:42.533 UTC [cauthdsl] func2 -> DEBU 383b 0xc003e724e0 principal matched by identity 0" +"2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383c Verify: digest = 00000000 93 21 6e 6e 92 29 b5 ae 81 18 25 f6 6e 7c 1c 5d |.!nn.)....%.n|.]| +00000010 73 1d 71 0b 62 1d c3 f4 41 1e b3 69 99 7e 47 fa |s.q.b...A..i.~G.|" +"2019-07-20 02:40:42.534 UTC [msp.identity] Verify -> DEBU 383d Verify: sig = 00000000 30 44 02 20 6a 4e e2 fb d7 02 f9 ef 09 ec a2 f4 |0D. jN..........| +00000010 54 a3 d2 b1 5f cf b8 f8 c4 07 15 2c 36 b5 a2 f3 |T..._......,6...| +00000020 52 e7 11 24 02 20 6a 73 aa ea 6b 9b c2 56 de 5c |R..$. js..k..V.\| +00000030 64 6b a0 6d 38 4e d9 ea 0c 2c 50 ff a0 eb 3f 7c |dk.m8N...,P...?|| +00000040 0b 96 59 e7 42 30 |..Y.B0|" +"2019-07-20 02:40:42.534 UTC [cauthdsl] func2 -> DEBU 383e 0xc003e724e0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:42.534 UTC [cauthdsl] func1 -> DEBU 383f 0xc003e724e0 gate 1563590442533746600 evaluation succeeds" +"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3841 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3842 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:42.534 UTC [policies] Evaluate -> DEBU 3843 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 3844 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3845 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3846 updating membership: timestamp: " +"2019-07-20 02:40:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 3847 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 Exiting" +"2019-07-20 02:40:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 384a Exiting" +"2019-07-20 02:40:42.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384b Exiting" +"2019-07-20 02:40:42.539 UTC [gossip.comm] func1 -> DEBU 384c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.540 UTC [gossip.gossip] handleMessage -> DEBU 384e Exiting" +"2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3850 Exiting" +"2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3851 Obtaining identity" +"2019-07-20 02:40:42.544 UTC [msp] DeserializeIdentity -> DEBU 3852 Obtaining identity" +"2019-07-20 02:40:42.552 UTC [msp] DeserializeIdentity -> DEBU 3853 Obtaining identity" +"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3854 Obtaining identity" +"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3855 Obtaining identity" +"2019-07-20 02:40:42.553 UTC [msp] DeserializeIdentity -> DEBU 3856 Obtaining identity" +"2019-07-20 02:40:42.553 UTC [gossip.comm] Send -> DEBU 3857 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3858 Obtaining identity" +"2019-07-20 02:40:42.554 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" +"2019-07-20 02:40:42.561 UTC [gossip.comm] func1 -> DEBU 385a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.561 UTC [gossip.gossip] handleMessage -> DEBU 385b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.566 UTC [gossip.gossip] handleMessage -> DEBU 385c Exiting" +"2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 385e Exiting" +"2019-07-20 02:40:42.567 UTC [gossip.comm] Send -> DEBU 385f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3860 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3861 Exiting" +"2019-07-20 02:40:42.567 UTC [gossip.comm] sendToEndpoint -> DEBU 3862 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:42.570 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Exiting" +"2019-07-20 02:40:43.903 UTC [gossip.comm] func1 -> DEBU 3864 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3865 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.905 UTC [gossip.gossip] handleMessage -> DEBU 3866 Exiting" +"2019-07-20 02:40:43.906 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3867 Got message: GossipMessage: tag:EMPTY mem_req:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3868 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:43.909 UTC [msp] DeserializeIdentity -> DEBU 3869 Obtaining identity" +"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 386a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:43.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 386c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 386f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3870 0xc002fc40e0 gate 1563590443909523300 evaluation starts" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3871 0xc002fc40e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3872 0xc002fc40e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3873 0xc002fc40e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func2 -> DEBU 3874 0xc002fc40e0 principal evaluation fails" +"2019-07-20 02:40:43.909 UTC [cauthdsl] func1 -> DEBU 3875 0xc002fc40e0 gate 1563590443909523300 evaluation fails" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3876 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:43.909 UTC [policies] Evaluate -> DEBU 3878 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:43.918 UTC [cauthdsl] func1 -> DEBU 3879 0xc002fc4920 gate 1563590443909926800 evaluation starts" +"2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387a 0xc002fc4920 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:43.918 UTC [cauthdsl] func2 -> DEBU 387b 0xc002fc4920 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:43.919 UTC [cauthdsl] func2 -> DEBU 387c 0xc002fc4920 principal matched by identity 0" +"2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387d Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| +00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" +"2019-07-20 02:40:43.919 UTC [msp.identity] Verify -> DEBU 387e Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| +00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| +00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| +00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| +00000040 34 ca 7e d9 29 ed |4.~.).|" +"2019-07-20 02:40:43.923 UTC [cauthdsl] func2 -> DEBU 387f 0xc002fc4920 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:43.925 UTC [cauthdsl] func1 -> DEBU 3880 0xc002fc4920 gate 1563590443909926800 evaluation succeeds" +"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3881 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3883 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:43.925 UTC [policies] Evaluate -> DEBU 3884 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:43.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 3885 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3886 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3887 updating membership: timestamp: " +"2019-07-20 02:40:43.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 3888 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 3889 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:43.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 388a Exiting" +"2019-07-20 02:40:43.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 388b Exiting" +"2019-07-20 02:40:43.928 UTC [gossip.discovery] sendMemResponse -> DEBU 388c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:43.928 UTC [msp] DeserializeIdentity -> DEBU 388d Obtaining identity" +"2019-07-20 02:40:43.946 UTC [gossip.comm] func1 -> DEBU 388e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 388f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.946 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3891 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3892 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3893 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3894 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3895 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 3896 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [gossip.pull] SendDigest -> DEBU 3897 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:43.946 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" +"2019-07-20 02:40:43.929 UTC [msp] DeserializeIdentity -> DEBU 3899 Obtaining identity" +"2019-07-20 02:40:43.946 UTC [msp] DeserializeIdentity -> DEBU 389a Obtaining identity" +"2019-07-20 02:40:43.946 UTC [gossip.comm] Send -> DEBU 389b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:43.947 UTC [gossip.discovery] sendMemResponse -> DEBU 389c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020-" signature:"0D\002 ?*?s\244R\233Y\326\255\325S\344o4CH\006zq\014\232\302\275-z\032)\302_!\375\002 'O\272\270\225\266\377\370\354\270\254h\335\332\363\264\273v\364\016Y\252f\024oVJ\270\335\370\274b" > alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:43.947 UTC [gossip.comm] sendToEndpoint -> DEBU 389e Exiting" +"2019-07-20 02:40:43.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 389f Exiting" +"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.235 UTC [gossip.pull] Hello -> DEBU 38a4 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:44.235 UTC [gossip.comm] Send -> DEBU 38a5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38a9 Exiting" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38aa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.235 UTC [gossip.comm] sendToEndpoint -> DEBU 38ab Exiting" +"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38ac Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38ad Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38ae GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38af Exiting" +"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b0 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b1 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b2 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b3 Exiting" +"2019-07-20 02:40:44.237 UTC [gossip.comm] func1 -> DEBU 38b4 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.gossip] handleMessage -> DEBU 38b5 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.237 UTC [gossip.pull] HandleMessage -> DEBU 38b6 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.238 UTC [gossip.gossip] handleMessage -> DEBU 38b7 Exiting" +"2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38b8 Obtaining default signing identity" +"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38b9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102A " +"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38ba Sign: digest: 78526B430FABB76C2F0EFFB53CC4A7E03B04B1CF0637703092B63814E852806D " +"2019-07-20 02:40:44.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 38bb Obtaining default signing identity" +"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bc Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:44.277 UTC [msp.identity] Sign -> DEBU 38bd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38be Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.277 UTC [msp] DeserializeIdentity -> DEBU 38bf Obtaining identity" +"2019-07-20 02:40:44.277 UTC [gossip.comm] Send -> DEBU 38c0 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.278 UTC [msp] DeserializeIdentity -> DEBU 38c1 Obtaining identity" +"2019-07-20 02:40:44.278 UTC [gossip.comm] Send -> DEBU 38c2 Entering, sending GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c4 Exiting" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" secret_envelope:\032+\375\200'\340\023\034}\215\312\323\317b\274\332\205\002 L\325HG^l\224\006E'\373\226\210\022WM\243\225\252\332\306\372Qc\010P\307\343\377,a\201" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c6 Exiting" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\277]/\315\352\301\003\361[\342\277\332\244\250E\351@2\017X\330\002 &N\303\375~\265\022\226\315\031\370\n,2\240\020@\020d\253\013Y\353nuM\013\276S4\335q" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.278 UTC [gossip.comm] sendToEndpoint -> DEBU 38c8 Exiting" +"2019-07-20 02:40:44.281 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38ca Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.282 UTC [gossip.gossip] handleMessage -> DEBU 38cb Exiting" +"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.282 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38cd Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38ce Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38cf Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d0 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:44.282 UTC [msp.identity] Verify -> DEBU 38d1 Verify: sig = 00000000 30 45 02 21 00 e8 97 b9 e2 df a3 5b 1a 44 d3 d2 |0E.!.......[.D..| +00000010 14 6b 2c 3e 1a 2b fd 80 27 e0 13 1c 7d 8d ca d3 |.k,>.+..'...}...| +00000020 cf 62 bc da 85 02 20 4c d5 48 47 5e 6c 94 06 45 |.b.... L.HG^l..E| +00000030 27 fb 96 88 12 57 4d a3 95 aa da c6 fa 51 63 08 |'....WM......Qc.| +00000040 50 c7 e3 ff 2c 61 81 |P...,a.|" +"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:44.282 UTC [gossip.discovery] isSentByMe -> DEBU 38d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d4 Exiting" +"2019-07-20 02:40:44.282 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d5 Exiting" +"2019-07-20 02:40:44.283 UTC [gossip.comm] func1 -> DEBU 38d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.283 UTC [gossip.gossip] handleMessage -> DEBU 38d8 Exiting" +"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38da Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38db Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +"2019-07-20 02:40:44.283 UTC [msp.identity] Verify -> DEBU 38dc Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:44.283 UTC [gossip.discovery] isSentByMe -> DEBU 38de Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:44.283 UTC [gossip.discovery] handleAliveMessage -> DEBU 38df Exiting" +"2019-07-20 02:40:44.283 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:44.283 UTC [msp] DeserializeIdentity -> DEBU 38e1 Obtaining identity" +"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.283 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38e4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.283 UTC [policies] Evaluate -> DEBU 38e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38e8 0xc0032ae3f0 gate 1563590444284004900 evaluation starts" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38e9 0xc0032ae3f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ea 0xc0032ae3f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38eb 0xc0032ae3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38ec 0xc0032ae3f0 principal evaluation fails" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38ed 0xc0032ae3f0 gate 1563590444284004900 evaluation fails" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f1 0xc0032aec30 gate 1563590444284337300 evaluation starts" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f2 0xc0032aec30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f3 0xc0032aec30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f4 0xc0032aec30 principal matched by identity 0" +"2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 db 1e 58 a0 2e 84 8b 40 86 92 99 d2 3c d1 0b 66 |..X....@....<..f| +00000010 47 2a 64 fb fa 81 51 a5 82 be 82 74 ca 2d dd a4 |G*d...Q....t.-..|" +"2019-07-20 02:40:44.284 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 44 02 20 3f 84 cf d6 31 37 7e 96 5c 08 97 05 |0D. ?...17~.\...| +00000010 d6 9a 91 15 bd a6 85 4d cf 35 4f 48 c4 19 e2 35 |.......M.5OH...5| +00000020 8c 42 2b 54 02 20 69 a7 da bb c9 3e 28 8e ec 79 |.B+T. i....>(..y| +00000030 29 6f ba 9d 15 bc 0f a6 a4 c0 1a 2b 67 77 0e 77 |)o.........+gw.w| +00000040 34 ca 7e d9 29 ed |4.~.).|" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func2 -> DEBU 38f7 0xc0032aec30 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.284 UTC [cauthdsl] func1 -> DEBU 38f8 0xc0032aec30 gate 1563590444284337300 evaluation succeeds" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38f9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fb Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.284 UTC [policies] Evaluate -> DEBU 38fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleAliveMessage -> DEBU 38fe Exiting" +"2019-07-20 02:40:44.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ff Exiting" +"2019-07-20 02:40:44.285 UTC [gossip.comm] func1 -> DEBU 3900 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3901 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.285 UTC [gossip.gossip] handleMessage -> DEBU 3902 Exiting" +"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3903 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3904 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3905 Verify: digest = 00000000 78 52 6b 43 0f ab b7 6c 2f 0e ff b5 3c c4 a7 e0 |xRkC...l/...<...| +00000010 3b 04 b1 cf 06 37 70 30 92 b6 38 14 e8 52 80 6d |;....7p0..8..R.m|" +"2019-07-20 02:40:44.285 UTC [msp.identity] Verify -> DEBU 3906 Verify: sig = 00000000 30 45 02 21 00 dc 42 7c e2 19 cc be 72 ce cd 3e |0E.!..B|....r..>| +00000010 bf 5d 2f cd ea c1 03 f1 5b e2 bf da a4 a8 45 e9 |.]/.....[.....E.| +00000020 40 32 0f 58 d8 02 20 26 4e c3 fd 7e b5 12 96 cd |@2.X.. &N..~....| +00000030 19 f8 0a 2c 32 a0 10 40 10 64 ab 0b 59 eb 6e 75 |...,2..@.d..Y.nu| +00000040 4d 0b be 53 34 dd 71 |M..S4.q|" +"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3907 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:44.285 UTC [gossip.discovery] isSentByMe -> DEBU 3908 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 3909 Exiting" +"2019-07-20 02:40:44.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 390a Exiting" +"2019-07-20 02:40:44.336 UTC [gossip.comm] func1 -> DEBU 390b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390c Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.336 UTC [gossip.pull] HandleMessage -> DEBU 390d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.336 UTC [gossip.pull] SendDigest -> DEBU 390e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:44.336 UTC [gossip.gossip] handleMessage -> DEBU 390f Exiting" +"2019-07-20 02:40:44.360 UTC [gossip.comm] func1 -> DEBU 3910 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3911 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.360 UTC [gossip.gossip] handleMessage -> DEBU 3912 Exiting" +"2019-07-20 02:40:44.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3913 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3914 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3915 Verify: digest = 00000000 05 fc fa 54 47 c8 42 70 a1 2b 49 aa 1c dd b7 c0 |...TG.Bp.+I.....| +00000010 1a af a2 74 05 76 a0 14 ba 99 56 3a 2a 67 0f 2e |...t.v....V:*g..|" +"2019-07-20 02:40:44.361 UTC [msp.identity] Verify -> DEBU 3916 Verify: sig = 00000000 30 44 02 20 16 00 3f 59 47 5f 23 40 41 9e 56 ac |0D. ..?YG_#@A.V.| +00000010 c9 2c ed db 73 62 b0 08 7b b0 bd 5c cd 34 9f 00 |.,..sb..{..\.4..| +00000020 83 da e2 5c 02 20 7c 3f de 43 69 c1 a9 7b 57 ee |...\. |?.Ci..{W.| +00000030 a9 5f 73 72 2e bf 10 e7 b2 88 d2 09 eb ea 82 04 |._sr............| +00000040 80 3e 04 d5 ec 6b |.>...k|" +"2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:44.362 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 44 02 20 4a 5a 26 af 1f 21 e7 0f c9 b0 4a 42 |0D. JZ&..!....JB| +00000010 7a 0b bd d6 37 7a 7e b6 56 a2 1a 1b 6f 45 e9 c4 |z...7z~.V...oE..| +00000020 25 69 04 88 02 20 5d 50 f8 7b dc fd 7a 5f e6 3e |%i... ]P.{..z_.>| +00000030 ed df de 7e b9 de 0b be 88 fe cc 91 6e 44 c3 4f |...~........nD.O| +00000040 4d 88 17 b9 07 4b |M....K|" +"2019-07-20 02:40:44.363 UTC [gossip.discovery] handleAliveMessage -> DEBU 3919 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:44.364 UTC [gossip.discovery] learnExistingMembers -> DEBU 391b updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391c Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391d Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:44.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 391e Exiting" +"2019-07-20 02:40:44.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Exiting" +"2019-07-20 02:40:44.367 UTC [gossip.discovery] sendMemResponse -> DEBU 3920 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:44.367 UTC [msp] DeserializeIdentity -> DEBU 3921 Obtaining identity" +"2019-07-20 02:40:44.368 UTC [msp] DeserializeIdentity -> DEBU 3922 Obtaining identity" +"2019-07-20 02:40:44.368 UTC [gossip.comm] Send -> DEBU 3923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.368 UTC [gossip.discovery] sendMemResponse -> DEBU 3924 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" secret_envelope:\355\337\336~\271\336\013\276\210\376\314\221nD\303OM\210\027\271\007K" > > alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3925 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.368 UTC [gossip.comm] sendToEndpoint -> DEBU 3926 Exiting" +"2019-07-20 02:40:44.370 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Exiting" +"2019-07-20 02:40:44.594 UTC [gossip.comm] func1 -> DEBU 3928 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.594 UTC [gossip.gossip] handleMessage -> DEBU 3929 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.595 UTC [gossip.pull] HandleMessage -> DEBU 392a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.595 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" +"2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" +"2019-07-20 02:40:44.597 UTC [msp] DeserializeIdentity -> DEBU 392d Obtaining identity" +"2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392e Obtaining identity" +"2019-07-20 02:40:44.600 UTC [msp] DeserializeIdentity -> DEBU 392f Obtaining identity" +"2019-07-20 02:40:44.601 UTC [msp] DeserializeIdentity -> DEBU 3930 Obtaining identity" +"2019-07-20 02:40:44.601 UTC [gossip.pull] SendDigest -> DEBU 3931 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:44.601 UTC [gossip.gossip] handleMessage -> DEBU 3932 Exiting" +"2019-07-20 02:40:44.625 UTC [gossip.comm] func1 -> DEBU 3933 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 3934 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3935 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.635 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3936 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:44.635 UTC [msp] DeserializeIdentity -> DEBU 3937 Obtaining identity" +"2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3939 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 393a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.637 UTC [policies] Evaluate -> DEBU 393d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.638 UTC [cauthdsl] func1 -> DEBU 393e 0xc003c94b80 gate 1563590444637999900 evaluation starts" +"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 393f 0xc003c94b80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3940 0xc003c94b80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3941 0xc003c94b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.638 UTC [cauthdsl] func2 -> DEBU 3942 0xc003c94b80 principal evaluation fails" +"2019-07-20 02:40:44.639 UTC [cauthdsl] func1 -> DEBU 3943 0xc003c94b80 gate 1563590444637999900 evaluation fails" +"2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.639 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.640 UTC [policies] Evaluate -> DEBU 3946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.640 UTC [cauthdsl] func1 -> DEBU 3947 0xc003c953c0 gate 1563590444640125400 evaluation starts" +"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3948 0xc003c953c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 3949 0xc003c953c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.640 UTC [cauthdsl] func2 -> DEBU 394a 0xc003c953c0 principal matched by identity 0" +"2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394b Verify: digest = 00000000 3b 74 8c 70 3a 0e 1a b2 79 e8 52 db fa 61 da 07 |;t.p:...y.R..a..| +00000010 d8 78 6d 5f 67 5f d6 5e 95 7c 35 77 12 57 28 f2 |.xm_g_.^.|5w.W(.|" +"2019-07-20 02:40:44.641 UTC [msp.identity] Verify -> DEBU 394c Verify: sig = 00000000 30 45 02 21 00 f8 a2 a3 57 f1 f9 29 1d 8b b4 9a |0E.!....W..)....| +00000010 88 f8 52 f4 5f e9 b9 2e f4 00 2f 5a 4d e9 e9 3d |..R._...../ZM..=| +00000020 aa 15 ec f7 9f 02 20 43 22 09 5b 58 7e d9 95 a9 |...... C".[X~...| +00000030 6a 44 46 1c b3 33 57 bf 36 30 1e 29 0a 65 ab f8 |jDF..3W.60.).e..| +00000040 e0 c6 6b fc 4e 97 cc |..k.N..|" +"2019-07-20 02:40:44.642 UTC [cauthdsl] func2 -> DEBU 394e 0xc003c953c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.643 UTC [cauthdsl] func1 -> DEBU 394f 0xc003c953c0 gate 1563590444640125400 evaluation succeeds" +"2019-07-20 02:40:44.635 UTC [gossip.gossip] handleMessage -> DEBU 394d Exiting" +"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3950 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3952 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.643 UTC [policies] Evaluate -> DEBU 3953 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 3954 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:44.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 3955 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3956 updating membership: timestamp: " +"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:44.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Exiting" +"2019-07-20 02:40:44.652 UTC [gossip.discovery] handleAliveMessage -> DEBU 395a Exiting" +"2019-07-20 02:40:44.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 395b Exiting" +"2019-07-20 02:40:44.652 UTC [gossip.discovery] sendMemResponse -> DEBU 395c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:44.653 UTC [msp] DeserializeIdentity -> DEBU 395d Obtaining identity" +"2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" +"2019-07-20 02:40:44.654 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" +"2019-07-20 02:40:44.654 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.655 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with alive: alive:(\216\354y)o\272\235\025\274\017\246\244\300\032+gw\016w4\312~\331)\355" > alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020." signature:"0D\002 \026\000?YG_#@A\236V\254\311,\355\333sb\260\010{\260\275\\\3154\237\000\203\332\342\\\002 |?\336Ci\301\251{W\356\251_sr.\277\020\347\262\210\322\t\353\352\202\004\200>\004\325\354k" > alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.655 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" +"2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3964 Obtaining identity" +"2019-07-20 02:40:44.682 UTC [msp] DeserializeIdentity -> DEBU 3965 Obtaining identity" +"2019-07-20 02:40:44.683 UTC [gossip.comm] Send -> DEBU 3966 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3967 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3968 Exiting" +"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 3969 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.683 UTC [gossip.comm] sendToEndpoint -> DEBU 396a Exiting" +"2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.684 UTC [gossip.comm] sendToEndpoint -> DEBU 396c Exiting" +"2019-07-20 02:40:44.685 UTC [gossip.comm] func1 -> DEBU 396d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.685 UTC [gossip.gossip] handleMessage -> DEBU 396e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 396f Obtaining identity" +"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3970 Obtaining identity" +"2019-07-20 02:40:44.685 UTC [msp] DeserializeIdentity -> DEBU 3971 Obtaining identity" +"2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3972 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3973 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3974 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3975 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3976 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.687 UTC [policies] Evaluate -> DEBU 3977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.688 UTC [cauthdsl] func1 -> DEBU 3978 0xc0032b4e30 gate 1563590444688095000 evaluation starts" +"2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 3979 0xc0032b4e30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.688 UTC [cauthdsl] func2 -> DEBU 397a 0xc0032b4e30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.693 UTC [cauthdsl] func2 -> DEBU 397d 0xc0032b4e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 397e 0xc0032b4e30 principal evaluation fails" +"2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 397f 0xc0032b4e30 gate 1563590444688095000 evaluation fails" +"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3980 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.694 UTC [policies] Evaluate -> DEBU 3982 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.694 UTC [cauthdsl] func1 -> DEBU 3983 0xc0032b5670 gate 1563590444694800600 evaluation starts" +"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3984 0xc0032b5670 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.694 UTC [cauthdsl] func2 -> DEBU 3985 0xc0032b5670 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3986 0xc0032b5670 principal matched by identity 0" +"2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3987 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:44.695 UTC [msp.identity] Verify -> DEBU 3988 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:44.695 UTC [cauthdsl] func2 -> DEBU 3989 0xc0032b5670 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.695 UTC [cauthdsl] func1 -> DEBU 398a 0xc0032b5670 gate 1563590444694800600 evaluation succeeds" +"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.695 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 398f Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3990 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3991 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:44.696 UTC [msp.identity] Verify -> DEBU 3992 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:44.696 UTC [msp] DeserializeIdentity -> DEBU 3993 Obtaining identity" +"2019-07-20 02:40:44.697 UTC [msp] DeserializeIdentity -> DEBU 3994 Obtaining identity" +"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3995 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3996 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3997 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3998 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 3999 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.697 UTC [policies] Evaluate -> DEBU 399a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.697 UTC [cauthdsl] func1 -> DEBU 399b 0xc003331c80 gate 1563590444697832100 evaluation starts" +"2019-07-20 02:40:44.697 UTC [cauthdsl] func2 -> DEBU 399c 0xc003331c80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399d 0xc003331c80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399e 0xc003331c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 399f 0xc003331c80 principal evaluation fails" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a0 0xc003331c80 gate 1563590444697832100 evaluation fails" +"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.698 UTC [policies] Evaluate -> DEBU 39a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func1 -> DEBU 39a4 0xc0033ce4c0 gate 1563590444698460000 evaluation starts" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a5 0xc0033ce4c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a6 0xc0033ce4c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.698 UTC [cauthdsl] func2 -> DEBU 39a7 0xc0033ce4c0 principal matched by identity 0" +"2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:44.698 UTC [msp.identity] Verify -> DEBU 39a9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:44.699 UTC [cauthdsl] func2 -> DEBU 39aa 0xc0033ce4c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.699 UTC [cauthdsl] func1 -> DEBU 39ab 0xc0033ce4c0 gate 1563590444698460000 evaluation succeeds" +"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39ae Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.699 UTC [policies] Evaluate -> DEBU 39af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b0 Exiting" +"2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.699 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b2 Obtaining identity" +"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b3 Obtaining identity" +"2019-07-20 02:40:44.699 UTC [msp] DeserializeIdentity -> DEBU 39b4 Obtaining identity" +"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.700 UTC [policies] Evaluate -> DEBU 39b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.701 UTC [policies] Evaluate -> DEBU 39ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.701 UTC [cauthdsl] func1 -> DEBU 39bb 0xc0033cffe0 gate 1563590444701730900 evaluation starts" +"2019-07-20 02:40:44.690 UTC [gossip.comm] func1 -> DEBU 397c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.704 UTC [cauthdsl] func2 -> DEBU 39bc 0xc0033cffe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bd 0xc0033cffe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39be 0xc0033cffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39bf 0xc0033cffe0 principal evaluation fails" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c0 0xc0033cffe0 gate 1563590444701730900 evaluation fails" +"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.705 UTC [policies] Evaluate -> DEBU 39c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func1 -> DEBU 39c4 0xc003f056c0 gate 1563590444705686500 evaluation starts" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c5 0xc003f056c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c6 0xc003f056c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.705 UTC [cauthdsl] func2 -> DEBU 39c7 0xc003f056c0 principal matched by identity 0" +"2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c8 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:44.705 UTC [msp.identity] Verify -> DEBU 39c9 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:44.706 UTC [cauthdsl] func2 -> DEBU 39ca 0xc003f056c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.706 UTC [cauthdsl] func1 -> DEBU 39cb 0xc003f056c0 gate 1563590444705686500 evaluation succeeds" +"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39ce Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.706 UTC [policies] Evaluate -> DEBU 39cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d0 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d1 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d2 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:44.706 UTC [msp.identity] Verify -> DEBU 39d3 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" +"2019-07-20 02:40:44.706 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" +"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39d6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39d8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.707 UTC [policies] Evaluate -> DEBU 39db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.707 UTC [cauthdsl] func1 -> DEBU 39dc 0xc003423cd0 gate 1563590444707234900 evaluation starts" +"2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39dd 0xc003423cd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.708 UTC [cauthdsl] func2 -> DEBU 39de 0xc003423cd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39df 0xc003423cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.709 UTC [cauthdsl] func2 -> DEBU 39e0 0xc003423cd0 principal evaluation fails" +"2019-07-20 02:40:44.709 UTC [cauthdsl] func1 -> DEBU 39e1 0xc003423cd0 gate 1563590444707234900 evaluation fails" +"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.709 UTC [policies] Evaluate -> DEBU 39e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.710 UTC [cauthdsl] func1 -> DEBU 39e5 0xc003502510 gate 1563590444710199200 evaluation starts" +"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e6 0xc003502510 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e7 0xc003502510 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.710 UTC [cauthdsl] func2 -> DEBU 39e8 0xc003502510 principal matched by identity 0" +"2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39e9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:44.711 UTC [msp.identity] Verify -> DEBU 39ea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:44.712 UTC [cauthdsl] func2 -> DEBU 39eb 0xc003502510 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.712 UTC [cauthdsl] func1 -> DEBU 39ec 0xc003502510 gate 1563590444710199200 evaluation succeeds" +"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39ef Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.712 UTC [policies] Evaluate -> DEBU 39f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.712 UTC [gossip.gossip] handleMessage -> DEBU 39f1 Exiting" +"2019-07-20 02:40:44.713 UTC [gossip.gossip] handleMessage -> DEBU 39f2 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.713 UTC [msp.identity] Verify -> DEBU 39f3 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f4 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f5 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:44.714 UTC [msp.identity] Verify -> DEBU 39f6 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" +"2019-07-20 02:40:44.715 UTC [msp] DeserializeIdentity -> DEBU 39f8 Obtaining identity" +"2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fb Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.717 UTC [policies] Evaluate -> DEBU 39fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.718 UTC [policies] Evaluate -> DEBU 39fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.718 UTC [cauthdsl] func1 -> DEBU 39ff 0xc00350ed60 gate 1563590444718592300 evaluation starts" +"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a00 0xc00350ed60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a01 0xc00350ed60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a02 0xc00350ed60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.719 UTC [cauthdsl] func2 -> DEBU 3a03 0xc00350ed60 principal evaluation fails" +"2019-07-20 02:40:44.719 UTC [cauthdsl] func1 -> DEBU 3a04 0xc00350ed60 gate 1563590444718592300 evaluation fails" +"2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a05 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.720 UTC [policies] Evaluate -> DEBU 3a06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.721 UTC [policies] Evaluate -> DEBU 3a07 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.721 UTC [cauthdsl] func1 -> DEBU 3a08 0xc00350f5a0 gate 1563590444721413600 evaluation starts" +"2019-07-20 02:40:44.721 UTC [cauthdsl] func2 -> DEBU 3a09 0xc00350f5a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0a 0xc00350f5a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.722 UTC [cauthdsl] func2 -> DEBU 3a0b 0xc00350f5a0 principal matched by identity 0" +"2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0c Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:44.722 UTC [msp.identity] Verify -> DEBU 3a0d Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:44.723 UTC [cauthdsl] func2 -> DEBU 3a0e 0xc00350f5a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.723 UTC [cauthdsl] func1 -> DEBU 3a0f 0xc00350f5a0 gate 1563590444721413600 evaluation succeeds" +"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a10 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a12 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.724 UTC [policies] Evaluate -> DEBU 3a13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +"2019-07-20 02:40:44.725 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" +"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a17 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a18 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:44.727 UTC [policies] Evaluate -> DEBU 3a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:44.728 UTC [cauthdsl] func1 -> DEBU 3a1c 0xc003606d70 gate 1563590444728548600 evaluation starts" +"2019-07-20 02:40:44.728 UTC [cauthdsl] func2 -> DEBU 3a1d 0xc003606d70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1e 0xc003606d70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.729 UTC [cauthdsl] func2 -> DEBU 3a1f 0xc003606d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:44.730 UTC [cauthdsl] func2 -> DEBU 3a20 0xc003606d70 principal evaluation fails" +"2019-07-20 02:40:44.730 UTC [cauthdsl] func1 -> DEBU 3a21 0xc003606d70 gate 1563590444728548600 evaluation fails" +"2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.731 UTC [policies] Evaluate -> DEBU 3a23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:44.732 UTC [policies] Evaluate -> DEBU 3a24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:44.732 UTC [cauthdsl] func1 -> DEBU 3a25 0xc0036075b0 gate 1563590444732725700 evaluation starts" +"2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a26 0xc0036075b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:44.733 UTC [cauthdsl] func2 -> DEBU 3a27 0xc0036075b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:44.734 UTC [cauthdsl] func2 -> DEBU 3a28 0xc0036075b0 principal matched by identity 0" +"2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a29 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:44.734 UTC [msp.identity] Verify -> DEBU 3a2a Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:44.736 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc0036075b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:44.736 UTC [cauthdsl] func1 -> DEBU 3a2c 0xc0036075b0 gate 1563590444732725700 evaluation succeeds" +"2019-07-20 02:40:44.736 UTC [policies] Evaluate -> DEBU 3a2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a2f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:44.737 UTC [policies] Evaluate -> DEBU 3a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:44.738 UTC [gossip.gossip] handleMessage -> DEBU 3a31 Exiting" +"2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a32 Obtaining identity" +"2019-07-20 02:40:44.751 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" +"2019-07-20 02:40:44.753 UTC [gossip.pull] Hello -> DEBU 3a34 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a35 Obtaining identity" +"2019-07-20 02:40:44.753 UTC [msp] DeserializeIdentity -> DEBU 3a36 Obtaining identity" +"2019-07-20 02:40:44.754 UTC [gossip.comm] Send -> DEBU 3a37 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a38 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.754 UTC [gossip.comm] sendToEndpoint -> DEBU 3a39 Exiting" +"2019-07-20 02:40:44.755 UTC [gossip.comm] func1 -> DEBU 3a3a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.755 UTC [gossip.gossip] handleMessage -> DEBU 3a3b Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.756 UTC [gossip.pull] HandleMessage -> DEBU 3a3c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.756 UTC [gossip.gossip] handleMessage -> DEBU 3a3d Exiting" +"2019-07-20 02:40:44.855 UTC [gossip.comm] func1 -> DEBU 3a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.855 UTC [gossip.gossip] handleMessage -> DEBU 3a3f Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a40 Obtaining identity" +"2019-07-20 02:40:44.856 UTC [msp] DeserializeIdentity -> DEBU 3a41 Obtaining identity" +"2019-07-20 02:40:44.857 UTC [gossip.gossip] handleMessage -> DEBU 3a42 Exiting" +"2019-07-20 02:40:44.898 UTC [gossip.comm] func1 -> DEBU 3a43 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.899 UTC [gossip.gossip] handleMessage -> DEBU 3a44 Entering, 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.899 UTC [gossip.pull] HandleMessage -> DEBU 3a45 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:44.899 UTC [gossip.pull] SendDigest -> DEBU 3a46 Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:44.900 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Exiting" +"2019-07-20 02:40:45.008 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.008 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4a Obtaining identity" +"2019-07-20 02:40:45.008 UTC [msp] DeserializeIdentity -> DEBU 3a4b Obtaining identity" +"2019-07-20 02:40:45.009 UTC [msp] DeserializeIdentity -> DEBU 3a4c Obtaining identity" +"2019-07-20 02:40:45.009 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Exiting" +"2019-07-20 02:40:45.147 UTC [gossip.comm] func1 -> DEBU 3a4e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.147 UTC [gossip.gossip] handleMessage -> DEBU 3a4f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a50 Obtaining identity" +"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" +"2019-07-20 02:40:45.148 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" +"2019-07-20 02:40:45.149 UTC [gossip.gossip] handleMessage -> DEBU 3a53 Exiting" +"2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.189 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3a55 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.189 UTC [policies] Evaluate -> DEBU 3a56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.190 UTC [policies] Evaluate -> DEBU 3a58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-07-20 02:40:45.191 UTC [cauthdsl] func1 -> DEBU 3a59 0xc00377e010 gate 1563590445191649300 evaluation starts" +"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5a 0xc00377e010 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5b 0xc00377e010 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.192 UTC [cauthdsl] func2 -> DEBU 3a5c 0xc00377e010 principal matched by identity 0" +"2019-07-20 02:40:45.192 UTC [msp.identity] Verify -> DEBU 3a5d Verify: digest = 00000000 96 9a dc 26 d2 06 fc 8f 84 64 fa 05 e1 8e 6a 27 |...&.....d....j'| +00000010 d1 ff d3 b3 c0 f2 30 ca d0 c0 63 5e df dd 39 d2 |......0...c^..9.|" +"2019-07-20 02:40:45.193 UTC [msp.identity] Verify -> DEBU 3a5e Verify: sig = 00000000 30 45 02 21 00 f1 a2 5b a0 26 b4 0f c5 13 18 a1 |0E.!...[.&......| +00000010 46 65 a7 e0 4a e7 af b6 23 0e a5 b2 a8 2e 3a ae |Fe..J...#.....:.| +00000020 3d c2 90 8d 39 02 20 18 47 1d c1 ff 4a 42 4d d2 |=...9. .G...JBM.| +00000030 60 3e 51 8e 91 f6 0f e4 29 18 5e 13 10 48 63 06 |`>Q.....).^..Hc.| +00000040 b4 dd 5a be 3a a9 aa |..Z.:..|" +"2019-07-20 02:40:45.193 UTC [cauthdsl] func2 -> DEBU 3a5f 0xc00377e010 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.193 UTC [cauthdsl] func1 -> DEBU 3a60 0xc00377e010 gate 1563590445191649300 evaluation succeeds" +"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a63 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.194 UTC [policies] Evaluate -> DEBU 3a64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a65 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a66 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-07-20 02:40:45.195 UTC [gossip.state] addPayload -> DEBU 3a67 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-07-20 02:40:45.195 UTC [blocksProvider] DeliverBlocks -> DEBU 3a68 [businesschannel] Gossiping block [6], peers number [3]" +"2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a69 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +"2019-07-20 02:40:45.195 UTC [gossip.state] deliverPayloads -> DEBU 3a6a [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +"2019-07-20 02:40:45.195 UTC [gossip.privdata] StoreBlock -> INFO 3a6b [businesschannel] Received block [6] from buffer" +"2019-07-20 02:40:45.196 UTC [gossip.privdata] StoreBlock -> DEBU 3a6c [businesschannel] Validating block [6]" +"2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6d [businesschannel] START Block Validation for block [6]" +"2019-07-20 02:40:45.196 UTC [committer.txvalidator] Validate -> DEBU 3a6e expecting 1 block validation responses" +"2019-07-20 02:40:45.196 UTC [committer.txvalidator] validateTx -> DEBU 3a6f [businesschannel] validateTx starts for block 0xc000695640 env 0xc003781400 txn 0" +"2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a70 ValidateTransactionEnvelope starts for envelope 0xc003781400" +"2019-07-20 02:40:45.196 UTC [gossip.channel] AddToMsgStore -> DEBU 3a71 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to the block puller" +"2019-07-20 02:40:45.197 UTC [gossip.pull] Add -> DEBU 3a73 Added 6, total items: 6" +"2019-07-20 02:40:45.196 UTC [protoutils] ValidateTransaction -> DEBU 3a72 Header is channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " +"2019-07-20 02:40:45.197 UTC [protoutils] validateChannelHeader -> DEBU 3a74 validateChannelHeader info: header type 1" +"2019-07-20 02:40:45.197 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a75 begin" +"2019-07-20 02:40:45.198 UTC [msp] GetManagerForChain -> DEBU 3a76 Returning existing manager for channel 'businesschannel'" +"2019-07-20 02:40:45.198 UTC [msp] DeserializeIdentity -> DEBU 3a77 Obtaining identity" +"2019-07-20 02:40:45.199 UTC [msp.identity] newIdentity -> DEBU 3a78 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.200 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a79 creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-07-20 02:40:45.200 UTC [msp] Validate -> DEBU 3a7a MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.203 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" +"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" +"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" +"2019-07-20 02:40:45.204 UTC [msp] DeserializeIdentity -> DEBU 3a7e Obtaining identity" +"2019-07-20 02:40:45.204 UTC [gossip.comm] Send -> DEBU 3a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a80 Obtaining identity" +"2019-07-20 02:40:45.205 UTC [msp] DeserializeIdentity -> DEBU 3a81 Obtaining identity" +"2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 34896 bytes, seq: 6}, Envelope: 34929 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.205 UTC [gossip.comm] sendToEndpoint -> DEBU 3a83 Exiting" +"2019-07-20 02:40:45.205 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a84 creator is valid" +"2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a85 Verify: digest = 00000000 e6 57 06 ac d2 87 6b c2 b6 92 7b 61 ad d8 9d 93 |.W....k...{a....| +00000010 f7 5a 2a be 3d 40 7c 29 04 a0 13 78 5c 74 d7 b8 |.Z*.=@|)...x\t..|" +"2019-07-20 02:40:45.207 UTC [msp.identity] Verify -> DEBU 3a86 Verify: sig = 00000000 30 43 02 1f 74 f5 ee 6a 28 f5 da 8c 41 f5 e2 69 |0C..t..j(...A..i| +00000010 e8 f9 d2 93 4f c7 61 e5 e2 e1 7b 30 6e bf 8b cc |....O.a...{0n...| +00000020 f7 f1 cf 02 20 12 d4 eb ba 3b 2f 97 3c df 61 c2 |.... ....;/.<.a.| +00000030 2d b9 86 81 75 ee 2e b8 a3 6e cb 9c ae 7b 09 34 |-...u....n...{.4| +00000040 63 b0 56 6b 0a |c.Vk.|" +"2019-07-20 02:40:45.208 UTC [protoutils] checkSignatureFromCreator -> DEBU 3a87 exits successfully" +"2019-07-20 02:40:45.209 UTC [protoutils] validateConfigTransaction -> DEBU 3a88 validateConfigTransaction starts for data 0xc00305a000, header channel_header:"\010\001\032\006\010\255\376\311\351\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030K6t\252\2519\357\227\251\316\177e\325\037\216\234\223<\362\336\241\376\376\217" " +"2019-07-20 02:40:45.210 UTC [committer.txvalidator] validateTx -> DEBU 3a89 Transaction is for channel businesschannel" +"2019-07-20 02:40:45.214 UTC [common.configtx] addToMap -> DEBU 3a8a Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8b Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a8f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a90 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.217 UTC [common.configtx] addToMap -> DEBU 3a91 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a92 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a93 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a94 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.218 UTC [common.configtx] addToMap -> DEBU 3a95 Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a96 Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a97 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a98 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a99 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.219 UTC [common.configtx] addToMap -> DEBU 3a9a Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.220 UTC [common.configtx] addToMap -> DEBU 3a9b Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9c Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9d Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.221 UTC [common.configtx] addToMap -> DEBU 3a9e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3a9f Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.222 UTC [common.configtx] addToMap -> DEBU 3aa0 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.224 UTC [common.configtx] addToMap -> DEBU 3aa1 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.225 UTC [common.configtx] addToMap -> DEBU 3aa2 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa3 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.226 UTC [common.configtx] addToMap -> DEBU 3aa4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.227 UTC [common.configtx] addToMap -> DEBU 3aa5 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.227 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa6 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.228 UTC [common.configtx] verifyDeltaSet -> DEBU 3aa8 Processing change to key: [Group] /Channel/Application" +"2019-07-20 02:40:45.229 UTC [common.configtx] policyForItem -> DEBU 3aa9 Getting policy for item Application with mod_policy Admins" +"2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aaa Manager Channel looking up path []" +"2019-07-20 02:40:45.230 UTC [policies] Manager -> DEBU 3aab Manager Channel has managers Application" +"2019-07-20 02:40:45.232 UTC [policies] Manager -> DEBU 3aac Manager Channel has managers Orderer" +"2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aad Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.233 UTC [policies] Manager -> DEBU 3aae Manager Channel has managers Application" +"2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3aaf Manager Channel has managers Orderer" +"2019-07-20 02:40:45.237 UTC [policies] Manager -> DEBU 3ab0 Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab1 Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.238 UTC [policies] Manager -> DEBU 3ab2 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-07-20 02:40:45.239 UTC [policies] Evaluate -> DEBU 3ab4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.240 UTC [policies] Evaluate -> DEBU 3ab5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-07-20 02:40:45.241 UTC [cauthdsl] deduplicate -> WARN 3ab6 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.241 UTC [cauthdsl] func1 -> DEBU 3ab7 0xc0039f8cc0 gate 1563590445241470500 evaluation starts" +"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab8 0xc0039f8cc0 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3ab9 0xc0039f8cc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.242 UTC [cauthdsl] func2 -> DEBU 3aba 0xc0039f8cc0 principal matched by identity 0" +"2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abb Verify: digest = 00000000 24 3e c8 4e 00 8f 3c f6 a0 9f 08 d7 fb 3c 97 93 |$>.N..<......<..| +00000010 42 32 01 96 c1 eb 01 57 a2 ab 18 f7 88 2d 04 6d |B2.....W.....-.m|" +"2019-07-20 02:40:45.243 UTC [msp.identity] Verify -> DEBU 3abc Verify: sig = 00000000 30 44 02 20 4f b3 dc 20 80 d2 3c 98 67 99 b2 43 |0D. O.. ..<.g..C| +00000010 9e e9 c3 28 c5 80 6a 48 a9 c9 b3 c1 82 e0 3e 6a |...(..jH......>j| +00000020 51 76 2b d4 02 20 71 df 00 4f 8c e5 46 28 40 dd |Qv+.. q..O..F(@.| +00000030 16 6e 15 fd 96 03 9f 79 62 47 80 90 78 83 85 fd |.n.....ybG..x...| +00000040 ed 0f 29 74 0b 84 |..)t..|" +"2019-07-20 02:40:45.244 UTC [cauthdsl] func2 -> DEBU 3abd 0xc0039f8cc0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.244 UTC [cauthdsl] func1 -> DEBU 3abe 0xc0039f8cc0 gate 1563590445241470500 evaluation succeeds" +"2019-07-20 02:40:45.244 UTC [policies] Evaluate -> DEBU 3abf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.245 UTC [policies] Evaluate -> DEBU 3ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.247 UTC [policies] Evaluate -> DEBU 3ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-07-20 02:40:45.248 UTC [cauthdsl] deduplicate -> WARN 3ac2 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-07-20 02:40:45.248 UTC [cauthdsl] func1 -> DEBU 3ac3 0xc0039f92f0 gate 1563590445248608200 evaluation starts" +"2019-07-20 02:40:45.248 UTC [cauthdsl] func2 -> DEBU 3ac4 0xc0039f92f0 signed by 0 principal evaluation starts (used [false false false])" +"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac5 0xc0039f92f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0039f92f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-07-20 02:40:45.249 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0039f92f0 processing identity 1 with bytes of 114b950" +"2019-07-20 02:40:45.250 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3ac8 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-07-20 02:40:45.251 UTC [cauthdsl] func2 -> DEBU 3ac9 0xc0039f92f0 principal matched by identity 1" +"2019-07-20 02:40:45.251 UTC [msp.identity] Verify -> DEBU 3aca Verify: digest = 00000000 21 2c 51 e4 a3 3e 00 ed db 69 46 8a 55 8d e1 42 |!,Q..>...iF.U..B| +00000010 ad 04 eb 48 7f 4a 7c bd 1d fa e1 64 50 7b d2 22 |...H.J|....dP{."|" +"2019-07-20 02:40:45.252 UTC [msp.identity] Verify -> DEBU 3acb Verify: sig = 00000000 30 44 02 20 75 3f 34 5b 69 76 6d a0 b7 a7 e8 85 |0D. u?4[ivm.....| +00000010 ac 28 ba dd a5 ca 77 6c bf 08 e7 93 fe aa 77 cd |.(....wl......w.| +00000020 ea b6 56 83 02 20 56 dc 20 65 3c d5 cd 96 8b 13 |..V.. V. e<.....| +00000030 34 af e3 21 1b e8 f4 fd 4b 10 5a ed 55 a4 bd 70 |4..!....K.Z.U..p| +00000040 6a a2 e2 e3 7c fb |j...|.|" +"2019-07-20 02:40:45.261 UTC [cauthdsl] func2 -> DEBU 3acc 0xc0039f92f0 principal evaluation succeeds for identity 1" +"2019-07-20 02:40:45.261 UTC [cauthdsl] func1 -> DEBU 3acd 0xc0039f92f0 gate 1563590445248608200 evaluation succeeds" +"2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3ace Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.262 UTC [policies] Evaluate -> DEBU 3acf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad0 Signature set satisfies policy /Channel/Application/Admins" +"2019-07-20 02:40:45.264 UTC [policies] Evaluate -> DEBU 3ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-07-20 02:40:45.264 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad2 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad3 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.265 UTC [common.configtx] verifyDeltaSet -> DEBU 3ad5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.266 UTC [common.configtx] recurseConfigMap -> DEBU 3ad8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ad9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3ada Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.267 UTC [common.configtx] recurseConfigMap -> DEBU 3adc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3add Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.268 UTC [common.configtx] recurseConfigMap -> DEBU 3ade Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3adf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae2 Setting policy for key Admins to " +"2019-07-20 02:40:45.269 UTC [common.configtx] recurseConfigMap -> DEBU 3ae3 Setting policy for key Endorsement to " +"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae4 Setting policy for key LifecycleEndorsement to " +"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae5 Setting policy for key Readers to " +"2019-07-20 02:40:45.270 UTC [common.configtx] recurseConfigMap -> DEBU 3ae6 Setting policy for key Writers to " +"2019-07-20 02:40:45.274 UTC [common.configtx] recurseConfigMap -> DEBU 3ae7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.275 UTC [common.configtx] recurseConfigMap -> DEBU 3ae8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3ae9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aea Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.276 UTC [common.configtx] recurseConfigMap -> DEBU 3aeb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.277 UTC [common.configtx] recurseConfigMap -> DEBU 3aec Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.280 UTC [common.configtx] recurseConfigMap -> DEBU 3aed Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.282 UTC [common.configtx] recurseConfigMap -> DEBU 3aee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.284 UTC [common.configtx] recurseConfigMap -> DEBU 3aef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.285 UTC [common.configtx] recurseConfigMap -> DEBU 3af0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-07-20 02:40:45.287 UTC [common.channelconfig] NewStandardValues -> DEBU 3af1 Initializing protos for *channelconfig.ChannelProtos" +"2019-07-20 02:40:45.287 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af2 Processing field: HashingAlgorithm" +"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af3 Processing field: BlockDataHashingStructure" +"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af4 Processing field: OrdererAddresses" +"2019-07-20 02:40:45.289 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af5 Processing field: Consortium" +"2019-07-20 02:40:45.290 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af6 Processing field: Capabilities" +"2019-07-20 02:40:45.291 UTC [common.channelconfig] NewStandardValues -> DEBU 3af7 Initializing protos for *channelconfig.ApplicationProtos" +"2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3af8 Processing field: ACLs" +"2019-07-20 02:40:45.294 UTC [comm.grpc.server] 1 -> INFO 3af9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.293Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166.1µs +"2019-07-20 02:40:45.291 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afa Processing field: Capabilities" +"2019-07-20 02:40:45.303 UTC [common.channelconfig] NewStandardValues -> DEBU 3afb Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afc Processing field: AnchorPeers" +"2019-07-20 02:40:45.304 UTC [common.channelconfig] NewStandardValues -> DEBU 3afd Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.304 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3afe Processing field: MSP" +"2019-07-20 02:40:45.304 UTC [common.channelconfig] Validate -> DEBU 3aff Anchor peers for org Org3MSP are " +"2019-07-20 02:40:45.305 UTC [common.channelconfig] validateMSP -> DEBU 3b00 Setting up MSP for org Org3MSP" +"2019-07-20 02:40:45.305 UTC [msp] newBccspMsp -> DEBU 3b01 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.306 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b02 Obtaining default signing identity" +"2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b03 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.306 UTC [msp.identity] Sign -> DEBU 3b04 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.309 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b05 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:34150" +"2019-07-20 02:40:45.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b06 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34150" +"2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:40:45.312 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 be 5f 24 6f 9b 2e 79 cd 7b 8c b2 |0E.!.._$o..y.{..| +00000010 37 cf 5e 2c 50 16 db ab 74 30 02 39 8d 06 6c 42 |7.^,P...t0.9..lB| +00000020 0d e8 3d 51 de 02 20 12 f9 a6 96 80 2e 96 d1 be |..=Q.. .........| +00000030 fd 33 cf 4a 1a f7 4b 07 01 e8 c6 0d e3 58 b3 0e |.3.J..K......X..| +00000040 4b be 81 51 0f c3 af |K..Q...|" +"2019-07-20 02:40:45.313 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b09 Authenticated 172.18.0.6:34150" +"2019-07-20 02:40:45.313 UTC [gossip.comm] GossipStream -> DEBU 3b0a Servicing 172.18.0.6:34150" +"2019-07-20 02:40:45.314 UTC [gossip.comm] serviceConnection -> DEBU 3b0b Closing reading from stream" +"2019-07-20 02:40:45.314 UTC [gossip.comm] writeToStream -> DEBU 3b0c Closing writing to stream" +"2019-07-20 02:40:45.316 UTC [gossip.comm] readFromStream -> DEBU 3b0d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-07-20 02:40:45.305 UTC [msp] New -> DEBU 3b0e Creating Cache-MSP instance" +"2019-07-20 02:40:45.317 UTC [msp] Setup -> DEBU 3b0f Setting up MSP instance Org3MSP" +"2019-07-20 02:40:45.317 UTC [grpc] infof -> DEBU 3b10 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.318 UTC [gossip.comm] readFromStream -> DEBU 3b11 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.318 UTC [gossip.comm] func2 -> DEBU 3b12 Client 172.18.0.6:34150 disconnected" +"2019-07-20 02:40:45.319 UTC [comm.grpc.server] 1 -> INFO 3b13 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.306Z grpc.peer_address=172.18.0.6:34150 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9498ms +"2019-07-20 02:40:45.319 UTC [grpc] infof -> DEBU 3b14 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.319 UTC [gossip.comm] writeToStream -> DEBU 3b15 Closing writing to stream" +"2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b16 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.322 UTC [msp.identity] newIdentity -> DEBU 3b17 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.324 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b18 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-07-20 02:40:45.324 UTC [msp] Validate -> DEBU 3b19 MSP Org3MSP validating identity" +"2019-07-20 02:40:45.324 UTC [msp] getCertificationChain -> DEBU 3b1a MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.325 UTC [msp] hasOURole -> DEBU 3b1b MSP Org3MSP checking if the identity is a client" +"2019-07-20 02:40:45.325 UTC [msp] getCertificationChain -> DEBU 3b1c MSP Org3MSP getting certification chain" +"2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b1e Processing field: AnchorPeers" +"2019-07-20 02:40:45.325 UTC [common.channelconfig] NewStandardValues -> DEBU 3b1f Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b20 Processing field: MSP" +"2019-07-20 02:40:45.325 UTC [common.channelconfig] Validate -> DEBU 3b21 Anchor peers for org Org1MSP are anchor_peers: " +"2019-07-20 02:40:45.326 UTC [common.channelconfig] validateMSP -> DEBU 3b22 Setting up MSP for org Org1MSP" +"2019-07-20 02:40:45.334 UTC [msp] newBccspMsp -> DEBU 3b23 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.334 UTC [msp] New -> DEBU 3b24 Creating Cache-MSP instance" +"2019-07-20 02:40:45.335 UTC [msp] Setup -> DEBU 3b25 Setting up MSP instance Org1MSP" +"2019-07-20 02:40:45.337 UTC [msp.identity] newIdentity -> DEBU 3b26 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.339 UTC [msp.identity] newIdentity -> DEBU 3b27 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b28 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-07-20 02:40:45.341 UTC [msp] Validate -> DEBU 3b29 MSP Org1MSP validating identity" +"2019-07-20 02:40:45.343 UTC [msp] getCertificationChain -> DEBU 3b2a MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.345 UTC [msp] hasOURole -> DEBU 3b2b MSP Org1MSP checking if the identity is a client" +"2019-07-20 02:40:45.345 UTC [msp] getCertificationChain -> DEBU 3b2c MSP Org1MSP getting certification chain" +"2019-07-20 02:40:45.346 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-07-20 02:40:45.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b2e Processing field: AnchorPeers" +"2019-07-20 02:40:45.347 UTC [common.channelconfig] NewStandardValues -> DEBU 3b2f Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b30 Processing field: MSP" +"2019-07-20 02:40:45.348 UTC [common.channelconfig] Validate -> DEBU 3b31 Anchor peers for org Org2MSP are anchor_peers: " +"2019-07-20 02:40:45.348 UTC [common.channelconfig] validateMSP -> DEBU 3b32 Setting up MSP for org Org2MSP" +"2019-07-20 02:40:45.348 UTC [msp] newBccspMsp -> DEBU 3b33 Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.349 UTC [msp] New -> DEBU 3b34 Creating Cache-MSP instance" +"2019-07-20 02:40:45.350 UTC [msp] Setup -> DEBU 3b35 Setting up MSP instance Org2MSP" +"2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b36 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.352 UTC [msp.identity] newIdentity -> DEBU 3b37 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.354 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3b38 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-07-20 02:40:45.354 UTC [msp] Validate -> DEBU 3b39 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.354 UTC [comm.grpc.server] 1 -> INFO 3b3a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.353Z grpc.peer_address=172.18.0.6:34152 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=525.1µs +"2019-07-20 02:40:45.355 UTC [msp] getCertificationChain -> DEBU 3b3b MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.357 UTC [msp] hasOURole -> DEBU 3b3c MSP Org2MSP checking if the identity is a client" +"2019-07-20 02:40:45.357 UTC [msp] getCertificationChain -> DEBU 3b3d MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.357 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3e Initializing protos for *channelconfig.OrdererProtos" +"2019-07-20 02:40:45.358 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b3f Processing field: ConsensusType" +"2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b41 Processing field: BatchSize" +"2019-07-20 02:40:45.359 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b42 Processing field: BatchTimeout" +"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b43 Processing field: KafkaBrokers" +"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b44 Processing field: ChannelRestrictions" +"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b45 Processing field: Capabilities" +"2019-07-20 02:40:45.360 UTC [common.channelconfig] NewStandardValues -> DEBU 3b46 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-07-20 02:40:45.360 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b47 Processing field: Endpoints" +"2019-07-20 02:40:45.358 UTC [comm.grpc.server] 1 -> INFO 3b40 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.355Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.6µs +"2019-07-20 02:40:45.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3b48 Initializing protos for *channelconfig.OrganizationProtos" +"2019-07-20 02:40:45.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b49 Processing field: MSP" +"2019-07-20 02:40:45.361 UTC [common.channelconfig] validateMSP -> DEBU 3b4a Setting up MSP for org OrdererOrg" +"2019-07-20 02:40:45.361 UTC [msp] newBccspMsp -> DEBU 3b4b Creating BCCSP-based MSP instance" +"2019-07-20 02:40:45.361 UTC [msp] New -> DEBU 3b4c Creating Cache-MSP instance" +"2019-07-20 02:40:45.362 UTC [msp] Setup -> DEBU 3b4d Setting up MSP instance OrdererMSP" +"2019-07-20 02:40:45.362 UTC [msp.identity] newIdentity -> DEBU 3b4e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.363 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b4f Obtaining default signing identity" +"2019-07-20 02:40:45.364 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.365 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.366 UTC [msp] GetDefaultSigningIdentity -> DEBU 3b53 Obtaining default signing identity" +"2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b54 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:34152" +"2019-07-20 02:40:45.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b55 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 172.18.0.6:34152" +"2019-07-20 02:40:45.367 UTC [msp.identity] Verify -> DEBU 3b56 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-07-20 02:40:45.368 UTC [msp.identity] Verify -> DEBU 3b57 Verify: sig = 00000000 30 44 02 20 1f f0 4d a2 e6 96 82 59 a5 ec 6b 9c |0D. ..M....Y..k.| +00000010 34 89 fa 02 72 ee 06 88 36 da 46 9c ed 01 62 f5 |4...r...6.F...b.| +00000020 8f e5 fd 27 02 20 09 db aa f3 d2 09 14 81 36 40 |...'. ........6@| +00000030 8c 02 70 d7 6f cd 16 82 bf b9 5b 96 a1 b3 45 a8 |..p.o.....[...E.| +00000040 12 28 f0 7b 8d 41 |.(.{.A|" +"2019-07-20 02:40:45.366 UTC [msp.identity] Sign -> DEBU 3b58 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.368 UTC [msp.identity] Sign -> DEBU 3b59 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.369 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:59100" +"2019-07-20 02:40:45.370 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b5b Authenticated 172.18.0.6:34152" +"2019-07-20 02:40:45.370 UTC [gossip.comm] GossipStream -> DEBU 3b5c Servicing 172.18.0.6:34152" +"2019-07-20 02:40:45.364 UTC [msp.identity] newIdentity -> DEBU 3b50 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.373 UTC [msp] Validate -> DEBU 3b5d MSP OrdererMSP validating identity" +"2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5e Setting up the MSP manager (4 msps)" +"2019-07-20 02:40:45.373 UTC [msp] Setup -> DEBU 3b5f MSP manager setup complete, setup 4 msps" +"2019-07-20 02:40:45.373 UTC [policies] NewManagerImpl -> DEBU 3b60 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b61 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b62 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b63 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-07-20 02:40:45.374 UTC [policies] NewManagerImpl -> DEBU 3b64 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b65 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b66 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b67 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-07-20 02:40:45.375 UTC [policies] NewManagerImpl -> DEBU 3b68 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b69 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6a Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6b Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6c Proposed new policy Readers for Channel/Application" +"2019-07-20 02:40:45.376 UTC [policies] NewManagerImpl -> DEBU 3b6d Proposed new policy Writers for Channel/Application" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6e Proposed new policy Admins for Channel/Application" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b6f Proposed new policy Endorsement for Channel/Application" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b70 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b71 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b72 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b73 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.377 UTC [policies] NewManagerImpl -> DEBU 3b74 Proposed new policy Readers for Channel/Orderer" +"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b75 Proposed new policy Writers for Channel/Orderer" +"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b76 Proposed new policy Admins for Channel/Orderer" +"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b77 Proposed new policy BlockValidation for Channel/Orderer" +"2019-07-20 02:40:45.378 UTC [policies] NewManagerImpl -> DEBU 3b78 Proposed new policy Writers for Channel" +"2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b79 Proposed new policy Admins for Channel" +"2019-07-20 02:40:45.379 UTC [policies] NewManagerImpl -> DEBU 3b7a Proposed new policy Readers for Channel" +"2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7b Adding to config map: [Group] /Channel" +"2019-07-20 02:40:45.379 UTC [common.configtx] addToMap -> DEBU 3b7c Adding to config map: [Group] /Channel/Application" +"2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7d Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-07-20 02:40:45.380 UTC [common.configtx] addToMap -> DEBU 3b7e Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b7f Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b80 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b81 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.381 UTC [common.configtx] addToMap -> DEBU 3b82 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b83 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-07-20 02:40:45.386 UTC [common.configtx] addToMap -> DEBU 3b84 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-07-20 02:40:45.387 UTC [common.configtx] addToMap -> DEBU 3b85 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b87 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b88 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-07-20 02:40:45.390 UTC [common.configtx] addToMap -> DEBU 3b89 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-07-20 02:40:45.391 UTC [common.configtx] addToMap -> DEBU 3b8d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b8f Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b90 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b91 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b92 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b93 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b94 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-07-20 02:40:45.392 UTC [common.configtx] addToMap -> DEBU 3b95 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b96 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b97 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b98 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b99 Adding to config map: [Group] /Channel/Orderer" +"2019-07-20 02:40:45.393 UTC [common.configtx] addToMap -> DEBU 3b9a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-07-20 02:40:45.394 UTC [common.configtx] addToMap -> DEBU 3b9e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-07-20 02:40:45.395 UTC [gossip.comm] func1 -> DEBU 3ba2 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.372 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3b86 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:59100" +"2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.396 UTC [gossip.gossip] handleMessage -> DEBU 3ba6 Exiting" +"2019-07-20 02:40:45.396 UTC [grpc] infof -> DEBU 3ba7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.395 UTC [comm.grpc.server] 1 -> INFO 3b9f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.391Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=406.8µs +"2019-07-20 02:40:45.397 UTC [gossip.gossip] handleMessage -> DEBU 3ba8 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.397 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ba9 Got message: GossipMessage: nonce:4698240984573701261 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.396 UTC [msp] DeserializeIdentity -> DEBU 3ba5 Obtaining identity" +"2019-07-20 02:40:45.395 UTC [common.configtx] addToMap -> DEBU 3ba3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bab Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-07-20 02:40:45.398 UTC [common.configtx] addToMap -> DEBU 3bac Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bad Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-07-20 02:40:45.399 UTC [common.configtx] addToMap -> DEBU 3bae Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3baf Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb0 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb1 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb2 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb3 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-07-20 02:40:45.400 UTC [common.configtx] addToMap -> DEBU 3bb4 Adding to config map: [Value] /Channel/Consortium" +"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb5 Adding to config map: [Value] /Channel/Capabilities" +"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb6 Adding to config map: [Policy] /Channel/Writers" +"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb7 Adding to config map: [Policy] /Channel/Admins" +"2019-07-20 02:40:45.401 UTC [common.configtx] addToMap -> DEBU 3bb8 Adding to config map: [Policy] /Channel/Readers" +"2019-07-20 02:40:45.401 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bb9 As expected, current configuration has policy '/Channel/Readers'" +"2019-07-20 02:40:45.402 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bba As expected, current configuration has policy '/Channel/Writers'" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbb Manager Channel looking up path [Application]" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbc Manager Channel has managers Application" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbd Manager Channel has managers Orderer" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbe Manager Channel/Application looking up path []" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bbf Manager Channel/Application has managers Org1MSP" +"2019-07-20 02:40:45.402 UTC [policies] Manager -> DEBU 3bc0 Manager Channel/Application has managers Org2MSP" +"2019-07-20 02:40:45.403 UTC [policies] Manager -> DEBU 3bc1 Manager Channel/Application has managers Org3MSP" +"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc2 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc3 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-07-20 02:40:45.403 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bc4 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc5 Manager Channel looking up path [Orderer]" +"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc6 Manager Channel has managers Application" +"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc7 Manager Channel has managers Orderer" +"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc8 Manager Channel/Orderer looking up path []" +"2019-07-20 02:40:45.404 UTC [policies] Manager -> DEBU 3bc9 Manager Channel/Orderer has managers OrdererOrg" +"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcb As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcc As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-07-20 02:40:45.404 UTC [common.channelconfig] LogSanityChecks -> DEBU 3bcd As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bce Application capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.405 UTC [common.capabilities] Supported -> DEBU 3bcf Channel capability V1_4_2 is supported and is enabled" +"2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd0 Processing new config for channel businesschannel" +"2019-07-20 02:40:45.405 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3bd1 Calling out because config was updated for channel businesschannel" +"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd2 Org3MSP anchor peers: []" +"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd3 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd4 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-07-20 02:40:45.405 UTC [gossip.service] updateAnchors -> DEBU 3bd5 Creating state provider for chainID businesschannel" +"2019-07-20 02:40:45.405 UTC [msp] DeserializeIdentity -> DEBU 3bd6 Obtaining identity" +"2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bd8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.406 UTC [policies] Evaluate -> DEBU 3bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3bdc 0xc003d6ac20 gate 1563590445406453400 evaluation starts" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdd 0xc003d6ac20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bde 0xc003d6ac20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3bdf 0xc003d6ac20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func2 -> DEBU 3be0 0xc003d6ac20 principal evaluation fails" +"2019-07-20 02:40:45.406 UTC [cauthdsl] func1 -> DEBU 3be1 0xc003d6ac20 gate 1563590445406453400 evaluation fails" +"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.407 UTC [policies] Evaluate -> DEBU 3be4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3be5 0xc003d6b460 gate 1563590445407305700 evaluation starts" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be6 0xc003d6b460 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be7 0xc003d6b460 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3be8 0xc003d6b460 principal matched by identity 0" +"2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3be9 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:45.407 UTC [msp.identity] Verify -> DEBU 3bea Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func2 -> DEBU 3beb 0xc003d6b460 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.407 UTC [cauthdsl] func1 -> DEBU 3bec 0xc003d6b460 gate 1563590445407305700 evaluation succeeds" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bed Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bef Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.408 UTC [msp] DeserializeIdentity -> DEBU 3bf1 Obtaining identity" +"2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bf3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.408 UTC [policies] Evaluate -> DEBU 3bf6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.408 UTC [cauthdsl] func1 -> DEBU 3bf7 0xc003da0540 gate 1563590445408927800 evaluation starts" +"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf8 0xc003da0540 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bf9 0xc003da0540 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfa 0xc003da0540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.409 UTC [cauthdsl] func2 -> DEBU 3bfb 0xc003da0540 principal evaluation fails" +"2019-07-20 02:40:45.409 UTC [cauthdsl] func1 -> DEBU 3bfc 0xc003da0540 gate 1563590445408927800 evaluation fails" +"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.409 UTC [policies] Evaluate -> DEBU 3bff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.410 UTC [cauthdsl] func1 -> DEBU 3c00 0xc003da0d80 gate 1563590445409998800 evaluation starts" +"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c01 0xc003da0d80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c02 0xc003da0d80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.410 UTC [cauthdsl] func2 -> DEBU 3c03 0xc003da0d80 principal matched by identity 0" +"2019-07-20 02:40:45.410 UTC [msp.identity] Verify -> DEBU 3c04 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:45.411 UTC [msp.identity] Verify -> DEBU 3c05 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:45.411 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003da0d80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.411 UTC [cauthdsl] func1 -> DEBU 3c07 0xc003da0d80 gate 1563590445409998800 evaluation succeeds" +"2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.411 UTC [msp] DeserializeIdentity -> DEBU 3c0a Obtaining identity" +"2019-07-20 02:40:45.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.412 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" +"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.412 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0f Obtaining default signing identity" +"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c10 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c12 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.412 UTC [msp.identity] Sign -> DEBU 3c11 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.413 UTC [msp.identity] Sign -> DEBU 3c14 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c15 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:60470" +"2019-07-20 02:40:45.413 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c16 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60470" +"2019-07-20 02:40:45.413 UTC [msp] DeserializeIdentity -> DEBU 3c17 Obtaining identity" +"2019-07-20 02:40:45.413 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c19 Obtaining identity" +"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.414 UTC [msp] DeserializeIdentity -> DEBU 3c1b Obtaining identity" +"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c1c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.414 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c1e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.414 UTC [policies] Evaluate -> DEBU 3c1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.415 UTC [policies] Evaluate -> DEBU 3c21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c22 0xc0032cb6a0 gate 1563590445415359700 evaluation starts" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c23 0xc0032cb6a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c24 0xc0032cb6a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c25 0xc0032cb6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func2 -> DEBU 3c26 0xc0032cb6a0 principal evaluation fails" +"2019-07-20 02:40:45.415 UTC [cauthdsl] func1 -> DEBU 3c27 0xc0032cb6a0 gate 1563590445415359700 evaluation fails" +"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c28 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.416 UTC [policies] Evaluate -> DEBU 3c2a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.416 UTC [cauthdsl] func1 -> DEBU 3c2b 0xc0032cbee0 gate 1563590445416337000 evaluation starts" +"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2c 0xc0032cbee0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2d 0xc0032cbee0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.416 UTC [cauthdsl] func2 -> DEBU 3c2e 0xc0032cbee0 principal matched by identity 0" +"2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c2f Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:40:45.416 UTC [msp.identity] Verify -> DEBU 3c30 Verify: sig = 00000000 30 44 02 20 70 77 0e 41 05 b8 58 44 c5 ef d4 1d |0D. pw.A..XD....| +00000010 4b f0 23 2e 27 24 6e 26 fd 6a 3f e0 b6 46 1c c4 |K.#.'$n&.j?..F..| +00000020 28 04 83 d7 02 20 17 2f 47 a5 c0 02 2e 97 66 9c |(.... ./G.....f.| +00000030 8c 3f d5 3f 6a 11 42 3b 76 cb 41 89 39 f1 3d 56 |.?.?j.B;v.A.9.=V| +00000040 64 af ca 3d fb 2f |d..=./|" +"2019-07-20 02:40:45.417 UTC [cauthdsl] func2 -> DEBU 3c31 0xc0032cbee0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.417 UTC [cauthdsl] func1 -> DEBU 3c32 0xc0032cbee0 gate 1563590445416337000 evaluation succeeds" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c33 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c34 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c35 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c36 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.417 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c37 Authenticated 172.18.0.8:60470" +"2019-07-20 02:40:45.417 UTC [gossip.comm] GossipStream -> DEBU 3c38 Servicing 172.18.0.8:60470" +"2019-07-20 02:40:45.411 UTC [policies] Evaluate -> DEBU 3c0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c3c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.417 UTC [policies] Evaluate -> DEBU 3c3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.418 UTC [policies] Evaluate -> DEBU 3c3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.418 UTC [cauthdsl] func1 -> DEBU 3c40 0xc000551290 gate 1563590445418202500 evaluation starts" +"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c41 0xc000551290 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c42 0xc000551290 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c43 0xc000551290 principal matched by identity 0" +"2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c44 Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:45.418 UTC [msp.identity] Verify -> DEBU 3c45 Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:45.418 UTC [cauthdsl] func2 -> DEBU 3c46 0xc000551290 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.419 UTC [cauthdsl] func1 -> DEBU 3c47 0xc000551290 gate 1563590445418202500 evaluation succeeds" +"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c48 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.419 UTC [policies] Evaluate -> DEBU 3c4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.419 UTC [gossip.gossip] JoinChan -> INFO 3c4c Joining gossip network of channel businesschannel with 3 organizations" +"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4d No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c4f Anchor peer with same endpoint, skipping connecting to myself" +"2019-07-20 02:40:45.419 UTC [gossip.gossip] learnAnchorPeers -> INFO 3c50 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c51 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-07-20 02:40:45.420 UTC [gossip.discovery] Connect -> DEBU 3c52 Exiting" +"2019-07-20 02:40:45.420 UTC [gossip.service] updateEndpoints -> DEBU 3c53 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +"2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c55 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.421 UTC [msp] DeserializeIdentity -> DEBU 3c56 Obtaining identity" +"2019-07-20 02:40:45.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.421 UTC [peer] updateTrustedRoots -> DEBU 3c58 Updating trusted root authorities for channel businesschannel" +"2019-07-20 02:40:45.413 UTC [policies] Evaluate -> DEBU 3c13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.422 UTC [policies] Evaluate -> DEBU 3c5a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.422 UTC [cauthdsl] func1 -> DEBU 3c5b 0xc003a9dac0 gate 1563590445422859400 evaluation starts" +"2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5c 0xc003a9dac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.422 UTC [cauthdsl] func2 -> DEBU 3c5d 0xc003a9dac0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5e 0xc003a9dac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c5f 0xc003a9dac0 principal evaluation fails" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c60 0xc003a9dac0 gate 1563590445422859400 evaluation fails" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c61 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c64 0xc0032d0300 gate 1563590445423362000 evaluation starts" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c65 0xc0032d0300 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c66 0xc0032d0300 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c67 0xc0032d0300 principal matched by identity 0" +"2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c68 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:40:45.423 UTC [msp.identity] Verify -> DEBU 3c69 Verify: sig = 00000000 30 44 02 20 5a 4b 1c 6b e9 16 61 35 b6 6b cd 1d |0D. ZK.k..a5.k..| +00000010 f8 85 de a9 54 4b da a8 5f a0 5a 65 5c a9 53 be |....TK.._.Ze\.S.| +00000020 87 46 2f 03 02 20 76 56 31 1e 7d 54 8b 82 2d da |.F/.. vV1.}T..-.| +00000030 06 aa ad f2 74 96 12 2b 00 a1 68 56 61 66 27 b1 |....t..+..hVaf'.| +00000040 51 92 4a 15 68 d0 |Q.J.h.|" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func2 -> DEBU 3c6a 0xc0032d0300 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.423 UTC [cauthdsl] func1 -> DEBU 3c6b 0xc0032d0300 gate 1563590445423362000 evaluation succeeds" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.423 UTC [policies] Evaluate -> DEBU 3c6f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.423 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3c70 Authenticated 172.18.0.7:59100" +"2019-07-20 02:40:45.424 UTC [gossip.comm] GossipStream -> DEBU 3c71 Servicing 172.18.0.7:59100" +"2019-07-20 02:40:45.424 UTC [gossip.comm] writeToStream -> DEBU 3c72 Closing writing to stream" +"2019-07-20 02:40:45.424 UTC [gossip.comm] serviceConnection -> DEBU 3c73 Closing reading from stream" +"2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c74 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-07-20 02:40:45.424 UTC [gossip.comm] readFromStream -> DEBU 3c75 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.424 UTC [gossip.comm] func2 -> DEBU 3c76 Client 172.18.0.7:59100 disconnected" +"2019-07-20 02:40:45.424 UTC [comm.grpc.server] 1 -> INFO 3c77 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.366Z grpc.peer_address=172.18.0.7:59100 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.3508ms +"2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c78 Closing writing to stream" +"2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.425 UTC [gossip.comm] serviceConnection -> DEBU 3c7a Closing reading from stream" +"2019-07-20 02:40:45.425 UTC [gossip.comm] writeToStream -> DEBU 3c7b Closing writing to stream" +"2019-07-20 02:40:45.425 UTC [grpc] infof -> DEBU 3c7c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.427 UTC [gossip.comm] readFromStream -> DEBU 3c7d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-07-20 02:40:45.397 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3baa Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:45.427 UTC [msp] DeserializeIdentity -> DEBU 3c7e Obtaining identity" +"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c81 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.427 UTC [policies] Evaluate -> DEBU 3c84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.427 UTC [cauthdsl] func1 -> DEBU 3c85 0xc0034ee7d0 gate 1563590445427855200 evaluation starts" +"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c86 0xc0034ee7d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c87 0xc0034ee7d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.427 UTC [cauthdsl] func2 -> DEBU 3c88 0xc0034ee7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c89 0xc0034ee7d0 principal evaluation fails" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8a 0xc0034ee7d0 gate 1563590445427855200 evaluation fails" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c8e 0xc0034ef010 gate 1563590445428220700 evaluation starts" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c8f 0xc0034ef010 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c90 0xc0034ef010 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c91 0xc0034ef010 principal matched by identity 0" +"2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c92 Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| +00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" +"2019-07-20 02:40:45.428 UTC [msp.identity] Verify -> DEBU 3c93 Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| +00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| +00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| +00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| +00000040 8a df fb b1 35 84 93 |....5..|" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func2 -> DEBU 3c94 0xc0034ef010 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.428 UTC [cauthdsl] func1 -> DEBU 3c95 0xc0034ef010 gate 1563590445428220700 evaluation succeeds" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c98 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.428 UTC [policies] Evaluate -> DEBU 3c99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.428 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9c updating membership: timestamp: " +"2019-07-20 02:40:45.428 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9d Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:45.429 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c9f Exiting" +"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca0 Exiting" +"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca1 Exiting" +"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca2 Got message: GossipMessage: nonce:5951314385057450676 tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.429 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca4 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| +00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" +"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca5 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| +00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| +00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| +00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| +00000040 bf d9 c4 e8 12 c3 65 |......e|" +"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:45.429 UTC [msp.identity] Verify -> DEBU 3ca7 Verify: sig = 00000000 30 45 02 21 00 d3 7f 31 bd 6b fd 66 e1 af e4 66 |0E.!...1.k.f...f| +00000010 e3 a5 67 bc dc c8 e0 e8 a1 ae 66 4e c4 e2 59 08 |..g.......fN..Y.| +00000020 4f 5d b5 b4 ec 02 20 11 e0 84 4f 9f 54 96 a0 2d |O].... ...O.T..-| +00000030 cc 52 79 6d bf 62 c4 04 cd 88 93 a2 ed 36 ca f9 |.Rym.b.......6..| +00000040 bd b0 f4 e1 9d 56 e1 |.....V.|" +"2019-07-20 02:40:45.429 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ca8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ca9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3caa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cab Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cac Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] learnExistingMembers -> DEBU 3cad Exiting" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cae Exiting" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3caf Exiting" +"2019-07-20 02:40:45.430 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb1 Obtaining identity" +"2019-07-20 02:40:45.430 UTC [msp] DeserializeIdentity -> DEBU 3cb2 Obtaining identity" +"2019-07-20 02:40:45.432 UTC [gossip.comm] Send -> DEBU 3cb3 Entering, sending GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:45.432 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb4 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" secret_envelope: > alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5951314385057450676, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.433 UTC [gossip.comm] sendToEndpoint -> DEBU 3cb6 Exiting" +"2019-07-20 02:40:45.434 UTC [gossip.discovery] sendMemResponse -> DEBU 3cb7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:45.434 UTC [msp] DeserializeIdentity -> DEBU 3cb8 Obtaining identity" +"2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cb9 Obtaining identity" +"2019-07-20 02:40:45.435 UTC [msp] DeserializeIdentity -> DEBU 3cba Obtaining identity" +"2019-07-20 02:40:45.435 UTC [gossip.comm] Send -> DEBU 3cbb Entering, sending GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:45.436 UTC [gossip.discovery] sendMemResponse -> DEBU 3cbc Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive: alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:45.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3cbd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4698240984573701261, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.436 UTC [gossip.comm] createConnection -> DEBU 3cbe Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cbf parsed scheme: """ +"2019-07-20 02:40:45.441 UTC [grpc] DialContext -> DEBU 3cc0 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:40:45.442 UTC [grpc] watcher -> DEBU 3cc1 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-07-20 02:40:45.442 UTC [grpc] switchBalancer -> DEBU 3cc2 ClientConn switching balancer to "pick_first"" +"2019-07-20 02:40:45.442 UTC [grpc] HandleSubConnStateChange -> DEBU 3cc3 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, CONNECTING" +"2019-07-20 02:40:45.443 UTC [gossip.gossip] handleMessage -> DEBU 3cc4 Exiting" +"2019-07-20 02:40:45.445 UTC [gossip.comm] readFromStream -> DEBU 3cc5 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.445 UTC [gossip.comm] func2 -> DEBU 3cc6 Client 172.18.0.8:60470 disconnected" +"2019-07-20 02:40:45.445 UTC [comm.grpc.server] 1 -> INFO 3cc7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-07-20T02:40:55.411Z grpc.peer_address=172.18.0.8:60470 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5484ms +"2019-07-20 02:40:45.446 UTC [grpc] infof -> DEBU 3cc8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.446 UTC [gossip.comm] writeToStream -> DEBU 3cc9 Closing writing to stream" +"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cca updating root CAs for channel [businesschannel]" +"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccb adding app root CAs for MSP [Org3MSP]" +"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccc adding app root CAs for MSP [Org1MSP]" +"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3ccd adding app root CAs for MSP [Org2MSP]" +"2019-07-20 02:40:45.455 UTC [peer] buildTrustedRootsForChain -> DEBU 3cce adding orderer root CAs for MSP [OrdererMSP]" +"2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3ccf config transaction received for chain businesschannel" +"2019-07-20 02:40:45.456 UTC [committer.txvalidator] validateTx -> DEBU 3cd1 [businesschannel] validateTx completes for block 0xc000695640 env 0xc003781400 txn 0" +"2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> DEBU 3cd2 got result for idx 0, code 0" +"2019-07-20 02:40:45.457 UTC [committer.txvalidator] Validate -> INFO 3cd3 [businesschannel] Validated block [6] in 260ms" +"2019-07-20 02:40:45.457 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3cd4 Retrieving private write sets for 0 transactions from transient store" +"2019-07-20 02:40:45.457 UTC [gossip.privdata] StoreBlock -> DEBU 3cd5 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-07-20 02:40:45.457 UTC [committer] preCommit -> DEBU 3cd6 Received configuration update, calling CSCC ConfigUpdate" +"2019-07-20 02:40:45.457 UTC [kvledger] CommitWithPvtData -> DEBU 3cd7 [businesschannel] Validating state for block [6]" +"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd8 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cd9 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-07-20 02:40:45.457 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3cda Validating new block with num trans = [1]" +"2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdb ValidateAndPrepareBatch() for block number = [6]" +"2019-07-20 02:40:45.458 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cdc preprocessing ProtoBlock..." +"2019-07-20 02:40:45.459 UTC [valimpl] preprocessProtoBlock -> DEBU 3cdd txType=CONFIG" +"2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cde Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-07-20 02:40:45.459 UTC [valimpl] processNonEndorserTx -> DEBU 3cdf Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3ce0 constructing new tx simulator" +"2019-07-20 02:40:45.459 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3ce1 constructing new tx simulator txid = []" +"2019-07-20 02:40:45.459 UTC [peer] GenerateSimulationResults -> DEBU 3ce2 Processing CONFIG" +"2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce3 parsed scheme: """ +"2019-07-20 02:40:45.460 UTC [grpc] DialContext -> DEBU 3ce4 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:40:45.460 UTC [peer] processChannelConfigTx -> DEBU 3ce5 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3ce7 Simulation completed, getting simulation results" +"2019-07-20 02:40:45.460 UTC [lockbasedtxmgr] Done -> DEBU 3ce8 Done with transaction simulation / query execution []" +"2019-07-20 02:40:45.461 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3ce9 Block [6] Transaction index [0] TxId [] marked as valid by state validator" +"2019-07-20 02:40:45.461 UTC [valinternal] ApplyWriteSet -> DEBU 3cea txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003517ac0)}" +"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ceb validating rwset..." +"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3cec postprocessing ProtoBlock..." +"2019-07-20 02:40:45.461 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3ced ValidateAndPrepareBatch() complete" +"2019-07-20 02:40:45.461 UTC [kvledger] CommitWithPvtData -> DEBU 3cee [businesschannel] Adding CommitHash to the block [6]" +"2019-07-20 02:40:45.462 UTC [kvledger] CommitWithPvtData -> DEBU 3cef [businesschannel] Committing block [6] to storage" +"2019-07-20 02:40:45.462 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3cf0 Writing block [6] to pvt block store" +"2019-07-20 02:40:45.463 UTC [pvtdatastorage] Prepare -> DEBU 3cf1 Saved 0 private data write sets for block [6]" +"2019-07-20 02:40:45.464 UTC [comm.grpc.server] 1 -> INFO 3cf2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-07-20T02:40:47.463Z grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.1µs +"2019-07-20 02:40:45.456 UTC [grpc] HandleSubConnStateChange -> DEBU 3cd0 pickfirstBalancer: HandleSubConnStateChange: 0xc003fc60a0, READY" +"2019-07-20 02:40:45.466 UTC [fsblkstorage] indexBlock -> DEBU 3cf3 Indexing block [blockNum=6, blockHash=[]byte{0xf5, 0xb0, 0x11, 0x46, 0x4, 0x5a, 0x37, 0x6e, 0xe5, 0x9b, 0x7a, 0xb0, 0xf2, 0xf9, 0xaf, 0x42, 0x15, 0x9e, 0x7f, 0x29, 0x6f, 0xe6, 0x3, 0xf4, 0x56, 0x9b, 0xb6, 0x31, 0xa7, 0x9, 0xf1, 0x78} txOffsets= +txId=e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38 locPointer=offset=71, bytesLength=33874 +]" +"2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf4 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to txid-index" +"2019-07-20 02:40:45.467 UTC [fsblkstorage] indexBlock -> DEBU 3cf5 Adding txLoc [fileSuffixNum=0, offset=84150, bytesLength=33874] for tx number:[0] ID: [e6bc77e55019ae7bdc369c7cd40c7cc13dedaaff531f0c68511dcec8d740ce38] to blockNumTranNum index" +"2019-07-20 02:40:45.468 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cf6 Obtaining default signing identity" +"2019-07-20 02:40:45.469 UTC [fsblkstorage] updateCheckpoint -> DEBU 3cf7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[118997], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cf8 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.469 UTC [msp.identity] Sign -> DEBU 3cfa Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.470 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cfb Obtaining default signing identity" +"2019-07-20 02:40:45.470 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cfc Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051" +"2019-07-20 02:40:45.460 UTC [grpc] watcher -> DEBU 3ce6 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:40:45.470 UTC [grpc] switchBalancer -> DEBU 3cfe ClientConn switching balancer to "pick_first"" +"2019-07-20 02:40:45.471 UTC [grpc] HandleSubConnStateChange -> DEBU 3cff pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, CONNECTING" +"2019-07-20 02:40:45.469 UTC [pvtdatastorage] Commit -> DEBU 3cf9 Committing private data for block [6]" +"2019-07-20 02:40:45.470 UTC [msp.identity] Sign -> DEBU 3cfd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.474 UTC [msp.identity] Sign -> DEBU 3d00 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.477 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d02 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:60474" +"2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d03 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:60474" +"2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d04 Obtaining identity" +"2019-07-20 02:40:45.478 UTC [msp] DeserializeIdentity -> DEBU 3d05 Obtaining identity" +"2019-07-20 02:40:45.478 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d06 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 172.18.0.7:7051" +"2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" +"2019-07-20 02:40:45.481 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" +"2019-07-20 02:40:45.483 UTC [msp.identity] newIdentity -> DEBU 3d0a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.479 UTC [msp.identity] newIdentity -> DEBU 3d07 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-07-20 02:40:45.475 UTC [pvtdatastorage] Commit -> DEBU 3d01 Committed private data for block [6]" +"2019-07-20 02:40:45.484 UTC [grpc] HandleSubConnStateChange -> DEBU 3d0b pickfirstBalancer: HandleSubConnStateChange: 0xc002f03a40, READY" +"2019-07-20 02:40:45.486 UTC [msp] Validate -> DEBU 3d0c MSP Org2MSP validating identity" +"2019-07-20 02:40:45.487 UTC [msp] getCertificationChain -> DEBU 3d0e MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.487 UTC [msp] DeserializeIdentity -> DEBU 3d10 Obtaining identity" +"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.488 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d13 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.489 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.490 UTC [policies] Evaluate -> DEBU 3d18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.491 UTC [policies] Evaluate -> DEBU 3d1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.491 UTC [cauthdsl] func1 -> DEBU 3d1b 0xc003ef7610 gate 1563590445491328500 evaluation starts" +"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003ef7610 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1d 0xc003ef7610 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1e 0xc003ef7610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.491 UTC [cauthdsl] func2 -> DEBU 3d1f 0xc003ef7610 principal evaluation fails" +"2019-07-20 02:40:45.492 UTC [cauthdsl] func1 -> DEBU 3d20 0xc003ef7610 gate 1563590445491328500 evaluation fails" +"2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.490 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d19 Obtaining default signing identity" +"2019-07-20 02:40:45.488 UTC [msp] Validate -> DEBU 3d14 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.486 UTC [kvledger] CommitWithPvtData -> DEBU 3d0d [businesschannel] Committing block [6] transactions to state database" +"2019-07-20 02:40:45.492 UTC [policies] Evaluate -> DEBU 3d22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.493 UTC [policies] Evaluate -> DEBU 3d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.492 UTC [msp.identity] Sign -> DEBU 3d23 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.494 UTC [msp.identity] Sign -> DEBU 3d27 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d28 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-07-20 02:40:45.494 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d29 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:40:45.494 UTC [msp] DeserializeIdentity -> DEBU 3d2a Obtaining identity" +"2019-07-20 02:40:45.494 UTC [cauthdsl] func1 -> DEBU 3d2b 0xc003ee11e0 gate 1563590445493562900 evaluation starts" +"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2c 0xc003ee11e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc003ee11e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.495 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.495 UTC [msp] DeserializeIdentity -> DEBU 3d2f Obtaining identity" +"2019-07-20 02:40:45.495 UTC [cauthdsl] func2 -> DEBU 3d30 0xc003ee11e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.496 UTC [cauthdsl] func2 -> DEBU 3d31 0xc003ee11e0 principal evaluation fails" +"2019-07-20 02:40:45.496 UTC [cauthdsl] func1 -> DEBU 3d32 0xc003ee11e0 gate 1563590445493562900 evaluation fails" +"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d33 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.496 UTC [msp] DeserializeIdentity -> DEBU 3d34 Obtaining identity" +"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d38 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d39 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.496 UTC [policies] Evaluate -> DEBU 3d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.497 UTC [cauthdsl] func1 -> DEBU 3d3c 0xc003ee1a40 gate 1563590445497309900 evaluation starts" +"2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3d 0xc003ee1a40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.497 UTC [cauthdsl] func2 -> DEBU 3d3e 0xc003ee1a40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.498 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d3f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:40:45.498 UTC [msp] Validate -> DEBU 3d40 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.499 UTC [msp] getCertificationChain -> DEBU 3d41 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.500 UTC [cauthdsl] func2 -> DEBU 3d42 0xc003ee1a40 principal matched by identity 0" +"2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d43 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:40:45.500 UTC [msp.identity] Verify -> DEBU 3d44 Verify: sig = 00000000 30 45 02 21 00 cc 72 66 4d f3 aa 62 27 67 82 1d |0E.!..rfM..b'g..| +00000010 99 71 b4 0e 9c a8 af 3e a8 79 15 1c 73 cb bc 67 |.q.....>.y..s..g| +00000020 49 75 71 2b e8 02 20 29 70 7a 3d c2 2f 23 ba 52 |Iuq+.. )pz=./#.R| +00000030 bf 65 fd 50 14 83 46 01 8a f7 ef fd a3 c3 3a 36 |.e.P..F.......:6| +00000040 c9 40 0f 81 41 8b 00 |.@..A..|" +"2019-07-20 02:40:45.500 UTC [grpc] infof -> DEBU 3d45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.492 UTC [lockbasedtxmgr] Commit -> DEBU 3d25 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d46 Committing updates to state database" +"2019-07-20 02:40:45.501 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3d47 Building the expiry schedules based on the update batch" +"2019-07-20 02:40:45.501 UTC [lockbasedtxmgr] Commit -> DEBU 3d48 Write lock acquired for committing updates to state database" +"2019-07-20 02:40:45.501 UTC [stateleveldb] ApplyUpdates -> DEBU 3d49 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-07-20 02:40:45.501 UTC [cauthdsl] func2 -> DEBU 3d4a 0xc003ee1a40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.502 UTC [cauthdsl] func1 -> DEBU 3d4b 0xc003ee1a40 gate 1563590445497309900 evaluation succeeds" +"2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.502 UTC [policies] Evaluate -> DEBU 3d4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d4e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.503 UTC [lockbasedtxmgr] Commit -> DEBU 3d4f Updates committed to state database and the write lock is released" +"2019-07-20 02:40:45.503 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d50 Preparing potential purge list working-set for expiringAtBlk [7]" +"2019-07-20 02:40:45.503 UTC [leveldbhelper] GetIterator -> DEBU 3d51 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +"2019-07-20 02:40:45.504 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3d52 No expiry entry found for expiringAtBlk [7]" +"2019-07-20 02:40:45.504 UTC [lockbasedtxmgr] func1 -> DEBU 3d53 launched the background routine for preparing keys to purge with the next block" +"2019-07-20 02:40:45.504 UTC [kvledger] CommitWithPvtData -> DEBU 3d54 [businesschannel] Committing block [6] transactions to history database" +"2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d55 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +"2019-07-20 02:40:45.504 UTC [historyleveldb] Commit -> DEBU 3d56 Skipping transaction [0] since it is not an endorsement transaction" +"2019-07-20 02:40:45.503 UTC [policies] Evaluate -> DEBU 3d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.506 UTC [historyleveldb] Commit -> DEBU 3d58 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +"2019-07-20 02:40:45.506 UTC [kvledger] CommitWithPvtData -> INFO 3d59 [businesschannel] Committed block [6] with 1 transaction(s) in 48ms (state_validation=4ms block_and_pvtdata_commit=24ms state_commit=17ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +"2019-07-20 02:40:45.506 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d5a Obtaining default signing identity" +"2019-07-20 02:40:45.506 UTC [msp.identity] Sign -> DEBU 3d5b Sign: plaintext: 18057A6C121408F8E6BA97ACA5BFD915...08071A0C0A0565787030321203312E30 " +"2019-07-20 02:40:45.507 UTC [msp.identity] Sign -> DEBU 3d5c Sign: digest: 3413AB16E454D4D11A5CF1F1C30B239DD040FF9B6C404041B3848980D2DF491C " +"2019-07-20 02:40:45.497 UTC [policies] Evaluate -> DEBU 3d3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d5d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.507 UTC [gossip.state] commitBlock -> DEBU 3d5e [businesschannel] Committed block [6] with 1 transaction(s)" +"2019-07-20 02:40:45.492 UTC [msp] getCertificationChain -> DEBU 3d24 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.507 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.508 UTC [msp] DeserializeIdentity -> DEBU 3d63 Obtaining identity" +"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d65 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.508 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d66 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.508 UTC [policies] Evaluate -> DEBU 3d67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6a 0xc0030083a0 gate 1563590445509237900 evaluation starts" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6b 0xc0030083a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6c 0xc0030083a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc0030083a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func2 -> DEBU 3d6e 0xc0030083a0 principal evaluation fails" +"2019-07-20 02:40:45.509 UTC [cauthdsl] func1 -> DEBU 3d6f 0xc0030083a0 gate 1563590445509237900 evaluation fails" +"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d70 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d71 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.509 UTC [policies] Evaluate -> DEBU 3d72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d73 0xc003008c00 gate 1563590445510074100 evaluation starts" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d74 0xc003008c00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003008c00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003008c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d77 0xc003008c00 principal evaluation fails" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d78 0xc003008c00 gate 1563590445510074100 evaluation fails" +"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d79 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.510 UTC [policies] Evaluate -> DEBU 3d7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func1 -> DEBU 3d7c 0xc003009460 gate 1563590445510800100 evaluation starts" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003009460 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.510 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003009460 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.511 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3d7f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-07-20 02:40:45.511 UTC [msp] Validate -> DEBU 3d80 MSP Org2MSP validating identity" +"2019-07-20 02:40:45.511 UTC [msp] getCertificationChain -> DEBU 3d81 MSP Org2MSP getting certification chain" +"2019-07-20 02:40:45.511 UTC [cauthdsl] func2 -> DEBU 3d82 0xc003009460 principal matched by identity 0" +"2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d83 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-07-20 02:40:45.511 UTC [msp.identity] Verify -> DEBU 3d84 Verify: sig = 00000000 30 44 02 20 70 4f 30 67 42 46 82 f2 1b 9c a8 81 |0D. pO0gBF......| +00000010 11 8c 1f 81 39 d0 51 f4 ae c4 c7 b9 f0 8a 1d d7 |....9.Q.........| +00000020 b9 02 2d ca 02 20 05 6c ed 25 61 84 a2 6d fd d3 |..-.. .l.%a..m..| +00000030 91 b9 b4 96 f9 d6 b6 9d 33 c7 e6 9f ea ed d9 f4 |........3.......| +00000040 67 d9 13 e9 43 de |g...C.|" +"2019-07-20 02:40:45.512 UTC [cauthdsl] func2 -> DEBU 3d85 0xc003009460 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.512 UTC [cauthdsl] func1 -> DEBU 3d86 0xc003009460 gate 1563590445510800100 evaluation succeeds" +"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d87 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d88 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d89 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.512 UTC [policies] Evaluate -> DEBU 3d8a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.512 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8b Authenticated 172.18.0.7:7051" +"2019-07-20 02:40:45.512 UTC [gossip.comm] createConnection -> DEBU 3d8c Exiting" +"2019-07-20 02:40:45.512 UTC [gossip.comm] sendToEndpoint -> DEBU 3d8d Exiting" +"2019-07-20 02:40:45.507 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d5f Authenticated 172.18.0.8:60474" +"2019-07-20 02:40:45.513 UTC [gossip.comm] GossipStream -> DEBU 3d8e Servicing 172.18.0.8:60474" +"2019-07-20 02:40:45.513 UTC [gossip.comm] readFromStream -> DEBU 3d8f Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-07-20 02:40:45.513 UTC [gossip.comm] func2 -> DEBU 3d90 Client 172.18.0.8:60474 disconnected" +"2019-07-20 02:40:45.513 UTC [comm.grpc.server] 1 -> INFO 3d91 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:60474 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5281ms +"2019-07-20 02:40:45.513 UTC [gossip.gossip] handleMessage -> DEBU 3d92 Entering, 172.18.0.8:60474 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.514 UTC [gossip.gossip] handleMessage -> DEBU 3d94 Exiting" +"2019-07-20 02:40:45.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d95 Got message: GossipMessage: nonce:1447606720863157574 tag:EMPTY mem_req:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.514 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d96 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:45.514 UTC [msp] DeserializeIdentity -> DEBU 3d97 Obtaining identity" +"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d99 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.514 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d9a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.515 UTC [policies] Evaluate -> DEBU 3d9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.515 UTC [cauthdsl] func1 -> DEBU 3d9e 0xc003f25a40 gate 1563590445515383000 evaluation starts" +"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3d9f 0xc003f25a40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da0 0xc003f25a40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da1 0xc003f25a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.515 UTC [cauthdsl] func2 -> DEBU 3da2 0xc003f25a40 principal evaluation fails" +"2019-07-20 02:40:45.516 UTC [cauthdsl] func1 -> DEBU 3da3 0xc003f25a40 gate 1563590445515383000 evaluation fails" +"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.516 UTC [policies] Evaluate -> DEBU 3da6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.517 UTC [cauthdsl] func1 -> DEBU 3da7 0xc003f36280 gate 1563590445516956200 evaluation starts" +"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da8 0xc003f36280 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3da9 0xc003f36280 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3daa 0xc003f36280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.517 UTC [cauthdsl] func2 -> DEBU 3dab 0xc003f36280 principal evaluation fails" +"2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3dac 0xc003f36280 gate 1563590445516956200 evaluation fails" +"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3dae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.518 UTC [policies] Evaluate -> DEBU 3daf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.518 UTC [cauthdsl] func1 -> DEBU 3db0 0xc003f36ac0 gate 1563590445518968000 evaluation starts" +"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db1 0xc003f36ac0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db2 0xc003f36ac0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.519 UTC [cauthdsl] func2 -> DEBU 3db3 0xc003f36ac0 principal matched by identity 0" +"2019-07-20 02:40:45.519 UTC [msp.identity] Verify -> DEBU 3db4 Verify: digest = 00000000 a5 36 9f 8b 2f a8 4d c1 63 6e 58 db 08 90 2e f7 |.6../.M.cnX.....| +00000010 10 64 1f a4 b2 1b e8 16 22 90 1f ef f7 e1 28 f5 |.d......".....(.|" +"2019-07-20 02:40:45.520 UTC [msp.identity] Verify -> DEBU 3db5 Verify: sig = 00000000 30 45 02 21 00 f8 58 21 d0 7b 04 cb b7 9d 1e 37 |0E.!..X!.{.....7| +00000010 a0 e6 f5 fd 5f eb 98 b0 61 6a 78 ff 57 e0 45 23 |...._...ajx.W.E#| +00000020 1e 3e d0 b2 15 02 20 65 75 64 99 d9 d0 01 28 ab |.>.... eud....(.| +00000030 4c 04 4e bb 5e e6 cc 5d 00 0c 2d 71 1e 01 f4 71 |L.N.^..]..-q...q| +00000040 83 c7 79 dd 2c 1a 7f |..y.,..|" +"2019-07-20 02:40:45.520 UTC [cauthdsl] func2 -> DEBU 3db6 0xc003f36ac0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.520 UTC [cauthdsl] func1 -> DEBU 3db7 0xc003f36ac0 gate 1563590445518968000 evaluation succeeds" +"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3db9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dba Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.520 UTC [policies] Evaluate -> DEBU 3dbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dbc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbe updating membership: timestamp: " +"2019-07-20 02:40:45.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dbf Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:45.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dc1 Exiting" +"2019-07-20 02:40:45.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc2 Exiting" +"2019-07-20 02:40:45.523 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dc3 Exiting" +"2019-07-20 02:40:45.523 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc4 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc5 Obtaining identity" +"2019-07-20 02:40:45.523 UTC [msp] DeserializeIdentity -> DEBU 3dc6 Obtaining identity" +"2019-07-20 02:40:45.524 UTC [msp] DeserializeIdentity -> DEBU 3dc7 Obtaining identity" +"2019-07-20 02:40:45.524 UTC [gossip.comm] Send -> DEBU 3dc8 Entering, sending GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:45.524 UTC [gossip.discovery] sendMemResponse -> DEBU 3dc9 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0205" signature:"0E\002!\000\302nD\207\343E\032\231\231osX\312/-\233=t\2367\270Z\213L\375\264\234\352\331\032\027\342\002 ODM\242T\030\033\337\0014R\332c\347\377\257fu\360\257\302\301\374\005;\277\331\304\350\022\303e" > alive:\320\262\025\002 eud\231\331\320\001(\253L\004N\273^\346\314]\000\014-q\036\001\364q\203\307y\335,\032\177" > alive: alive:9\232\322V\2358\311\017}\365J" > " +"2019-07-20 02:40:45.524 UTC [gossip.comm] sendToEndpoint -> DEBU 3dca Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1447606720863157574, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.524 UTC [gossip.comm] createConnection -> DEBU 3dcb Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:45.526 UTC [gossip.comm] writeToStream -> DEBU 3dcc Closing writing to stream" +"2019-07-20 02:40:45.507 UTC [policies] Evaluate -> DEBU 3d93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dcd 0xc003e8cbe0 gate 1563590445526119800 evaluation starts" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dce 0xc003e8cbe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dcf 0xc003e8cbe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd0 0xc003e8cbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd1 0xc003e8cbe0 principal evaluation fails" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd2 0xc003e8cbe0 gate 1563590445526119800 evaluation fails" +"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.526 UTC [policies] Evaluate -> DEBU 3dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func1 -> DEBU 3dd6 0xc003e8d420 gate 1563590445526559500 evaluation starts" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd7 0xc003e8d420 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd8 0xc003e8d420 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dd9 0xc003e8d420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.526 UTC [cauthdsl] func2 -> DEBU 3dda 0xc003e8d420 principal evaluation fails" +"2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddb 0xc003e8d420 gate 1563590445526559500 evaluation fails" +"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3ddd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.527 UTC [policies] Evaluate -> DEBU 3dde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.527 UTC [cauthdsl] func1 -> DEBU 3ddf 0xc003e8dc60 gate 1563590445527196500 evaluation starts" +"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de0 0xc003e8dc60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de1 0xc003e8dc60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.527 UTC [cauthdsl] func2 -> DEBU 3de2 0xc003e8dc60 principal matched by identity 0" +"2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3de3 parsed scheme: """ +"2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de4 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:40:45.527 UTC [msp.identity] Verify -> DEBU 3de5 Verify: sig = 00000000 30 44 02 20 15 44 8b 82 00 ab 3b 37 3d 6f 79 e0 |0D. .D....;7=oy.| +00000010 81 20 9b 49 c9 2e 8a 26 7d b6 61 35 f9 29 00 7c |. .I...&}.a5.).|| +00000020 b2 ba a1 71 02 20 42 34 7a 79 64 3c 4b 12 a3 a5 |...q. B4zyd DEBU 3de6 0xc003e8dc60 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.528 UTC [cauthdsl] func1 -> DEBU 3de7 0xc003e8dc60 gate 1563590445527196500 evaluation succeeds" +"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3de9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3dea Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.528 UTC [policies] Evaluate -> DEBU 3deb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.528 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3dec Authenticated 172.18.0.8:7051" +"2019-07-20 02:40:45.528 UTC [msp] DeserializeIdentity -> DEBU 3ded Obtaining identity" +"2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dee Obtaining default signing identity" +"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3def Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD915102F " +"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df0 Sign: digest: FF22BF917C50A5A69FE384EC283EBBAB43EA18EC2DAE339B6AE8BFEA098F946E " +"2019-07-20 02:40:45.528 UTC [msp] GetDefaultSigningIdentity -> DEBU 3df1 Obtaining default signing identity" +"2019-07-20 02:40:45.528 UTC [msp.identity] Sign -> DEBU 3df2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:45.529 UTC [msp.identity] Sign -> DEBU 3df3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:45.529 UTC [msp] DeserializeIdentity -> DEBU 3df4 Obtaining identity" +"2019-07-20 02:40:45.529 UTC [gossip.comm] Send -> DEBU 3df5 Entering, sending GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:45.529 UTC [gossip.comm] sendToEndpoint -> DEBU 3df6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:276503936147127162 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.530 UTC [grpc] infof -> DEBU 3df7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:45.527 UTC [grpc] DialContext -> DEBU 3df8 scheme "" not registered, fallback to default scheme" +"2019-07-20 02:40:45.530 UTC [grpc] watcher -> DEBU 3df9 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-07-20 02:40:45.530 UTC [grpc] switchBalancer -> DEBU 3dfa ClientConn switching balancer to "pick_first"" +"2019-07-20 02:40:45.531 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfb pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, CONNECTING" +"2019-07-20 02:40:45.542 UTC [grpc] HandleSubConnStateChange -> DEBU 3dfc pickfirstBalancer: HandleSubConnStateChange: 0xc000610130, READY" +"2019-07-20 02:40:45.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 3dfd Obtaining default signing identity" +"2019-07-20 02:40:45.544 UTC [msp.identity] Sign -> DEBU 3dfe Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-07-20 02:40:45.545 UTC [msp.identity] Sign -> DEBU 3dff Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-07-20 02:40:45.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e00 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +"2019-07-20 02:40:45.547 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e01 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 172.18.0.8:7051" +"2019-07-20 02:40:45.547 UTC [msp] DeserializeIdentity -> DEBU 3e02 Obtaining identity" +"2019-07-20 02:40:45.547 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.551 UTC [msp] DeserializeIdentity -> DEBU 3e04 Obtaining identity" +"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.552 UTC [msp] DeserializeIdentity -> DEBU 3e06 Obtaining identity" +"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e07 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e08 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.552 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e09 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e0d 0xc0006e0230 gate 1563590445552375400 evaluation starts" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0e 0xc0006e0230 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e0f 0xc0006e0230 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e10 0xc0006e0230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func2 -> DEBU 3e11 0xc0006e0230 principal evaluation fails" +"2019-07-20 02:40:45.552 UTC [cauthdsl] func1 -> DEBU 3e12 0xc0006e0230 gate 1563590445552375400 evaluation fails" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.552 UTC [policies] Evaluate -> DEBU 3e15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e16 0xc0006e0a70 gate 1563590445553036600 evaluation starts" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e17 0xc0006e0a70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e18 0xc0006e0a70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e19 0xc0006e0a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e1a 0xc0006e0a70 principal evaluation fails" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1b 0xc0006e0a70 gate 1563590445553036600 evaluation fails" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e1f 0xc0006e12b0 gate 1563590445553401800 evaluation starts" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e20 0xc0006e12b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e21 0xc0006e12b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e22 0xc0006e12b0 principal matched by identity 0" +"2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e23 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-07-20 02:40:45.553 UTC [msp.identity] Verify -> DEBU 3e24 Verify: sig = 00000000 30 45 02 21 00 f5 da 01 a3 70 51 a3 33 5f 1a f2 |0E.!.....pQ.3_..| +00000010 ac 08 fc d6 ef 1b 74 df ba ed 57 50 ae 50 ea 05 |......t...WP.P..| +00000020 8a bc 1b 00 2e 02 20 4d 26 16 73 50 ac 0e 33 ce |...... M&.sP..3.| +00000030 54 53 f1 34 5a c6 ca ff 8a 55 a6 11 48 4c 2d ef |TS.4Z....U..HL-.| +00000040 36 54 a9 63 7a a6 da |6T.cz..|" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func2 -> DEBU 3e25 0xc0006e12b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.553 UTC [cauthdsl] func1 -> DEBU 3e26 0xc0006e12b0 gate 1563590445553401800 evaluation succeeds" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e27 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e29 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.553 UTC [policies] Evaluate -> DEBU 3e2a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e2b Authenticated 172.18.0.8:7051" +"2019-07-20 02:40:45.554 UTC [gossip.comm] createConnection -> DEBU 3e2c Exiting" +"2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2d Exiting" +"2019-07-20 02:40:45.554 UTC [gossip.comm] sendToEndpoint -> DEBU 3e2e Exiting" +"2019-07-20 02:40:45.557 UTC [gossip.comm] func1 -> DEBU 3e2f Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e30 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.557 UTC [gossip.gossip] handleMessage -> DEBU 3e31 Exiting" +"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e32 Got message: GossipMessage: Channel: , nonce: 276503936147127162, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-07-20 02:40:45.558 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e33 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e34 Verify: digest = 00000000 76 c3 3d 3b 53 91 f2 46 7d 87 85 b3 04 32 54 3a |v.=;S..F}....2T:| +00000010 55 f4 c9 e1 39 02 10 ec 22 19 f9 fa 73 85 d3 3b |U...9..."...s..;|" +"2019-07-20 02:40:45.558 UTC [msp.identity] Verify -> DEBU 3e35 Verify: sig = 00000000 30 45 02 21 00 c2 6e 44 87 e3 45 1a 99 99 6f 73 |0E.!..nD..E...os| +00000010 58 ca 2f 2d 9b 3d 74 9e 37 b8 5a 8b 4c fd b4 9c |X./-.=t.7.Z.L...| +00000020 ea d9 1a 17 e2 02 20 4f 44 4d a2 54 18 1b df 01 |...... ODM.T....| +00000030 34 52 da 63 e7 ff af 66 75 f0 af c2 c1 fc 05 3b |4R.c...fu......;| +00000040 bf d9 c4 e8 12 c3 65 |......e|" +"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e36 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.558 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e37 Exiting" +"2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e38 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e39 Verify: digest = 00000000 ff 22 bf 91 7c 50 a5 a6 9f e3 84 ec 28 3e bb ab |."..|P......(>..| +00000010 43 ea 18 ec 2d ae 33 9b 6a e8 bf ea 09 8f 94 6e |C...-.3.j......n|" +"2019-07-20 02:40:45.559 UTC [msp.identity] Verify -> DEBU 3e3a Verify: sig = 00000000 30 45 02 21 00 f5 f5 83 7b ac 43 de e2 2f bf 91 |0E.!....{.C../..| +00000010 a4 b7 be 7d 67 36 c7 16 82 ca 9c 37 61 1d f8 f1 |...}g6.....7a...| +00000020 33 04 07 23 a5 02 20 47 34 61 9f b8 48 46 3b cb |3..#.. G4a..HF;.| +00000030 ad b1 a0 42 7d 88 7a 23 7f d1 1a 87 24 7f 6d 6e |...B}.z#....$.mn| +00000040 e6 e3 c3 b9 9a c7 b5 |.......|" +"2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.559 UTC [gossip.discovery] isSentByMe -> DEBU 3e3c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.559 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e3d Exiting" +"2019-07-20 02:40:45.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e3e Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:45.559 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +"2019-07-20 02:40:45.559 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.560 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e42 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e46 0xc000702730 gate 1563590445560383100 evaluation starts" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e47 0xc000702730 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e48 0xc000702730 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e49 0xc000702730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func2 -> DEBU 3e4a 0xc000702730 principal evaluation fails" +"2019-07-20 02:40:45.560 UTC [cauthdsl] func1 -> DEBU 3e4b 0xc000702730 gate 1563590445560383100 evaluation fails" +"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.560 UTC [policies] Evaluate -> DEBU 3e4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e4f 0xc000702f70 gate 1563590445561132700 evaluation starts" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e50 0xc000702f70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e51 0xc000702f70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e52 0xc000702f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e53 0xc000702f70 principal evaluation fails" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e54 0xc000702f70 gate 1563590445561132700 evaluation fails" +"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:45.561 UTC [policies] Evaluate -> DEBU 3e57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func1 -> DEBU 3e58 0xc0007037b0 gate 1563590445561877900 evaluation starts" +"2019-07-20 02:40:45.561 UTC [cauthdsl] func2 -> DEBU 3e59 0xc0007037b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5a 0xc0007037b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5b 0xc0007037b0 principal matched by identity 0" +"2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5c Verify: digest = 00000000 8f ba 57 98 80 8e 2d cd 89 5d 87 b8 08 40 04 45 |..W...-..]...@.E| +00000010 78 ea c3 c0 14 9d af c2 08 bb cc 89 77 3f 3e 87 |x...........w?>.|" +"2019-07-20 02:40:45.562 UTC [msp.identity] Verify -> DEBU 3e5d Verify: sig = 00000000 30 45 02 21 00 b5 76 2d 76 60 fc fc 11 01 07 f8 |0E.!..v-v`......| +00000010 62 01 ec d0 14 36 32 55 bd 89 34 ea 51 78 34 96 |b....62U..4.Qx4.| +00000020 95 73 af b0 af 02 20 62 91 f1 ac ad d6 15 2d eb |.s.... b......-.| +00000030 5e d8 69 b6 4a 07 4f f2 0e 52 a8 48 de 81 5b 79 |^.i.J.O..R.H..[y| +00000040 8a df fb b1 35 84 93 |....5..|" +"2019-07-20 02:40:45.562 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc0007037b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:45.562 UTC [cauthdsl] func1 -> DEBU 3e5f 0xc0007037b0 gate 1563590445561877900 evaluation succeeds" +"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e62 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:45.562 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e64 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e65 Exiting" +"2019-07-20 02:40:45.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e66 Exiting" +"2019-07-20 02:40:46.978 UTC [gossip.election] waitForInterrupt -> DEBU 3e67 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:46.978 UTC [gossip.election] IsLeader -> DEBU 3e68 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:46.978 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e69 Obtaining default signing identity" +"2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100E1801 " +"2019-07-20 02:40:46.979 UTC [msp.identity] Sign -> DEBU 3e6b Sign: digest: C94717FA5498C76CBFD070F87C29A8E58419A2CDB66B3A48BC32D35A9FA13C03 " +"2019-07-20 02:40:46.979 UTC [gossip.election] waitForInterrupt -> DEBU 3e6c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6d Obtaining identity" +"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6e Obtaining identity" +"2019-07-20 02:40:46.980 UTC [msp] DeserializeIdentity -> DEBU 3e6f Obtaining identity" +"2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e70 Obtaining identity" +"2019-07-20 02:40:46.981 UTC [gossip.comm] Send -> DEBU 3e71 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:46.981 UTC [msp] DeserializeIdentity -> DEBU 3e72 Obtaining identity" +"2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e73 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-07-20 02:40:46.982 UTC [gossip.comm] sendToEndpoint -> DEBU 3e74 Exiting" +"2019-07-20 02:40:46.982 UTC [msp] DeserializeIdentity -> DEBU 3e75 Obtaining identity" +"2019-07-20 02:40:46.997 UTC [gossip.comm] func1 -> DEBU 3e76 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e77 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:46.997 UTC [gossip.gossip] handleMessage -> DEBU 3e78 Exiting" +"2019-07-20 02:40:46.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:46.999 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e7a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:46.999 UTC [msp] DeserializeIdentity -> DEBU 3e7b Obtaining identity" +"2019-07-20 02:40:47.000 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:47.001 UTC [policies] Evaluate -> DEBU 3e80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:47.002 UTC [policies] Evaluate -> DEBU 3e81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:47.004 UTC [cauthdsl] func1 -> DEBU 3e82 0xc0006efa40 gate 1563590447004336100 evaluation starts" +"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0006efa40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e84 0xc0006efa40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.004 UTC [cauthdsl] func2 -> DEBU 3e85 0xc0006efa40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:47.005 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0006efa40 principal evaluation fails" +"2019-07-20 02:40:47.005 UTC [gossip.gossip] handleMessage -> DEBU 3e87 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.005 UTC [cauthdsl] func1 -> DEBU 3e88 0xc0006efa40 gate 1563590447004336100 evaluation fails" +"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e89 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.005 UTC [policies] Evaluate -> DEBU 3e8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e8c 0xc000763130 gate 1563590447006150600 evaluation starts" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc000763130 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8e 0xc000763130 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e8f 0xc000763130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func2 -> DEBU 3e90 0xc000763130 principal evaluation fails" +"2019-07-20 02:40:47.006 UTC [cauthdsl] func1 -> DEBU 3e91 0xc000763130 gate 1563590447006150600 evaluation fails" +"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e92 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.007 UTC [policies] Evaluate -> DEBU 3e94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:47.007 UTC [cauthdsl] func1 -> DEBU 3e95 0xc000763970 gate 1563590447007816600 evaluation starts" +"2019-07-20 02:40:47.007 UTC [cauthdsl] func2 -> DEBU 3e96 0xc000763970 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e97 0xc000763970 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.008 UTC [cauthdsl] func2 -> DEBU 3e98 0xc000763970 principal matched by identity 0" +"2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e99 Verify: digest = 00000000 cf 94 cc bf 56 cf f7 61 c6 08 be 0a 5a fa 83 fe |....V..a....Z...| +00000010 db 51 21 ae 39 c6 6a 65 af 46 59 ec aa 84 2e 99 |.Q!.9.je.FY.....|" +"2019-07-20 02:40:47.008 UTC [msp.identity] Verify -> DEBU 3e9a Verify: sig = 00000000 30 44 02 20 30 58 3e 03 05 1c 60 f6 aa 1e 0d 5d |0D. 0X>...`....]| +00000010 02 6e 70 7d 5a f5 63 2c 5e dd e7 33 47 95 09 69 |.np}Z.c,^..3G..i| +00000020 dd ad 21 4e 02 20 0b 55 36 0d b2 9c 17 0a b6 ea |..!N. .U6.......| +00000030 1e 76 ba b8 be ad dd 38 9d 50 bc 4a 85 a5 09 b7 |.v.....8.P.J....| +00000040 6a e6 a6 64 bd 14 |j..d..|" +"2019-07-20 02:40:47.009 UTC [cauthdsl] func2 -> DEBU 3e9b 0xc000763970 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:47.009 UTC [cauthdsl] func1 -> DEBU 3e9c 0xc000763970 gate 1563590447007816600 evaluation succeeds" +"2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.009 UTC [policies] Evaluate -> DEBU 3e9e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3e9f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:47.010 UTC [policies] Evaluate -> DEBU 3ea0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:47.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea3 updating membership: timestamp: " +"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea4 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:47.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ea6 Exiting" +"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ea7 Exiting" +"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea8 Exiting" +"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ea9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.012 UTC [gossip.gossip] handleMessage -> DEBU 3eaa Exiting" +"2019-07-20 02:40:47.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eab Exiting" +"2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3eac Obtaining identity" +"2019-07-20 02:40:47.016 UTC [msp] DeserializeIdentity -> DEBU 3ead Obtaining identity" +"2019-07-20 02:40:47.017 UTC [msp] DeserializeIdentity -> DEBU 3eae Obtaining identity" +"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eaf Obtaining identity" +"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb0 Obtaining identity" +"2019-07-20 02:40:47.018 UTC [msp] DeserializeIdentity -> DEBU 3eb1 Obtaining identity" +"2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb3 Obtaining identity" +"2019-07-20 02:40:47.019 UTC [msp] DeserializeIdentity -> DEBU 3eb4 Obtaining identity" +"2019-07-20 02:40:47.019 UTC [gossip.comm] Send -> DEBU 3eb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb7 Exiting" +"2019-07-20 02:40:47.019 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.020 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb9 Exiting" +"2019-07-20 02:40:47.193 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3eba Sleeping 25s" +"2019-07-20 02:40:47.287 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebb Obtaining default signing identity" +"2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebc Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151030 " +"2019-07-20 02:40:47.287 UTC [msp.identity] Sign -> DEBU 3ebd Sign: digest: F4B2374751D92F8187A330159D35521A45201DE2EE917285D294724B2D5FFEE1 " +"2019-07-20 02:40:47.288 UTC [msp] GetDefaultSigningIdentity -> DEBU 3ebe Obtaining default signing identity" +"2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ebf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:47.288 UTC [msp.identity] Sign -> DEBU 3ec0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:47.289 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3ec1 Sleeping 5s" +"2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec2 Obtaining identity" +"2019-07-20 02:40:47.297 UTC [msp] DeserializeIdentity -> DEBU 3ec3 Obtaining identity" +"2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec4 Obtaining identity" +"2019-07-20 02:40:47.298 UTC [gossip.comm] Send -> DEBU 3ec5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.298 UTC [msp] DeserializeIdentity -> DEBU 3ec6 Obtaining identity" +"2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3ec9 Exiting" +"2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3ec8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.299 UTC [gossip.comm] Send -> DEBU 3eca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecc Exiting" +"2019-07-20 02:40:47.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3ecd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.301 UTC [gossip.comm] sendToEndpoint -> DEBU 3ece Exiting" +"2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ecf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.330 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" +"2019-07-20 02:40:47.330 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ed1 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.330 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ed2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed3 Verify: digest = 00000000 c0 8b 97 e5 b3 08 ab 1c 23 62 0d 3c a8 64 f1 4f |........#b.<.d.O| +00000010 12 44 bf 7c 3a 44 dc 2a b4 02 fc ce 31 ca 47 78 |.D.|:D.*....1.Gx|" +"2019-07-20 02:40:47.331 UTC [msp.identity] Verify -> DEBU 3ed4 Verify: sig = 00000000 30 45 02 21 00 ea 77 67 83 45 6e 40 a5 3c ac d6 |0E.!..wg.En@.<..| +00000010 74 2c ee 43 4d 48 2f bc 87 08 96 11 2e d9 2c b5 |t,.CMH/.......,.| +00000020 5c 64 72 27 41 02 20 78 2d 65 40 1b b7 cd 24 1d |\dr'A. x-e@...$.| +00000030 0d 4d bb 00 af be 5f 94 8e 7d 97 15 9a d8 5a fb |.M...._..}....Z.| +00000040 97 81 74 60 73 de 2a |..t`s.*|" +"2019-07-20 02:40:47.332 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ed5 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed7 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:47.332 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed8 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ed9 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:47.333 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eda Exiting" +"2019-07-20 02:40:47.333 UTC [gossip.discovery] handleAliveMessage -> DEBU 3edb Exiting" +"2019-07-20 02:40:47.333 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3edc Exiting" +"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edd Obtaining identity" +"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3ede Obtaining identity" +"2019-07-20 02:40:47.335 UTC [msp] DeserializeIdentity -> DEBU 3edf Obtaining identity" +"2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee0 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:47.336 UTC [msp] DeserializeIdentity -> DEBU 3ee1 Obtaining identity" +"2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.336 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Exiting" +"2019-07-20 02:40:47.336 UTC [gossip.comm] Send -> DEBU 3ee4 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.337 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee6 Exiting" +"2019-07-20 02:40:47.342 UTC [gossip.comm] func1 -> DEBU 3ee7 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.342 UTC [gossip.gossip] handleMessage -> DEBU 3ee8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.343 UTC [gossip.gossip] handleMessage -> DEBU 3ee9 Exiting" +"2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eea Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.343 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eeb Exiting" +"2019-07-20 02:40:47.531 UTC [gossip.comm] func1 -> DEBU 3eec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.532 UTC [gossip.gossip] handleMessage -> DEBU 3eee Exiting" +"2019-07-20 02:40:47.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:47.533 UTC [msp] DeserializeIdentity -> DEBU 3ef1 Obtaining identity" +"2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:47.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:47.534 UTC [policies] Evaluate -> DEBU 3ef7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:47.534 UTC [cauthdsl] func1 -> DEBU 3ef8 0xc003843490 gate 1563590447534529400 evaluation starts" +"2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc003843490 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.534 UTC [cauthdsl] func2 -> DEBU 3efa 0xc003843490 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efb 0xc003843490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:47.535 UTC [cauthdsl] func2 -> DEBU 3efc 0xc003843490 principal evaluation fails" +"2019-07-20 02:40:47.535 UTC [cauthdsl] func1 -> DEBU 3efd 0xc003843490 gate 1563590447534529400 evaluation fails" +"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3efe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3eff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.535 UTC [policies] Evaluate -> DEBU 3f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f01 0xc003843cd0 gate 1563590447536109800 evaluation starts" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f02 0xc003843cd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f03 0xc003843cd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f04 0xc003843cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func2 -> DEBU 3f05 0xc003843cd0 principal evaluation fails" +"2019-07-20 02:40:47.536 UTC [cauthdsl] func1 -> DEBU 3f06 0xc003843cd0 gate 1563590447536109800 evaluation fails" +"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f07 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.537 UTC [policies] Evaluate -> DEBU 3f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:47.537 UTC [cauthdsl] func1 -> DEBU 3f0a 0xc00385a510 gate 1563590447537724800 evaluation starts" +"2019-07-20 02:40:47.537 UTC [cauthdsl] func2 -> DEBU 3f0b 0xc00385a510 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0c 0xc00385a510 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.538 UTC [cauthdsl] func2 -> DEBU 3f0d 0xc00385a510 principal matched by identity 0" +"2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0e Verify: digest = 00000000 c3 1f 8e d6 f3 6b b3 b6 11 47 45 89 17 35 18 ff |.....k...GE..5..| +00000010 b2 3c 16 4b 3a d5 5c 86 f6 fe 41 f9 81 5b f0 40 |.<.K:.\...A..[.@|" +"2019-07-20 02:40:47.538 UTC [msp.identity] Verify -> DEBU 3f0f Verify: sig = 00000000 30 44 02 20 10 e7 1b 40 4b be ad e9 7d bc 6c c1 |0D. ...@K...}.l.| +00000010 9e 54 22 95 87 7e fb f0 54 70 a1 5a 24 c4 49 b6 |.T"..~..Tp.Z$.I.| +00000020 87 78 b9 d0 02 20 4c be d5 bc 5a ee 8a a8 17 87 |.x... L...Z.....| +00000030 49 61 f7 ce 43 29 b0 e8 04 28 8c 6e b9 03 73 a0 |Ia..C)...(.n..s.| +00000040 51 42 95 aa 64 92 |QB..d.|" +"2019-07-20 02:40:47.539 UTC [cauthdsl] func2 -> DEBU 3f10 0xc00385a510 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:47.539 UTC [cauthdsl] func1 -> DEBU 3f11 0xc00385a510 gate 1563590447537724800 evaluation succeeds" +"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f12 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f14 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:47.539 UTC [policies] Evaluate -> DEBU 3f15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f16 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f17 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f18 updating membership: timestamp: " +"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f19 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f1b Exiting" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f1c Exiting" +"2019-07-20 02:40:47.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f1d Exiting" +"2019-07-20 02:40:47.542 UTC [gossip.comm] func1 -> DEBU 3f1e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.542 UTC [gossip.gossip] handleMessage -> DEBU 3f1f Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f20 Exiting" +"2019-07-20 02:40:47.543 UTC [gossip.gossip] handleMessage -> DEBU 3f21 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f22 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.543 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f23 Exiting" +"2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f24 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.544 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f25 Exiting" +"2019-07-20 02:40:47.544 UTC [gossip.gossip] handleMessage -> DEBU 3f26 Exiting" +"2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f27 Obtaining identity" +"2019-07-20 02:40:47.544 UTC [msp] DeserializeIdentity -> DEBU 3f28 Obtaining identity" +"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" +"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +"2019-07-20 02:40:47.545 UTC [msp] DeserializeIdentity -> DEBU 3f2c Obtaining identity" +"2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f2d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2e Obtaining identity" +"2019-07-20 02:40:47.546 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +"2019-07-20 02:40:47.546 UTC [gossip.comm] Send -> DEBU 3f30 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f32 Exiting" +"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f33 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:47.547 UTC [gossip.comm] sendToEndpoint -> DEBU 3f34 Exiting" +"2019-07-20 02:40:47.938 UTC [gossip.comm] func1 -> DEBU 3f35 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.938 UTC [gossip.gossip] handleMessage -> DEBU 3f36 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.939 UTC [gossip.gossip] handleMessage -> DEBU 3f37 Exiting" +"2019-07-20 02:40:47.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f38 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f39 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:47.940 UTC [msp] DeserializeIdentity -> DEBU 3f3a Obtaining identity" +"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f3b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3c Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.941 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f3d Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:47.941 UTC [policies] Evaluate -> DEBU 3f3f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:47.942 UTC [policies] Evaluate -> DEBU 3f40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f41 0xc0028e6010 gate 1563590447942285300 evaluation starts" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f42 0xc0028e6010 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f43 0xc0028e6010 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f44 0xc0028e6010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func2 -> DEBU 3f45 0xc0028e6010 principal evaluation fails" +"2019-07-20 02:40:47.942 UTC [cauthdsl] func1 -> DEBU 3f46 0xc0028e6010 gate 1563590447942285300 evaluation fails" +"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f47 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:47.943 UTC [policies] Evaluate -> DEBU 3f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:47.943 UTC [cauthdsl] func1 -> DEBU 3f4a 0xc0028e6850 gate 1563590447943384400 evaluation starts" +"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4b 0xc0028e6850 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4c 0xc0028e6850 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4d 0xc0028e6850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:47.943 UTC [cauthdsl] func2 -> DEBU 3f4e 0xc0028e6850 principal evaluation fails" +"2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f4f 0xc0028e6850 gate 1563590447943384400 evaluation fails" +"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:47.944 UTC [policies] Evaluate -> DEBU 3f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:47.944 UTC [cauthdsl] func1 -> DEBU 3f53 0xc0028e7090 gate 1563590447944666000 evaluation starts" +"2019-07-20 02:40:47.944 UTC [cauthdsl] func2 -> DEBU 3f54 0xc0028e7090 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f55 0xc0028e7090 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f56 0xc0028e7090 principal matched by identity 0" +"2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f57 Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| +00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" +"2019-07-20 02:40:47.945 UTC [msp.identity] Verify -> DEBU 3f58 Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| +00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| +00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| +00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| +00000040 d3 ec c6 8c 3d c1 4c |....=.L|" +"2019-07-20 02:40:47.945 UTC [cauthdsl] func2 -> DEBU 3f59 0xc0028e7090 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:47.945 UTC [cauthdsl] func1 -> DEBU 3f5a 0xc0028e7090 gate 1563590447944666000 evaluation succeeds" +"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:47.946 UTC [policies] Evaluate -> DEBU 3f5d Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:47.947 UTC [policies] Evaluate -> DEBU 3f5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:47.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f5f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f60 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f61 updating membership: timestamp: " +"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f62 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f63 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:47.947 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f64 Exiting" +"2019-07-20 02:40:47.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f65 Exiting" +"2019-07-20 02:40:47.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f66 Exiting" +"2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f67 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f68 Obtaining identity" +"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f69 Obtaining identity" +"2019-07-20 02:40:47.948 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" +"2019-07-20 02:40:47.948 UTC [gossip.comm] Send -> DEBU 3f6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:47.948 UTC [gossip.discovery] sendMemResponse -> DEBU 3f6c Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0207" signature:"0E\002!\000\352wg\203En@\245<\254\326t,\356CMH/\274\207\010\226\021.\331,\265\\dr'A\002 x-e@\033\267\315$\035\rM\273\000\257\276_\224\216}\227\025\232\330Z\373\227\201t`s\336*" > alive: alive: alive: " +"2019-07-20 02:40:47.954 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.955 UTC [gossip.comm] sendToEndpoint -> DEBU 3f6e Exiting" +"2019-07-20 02:40:47.956 UTC [gossip.comm] func1 -> DEBU 3f6f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.956 UTC [gossip.gossip] handleMessage -> DEBU 3f70 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.956 UTC [gossip.pull] HandleMessage -> DEBU 3f71 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f72 Obtaining identity" +"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f73 Obtaining identity" +"2019-07-20 02:40:47.957 UTC [msp] DeserializeIdentity -> DEBU 3f74 Obtaining identity" +"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f75 Obtaining identity" +"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f76 Obtaining identity" +"2019-07-20 02:40:47.958 UTC [msp] DeserializeIdentity -> DEBU 3f77 Obtaining identity" +"2019-07-20 02:40:47.959 UTC [gossip.pull] SendDigest -> DEBU 3f78 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:47.959 UTC [gossip.gossip] handleMessage -> DEBU 3f79 Exiting" +"2019-07-20 02:40:48.235 UTC [gossip.pull] Hello -> DEBU 3f7a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:48.235 UTC [gossip.comm] Send -> DEBU 3f7b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.236 UTC [gossip.pull] Hello -> DEBU 3f7e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:48.236 UTC [gossip.comm] Send -> DEBU 3f7f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f80 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f81 Exiting" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f83 Exiting" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f84 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.237 UTC [gossip.comm] sendToEndpoint -> DEBU 3f85 Exiting" +"2019-07-20 02:40:48.238 UTC [gossip.comm] func1 -> DEBU 3f86 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.239 UTC [gossip.gossip] handleMessage -> DEBU 3f87 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.240 UTC [gossip.pull] HandleMessage -> DEBU 3f88 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.241 UTC [gossip.gossip] handleMessage -> DEBU 3f8a Exiting" +"2019-07-20 02:40:48.240 UTC [gossip.comm] func1 -> DEBU 3f89 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.242 UTC [gossip.pull] HandleMessage -> DEBU 3f8c GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.242 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" +"2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f8e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.243 UTC [gossip.pull] HandleMessage -> DEBU 3f8f GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.243 UTC [gossip.gossip] handleMessage -> DEBU 3f90 Exiting" +"2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f91 Obtaining default signing identity" +"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f92 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151031 " +"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f93 Sign: digest: 4F74B096134B36ADCB78D9C03AE46F229A5A99113888D4169E87246C9DD09824 " +"2019-07-20 02:40:48.278 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f94 Obtaining default signing identity" +"2019-07-20 02:40:48.278 UTC [msp.identity] Sign -> DEBU 3f95 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:48.279 UTC [msp.identity] Sign -> DEBU 3f96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f98 Obtaining identity" +"2019-07-20 02:40:48.279 UTC [gossip.comm] Send -> DEBU 3f99 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.279 UTC [msp] DeserializeIdentity -> DEBU 3f9a Obtaining identity" +"2019-07-20 02:40:48.280 UTC [gossip.comm] Send -> DEBU 3f9b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.280 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9d Exiting" +"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9f Exiting" +"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.281 UTC [gossip.comm] sendToEndpoint -> DEBU 3fa1 Exiting" +"2019-07-20 02:40:48.284 UTC [gossip.comm] func1 -> DEBU 3fa2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa3 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.284 UTC [gossip.gossip] handleMessage -> DEBU 3fa4 Exiting" +"2019-07-20 02:40:48.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.285 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fa6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:48.285 UTC [gossip.comm] func1 -> DEBU 3fa7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.285 UTC [gossip.gossip] handleMessage -> DEBU 3fa8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.285 UTC [msp.identity] Verify -> DEBU 3fa9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +"2019-07-20 02:40:48.287 UTC [msp.identity] Verify -> DEBU 3faa Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +00000040 b5 ce 5b 25 de 56 |..[%.V|" +"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fab Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.287 UTC [gossip.discovery] isSentByMe -> DEBU 3fac Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fad Exiting" +"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fae Exiting" +"2019-07-20 02:40:48.287 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3faf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fb0 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:48.287 UTC [msp] DeserializeIdentity -> DEBU 3fb1 Obtaining identity" +"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fb2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fb4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fb7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fb8 0xc00404e2b0 gate 1563590448288246900 evaluation starts" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fb9 0xc00404e2b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fba 0xc00404e2b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbb 0xc00404e2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fbc 0xc00404e2b0 principal evaluation fails" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fbd 0xc00404e2b0 gate 1563590448288246900 evaluation fails" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbe Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fbf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc1 0xc00404eaf0 gate 1563590448288608400 evaluation starts" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc2 0xc00404eaf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc3 0xc00404eaf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc4 0xc00404eaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fc5 0xc00404eaf0 principal evaluation fails" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fc6 0xc00404eaf0 gate 1563590448288608400 evaluation fails" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.288 UTC [policies] Evaluate -> DEBU 3fc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func1 -> DEBU 3fca 0xc00404f330 gate 1563590448288892800 evaluation starts" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcb 0xc00404f330 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.288 UTC [cauthdsl] func2 -> DEBU 3fcc 0xc00404f330 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fcd 0xc00404f330 principal matched by identity 0" +"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fce Verify: digest = 00000000 82 8a 0c 02 a6 b9 8e b3 5c 66 69 6a d5 56 b4 cc |........\fij.V..| +00000010 7f 8a 2d 1a 82 cc 05 33 81 44 35 ec 18 70 32 e1 |..-....3.D5..p2.|" +"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fcf Verify: sig = 00000000 30 45 02 21 00 c4 f6 b1 01 4b 6e f7 8e fd 08 a1 |0E.!.....Kn.....| +00000010 ee 32 9f 30 af b8 48 d7 f8 ba 7c 96 af 8e b9 be |.2.0..H...|.....| +00000020 88 dc fa 86 27 02 20 1e 73 d4 0f e3 81 8b e9 c5 |....'. .s.......| +00000030 c5 b7 4c 20 fb 94 a9 c4 93 fe a8 36 38 c9 2b 14 |..L .......68.+.| +00000040 d3 ec c6 8c 3d c1 4c |....=.L|" +"2019-07-20 02:40:48.289 UTC [cauthdsl] func2 -> DEBU 3fd0 0xc00404f330 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.289 UTC [cauthdsl] func1 -> DEBU 3fd1 0xc00404f330 gate 1563590448288892800 evaluation succeeds" +"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd4 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.289 UTC [policies] Evaluate -> DEBU 3fd5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fd7 Exiting" +"2019-07-20 02:40:48.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fd8 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fd9 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +"2019-07-20 02:40:48.289 UTC [msp.identity] Verify -> DEBU 3fda Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +00000040 b5 ce 5b 25 de 56 |..[%.V|" +"2019-07-20 02:40:48.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.289 UTC [gossip.discovery] isSentByMe -> DEBU 3fdc Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fdd Exiting" +"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fde Exiting" +"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Exiting" +"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.290 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" +"2019-07-20 02:40:48.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.290 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fe3 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe4 Verify: digest = 00000000 4f 74 b0 96 13 4b 36 ad cb 78 d9 c0 3a e4 6f 22 |Ot...K6..x..:.o"| +00000010 9a 5a 99 11 38 88 d4 16 9e 87 24 6c 9d d0 98 24 |.Z..8.....$l...$|" +"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe5 Verify: sig = 00000000 30 44 02 20 77 d6 62 c5 28 9f 66 54 3b 8e 33 8f |0D. w.b.(.fT;.3.| +00000010 a1 62 1d 2a d3 17 54 fb 93 ae bd 24 09 20 30 f3 |.b.*..T....$. 0.| +00000020 87 fc 11 29 02 20 74 94 c4 3b e7 7a 43 3d 42 fe |...). t..;.zC=B.| +00000030 7b 00 c8 7d e1 b9 7a a5 44 86 e1 08 cd d8 1c 45 |{..}..z.D......E| +00000040 b5 ce 5b 25 de 56 |..[%.V|" +"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:48.290 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: sig = 00000000 30 45 02 21 00 9d b8 1e 88 45 28 58 1c 6b 97 a2 |0E.!.....E(X.k..| +00000010 07 40 cd 30 8f cc 13 2b 52 fc bd 7f ba 82 f6 b7 |.@.0...+R.......| +00000020 ca ea e8 ff fa 02 20 07 e1 9b b7 a0 ea a7 91 cd |...... .........| +00000030 9f 46 66 da 28 f8 65 b3 65 1b 15 fe f4 a6 ca 62 |.Ff.(.e.e......b| +00000040 66 3d 21 b8 a0 da 43 |f=!...C|" +"2019-07-20 02:40:48.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fe8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:48.294 UTC [gossip.discovery] isSentByMe -> DEBU 3fe9 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:48.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fea Exiting" +"2019-07-20 02:40:48.297 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3feb Exiting" +"2019-07-20 02:40:48.336 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.336 UTC [gossip.pull] HandleMessage -> DEBU 3fed GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.336 UTC [gossip.pull] SendDigest -> DEBU 3fee Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:48.337 UTC [gossip.gossip] handleMessage -> DEBU 3fef Exiting" +"2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.360 UTC [gossip.gossip] handleMessage -> DEBU 3ff1 Exiting" +"2019-07-20 02:40:48.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff2 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff3 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff4 Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +"2019-07-20 02:40:48.362 UTC [msp.identity] Verify -> DEBU 3ff5 Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +"2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:48.364 UTC [msp.identity] Verify -> DEBU 3ff7 Verify: sig = 00000000 30 45 02 21 00 94 e0 00 3e 3a 01 b1 51 f0 f7 8e |0E.!....>:..Q...| +00000010 46 3d 0d 48 fc 27 cc fe f3 27 d5 5c 95 64 3f 93 |F=.H.'...'.\.d?.| +00000020 65 f5 57 cf 0e 02 20 7a 1d 11 1d 3a 13 18 73 b8 |e.W... z...:..s.| +00000030 58 0a c3 bd f3 fc dd 75 f0 16 fb b4 20 62 90 70 |X......u.... b.p| +00000040 2b fa 22 1d f8 89 78 |+."...x|" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff8 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffa updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffb Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffc Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ffd Exiting" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffe Exiting" +"2019-07-20 02:40:48.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fff Exiting" +"2019-07-20 02:40:48.366 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4001 Obtaining identity" +"2019-07-20 02:40:48.366 UTC [msp] DeserializeIdentity -> DEBU 4002 Obtaining identity" +"2019-07-20 02:40:48.367 UTC [gossip.comm] Send -> DEBU 4003 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.367 UTC [gossip.discovery] sendMemResponse -> DEBU 4004 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" secret_envelope::\001\261Q\360\367\216F=\rH\374'\314\376\363'\325\\\225d?\223e\365W\317\016\002 z\035\021\035:\023\030s\270X\n\303\275\363\374\335u\360\026\373\264 b\220p+\372\"\035\370\211x" > > alive: " +"2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.367 UTC [gossip.comm] sendToEndpoint -> DEBU 4006 Exiting" +"2019-07-20 02:40:48.581 UTC [gossip.comm] func1 -> DEBU 4007 Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4008 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.581 UTC [gossip.gossip] handleMessage -> DEBU 4009 Exiting" +"2019-07-20 02:40:48.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400a Got message: GossipMessage: tag:EMPTY mem_req:\212l9m\360\257\237\214" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 400b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:48.581 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" +"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.582 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4013 0xc0040758f0 gate 1563590448582349900 evaluation starts" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4014 0xc0040758f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4015 0xc0040758f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4016 0xc0040758f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4017 0xc0040758f0 principal evaluation fails" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4018 0xc0040758f0 gate 1563590448582349900 evaluation fails" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.582 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 401c 0xc0040ae130 gate 1563590448582767000 evaluation starts" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401d 0xc0040ae130 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401e 0xc0040ae130 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 401f 0xc0040ae130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func2 -> DEBU 4020 0xc0040ae130 principal evaluation fails" +"2019-07-20 02:40:48.582 UTC [cauthdsl] func1 -> DEBU 4021 0xc0040ae130 gate 1563590448582767000 evaluation fails" +"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.583 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.583 UTC [cauthdsl] func1 -> DEBU 4025 0xc0040ae970 gate 1563590448583184400 evaluation starts" +"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4026 0xc0040ae970 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4027 0xc0040ae970 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.583 UTC [cauthdsl] func2 -> DEBU 4028 0xc0040ae970 principal matched by identity 0" +"2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| +00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" +"2019-07-20 02:40:48.583 UTC [msp.identity] Verify -> DEBU 402a Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| +00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| +00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| +00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| +00000040 6c 39 6d f0 af 9f 8c |l9m....|" +"2019-07-20 02:40:48.589 UTC [cauthdsl] func2 -> DEBU 402b 0xc0040ae970 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.589 UTC [cauthdsl] func1 -> DEBU 402c 0xc0040ae970 gate 1563590448583184400 evaluation succeeds" +"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.589 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4031 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4032 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4033 updating membership: timestamp: " +"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4034 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4035 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 4036 Exiting" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4037 Exiting" +"2019-07-20 02:40:48.589 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4038 Exiting" +"2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 4039 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403a Obtaining identity" +"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403b Obtaining identity" +"2019-07-20 02:40:48.590 UTC [msp] DeserializeIdentity -> DEBU 403c Obtaining identity" +"2019-07-20 02:40:48.590 UTC [gossip.comm] Send -> DEBU 403d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.590 UTC [gossip.discovery] sendMemResponse -> DEBU 403e Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " +"2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 403f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.590 UTC [gossip.comm] sendToEndpoint -> DEBU 4040 Exiting" +"2019-07-20 02:40:48.598 UTC [gossip.comm] func1 -> DEBU 4041 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.598 UTC [gossip.gossip] handleMessage -> DEBU 4042 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.598 UTC [gossip.pull] HandleMessage -> DEBU 4043 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4044 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4045 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4046 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4047 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4048 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [msp] DeserializeIdentity -> DEBU 4049 Obtaining identity" +"2019-07-20 02:40:48.598 UTC [gossip.pull] SendDigest -> DEBU 404a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:48.599 UTC [gossip.gossip] handleMessage -> DEBU 404b Exiting" +"2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404c Obtaining identity" +"2019-07-20 02:40:48.682 UTC [msp] DeserializeIdentity -> DEBU 404d Obtaining identity" +"2019-07-20 02:40:48.682 UTC [gossip.comm] Send -> DEBU 404e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 404f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4050 Exiting" +"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4051 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4052 Exiting" +"2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4053 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4054 Exiting" +"2019-07-20 02:40:48.686 UTC [gossip.comm] func1 -> DEBU 4055 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.686 UTC [gossip.gossip] handleMessage -> DEBU 4056 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.686 UTC [msp] DeserializeIdentity -> DEBU 4057 Obtaining identity" +"2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4058 Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:48.691 UTC [msp.identity] Verify -> DEBU 4059 Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405a Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:48.693 UTC [msp.identity] Verify -> DEBU 405b Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:48.694 UTC [msp] DeserializeIdentity -> DEBU 405c Obtaining identity" +"2019-07-20 02:40:48.695 UTC [msp] DeserializeIdentity -> DEBU 405d Obtaining identity" +"2019-07-20 02:40:48.695 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 405e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 405f Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.698 UTC [gossip.comm] func1 -> DEBU 4060 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.698 UTC [msp] DeserializeIdentity -> DEBU 4061 Obtaining identity" +"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4062 Obtaining identity" +"2019-07-20 02:40:48.699 UTC [gossip.comm] Send -> DEBU 4063 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4064 Obtaining identity" +"2019-07-20 02:40:48.699 UTC [msp] DeserializeIdentity -> DEBU 4065 Obtaining identity" +"2019-07-20 02:40:48.699 UTC [gossip.comm] sendToEndpoint -> DEBU 4066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4067 Exiting" +"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4068 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4069 Exiting" +"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" channel_MAC:"\357S\331\222_C\233ZV\0070\317\214V\036\235\037\334\030\032bM\017T,D*\265\376\214e\302" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-07-20 02:40:48.700 UTC [gossip.comm] sendToEndpoint -> DEBU 406b Exiting" +"2019-07-20 02:40:48.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 406c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.700 UTC [policies] Evaluate -> DEBU 406e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.701 UTC [policies] Evaluate -> DEBU 406f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4070 0xc0040e7a20 gate 1563590448701695400 evaluation starts" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4071 0xc0040e7a20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4072 0xc0040e7a20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4073 0xc0040e7a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func2 -> DEBU 4074 0xc0040e7a20 principal evaluation fails" +"2019-07-20 02:40:48.701 UTC [cauthdsl] func1 -> DEBU 4075 0xc0040e7a20 gate 1563590448701695400 evaluation fails" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4076 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4077 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4078 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4079 0xc0040fe260 gate 1563590448702099200 evaluation starts" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407a 0xc0040fe260 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407b 0xc0040fe260 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407c 0xc0040fe260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 407d 0xc0040fe260 principal evaluation fails" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 407e 0xc0040fe260 gate 1563590448702099200 evaluation fails" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 407f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4080 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4082 0xc0040feaa0 gate 1563590448702416400 evaluation starts" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4083 0xc0040feaa0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4084 0xc0040feaa0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4085 0xc0040feaa0 principal matched by identity 0" +"2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4086 Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:48.702 UTC [msp.identity] Verify -> DEBU 4087 Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func2 -> DEBU 4088 0xc0040feaa0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.702 UTC [cauthdsl] func1 -> DEBU 4089 0xc0040feaa0 gate 1563590448702416400 evaluation succeeds" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.702 UTC [policies] Evaluate -> DEBU 408c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.703 UTC [policies] Evaluate -> DEBU 408d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.703 UTC [msp] DeserializeIdentity -> DEBU 408e Obtaining identity" +"2019-07-20 02:40:48.706 UTC [msp] DeserializeIdentity -> DEBU 408f Obtaining identity" +"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4090 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4091 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4092 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4093 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4094 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.707 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.707 UTC [cauthdsl] func1 -> DEBU 4096 0xc004112270 gate 1563590448707849800 evaluation starts" +"2019-07-20 02:40:48.707 UTC [cauthdsl] func2 -> DEBU 4097 0xc004112270 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4098 0xc004112270 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 4099 0xc004112270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 409a 0xc004112270 principal evaluation fails" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409b 0xc004112270 gate 1563590448707849800 evaluation fails" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 409e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 409f 0xc004112ab0 gate 1563590448708285200 evaluation starts" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a0 0xc004112ab0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a1 0xc004112ab0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a2 0xc004112ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a3 0xc004112ab0 principal evaluation fails" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a4 0xc004112ab0 gate 1563590448708285200 evaluation fails" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.708 UTC [policies] Evaluate -> DEBU 40a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func1 -> DEBU 40a8 0xc0041132f0 gate 1563590448708639300 evaluation starts" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40a9 0xc0041132f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40aa 0xc0041132f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.708 UTC [cauthdsl] func2 -> DEBU 40ab 0xc0041132f0 principal matched by identity 0" +"2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ac Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:48.708 UTC [msp.identity] Verify -> DEBU 40ad Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:48.721 UTC [cauthdsl] func2 -> DEBU 40ae 0xc0041132f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.721 UTC [cauthdsl] func1 -> DEBU 40af 0xc0041132f0 gate 1563590448708639300 evaluation succeeds" +"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.721 UTC [policies] Evaluate -> DEBU 40b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.721 UTC [msp] DeserializeIdentity -> DEBU 40b4 Obtaining identity" +"2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.722 UTC [policies] Evaluate -> DEBU 40b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40ba 0xc0041283d0 gate 1563590448723144800 evaluation starts" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bb 0xc0041283d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bc 0xc0041283d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40bd 0xc0041283d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40be 0xc0041283d0 principal evaluation fails" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40bf 0xc0041283d0 gate 1563590448723144800 evaluation fails" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c3 0xc004128c10 gate 1563590448723461300 evaluation starts" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c4 0xc004128c10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c5 0xc004128c10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c6 0xc004128c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40c7 0xc004128c10 principal evaluation fails" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40c8 0xc004128c10 gate 1563590448723461300 evaluation fails" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40c9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.723 UTC [policies] Evaluate -> DEBU 40cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func1 -> DEBU 40cc 0xc004129450 gate 1563590448723726100 evaluation starts" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cd 0xc004129450 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40ce 0xc004129450 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.723 UTC [cauthdsl] func2 -> DEBU 40cf 0xc004129450 principal matched by identity 0" +"2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d0 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:48.723 UTC [msp.identity] Verify -> DEBU 40d1 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40d2 0xc004129450 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40d3 0xc004129450 gate 1563590448723726100 evaluation succeeds" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40d7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d8 Exiting" +"2019-07-20 02:40:48.724 UTC [gossip.gossip] handleMessage -> DEBU 40d9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40da Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:48.724 UTC [msp.identity] Verify -> DEBU 40db Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dc Obtaining identity" +"2019-07-20 02:40:48.724 UTC [msp] DeserializeIdentity -> DEBU 40dd Obtaining identity" +"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40df Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40e0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.724 UTC [policies] Evaluate -> DEBU 40e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.724 UTC [cauthdsl] func1 -> DEBU 40e4 0xc004133580 gate 1563590448724944600 evaluation starts" +"2019-07-20 02:40:48.724 UTC [cauthdsl] func2 -> DEBU 40e5 0xc004133580 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.725 UTC [cauthdsl] func2 -> DEBU 40e6 0xc004133580 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e7 0xc004133580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.726 UTC [cauthdsl] func2 -> DEBU 40e8 0xc004133580 principal evaluation fails" +"2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40e9 0xc004133580 gate 1563590448724944600 evaluation fails" +"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ea Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.727 UTC [policies] Evaluate -> DEBU 40ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.727 UTC [cauthdsl] func1 -> DEBU 40ed 0xc004133dc0 gate 1563590448727397200 evaluation starts" +"2019-07-20 02:40:48.727 UTC [cauthdsl] func2 -> DEBU 40ee 0xc004133dc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40ef 0xc004133dc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f0 0xc004133dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.728 UTC [cauthdsl] func2 -> DEBU 40f1 0xc004133dc0 principal evaluation fails" +"2019-07-20 02:40:48.728 UTC [cauthdsl] func1 -> DEBU 40f2 0xc004133dc0 gate 1563590448727397200 evaluation fails" +"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.728 UTC [policies] Evaluate -> DEBU 40f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.729 UTC [cauthdsl] func1 -> DEBU 40f6 0xc004150600 gate 1563590448728648400 evaluation starts" +"2019-07-20 02:40:48.729 UTC [cauthdsl] func2 -> DEBU 40f7 0xc004150600 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.731 UTC [cauthdsl] func2 -> DEBU 40f8 0xc004150600 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40f9 0xc004150600 principal matched by identity 0" +"2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fa Verify: digest = 00000000 d9 d9 23 75 34 ba 2e 90 3a 76 1f 5f d1 54 90 85 |..#u4...:v._.T..| +00000010 bb 79 8e 5b 65 2f 1a ad 56 3f 44 39 67 80 cc 21 |.y.[e/..V?D9g..!|" +"2019-07-20 02:40:48.732 UTC [msp.identity] Verify -> DEBU 40fb Verify: sig = 00000000 30 44 02 20 66 11 6c 38 39 36 00 19 75 39 95 b4 |0D. f.l896..u9..| +00000010 46 70 d8 20 91 bf 45 00 6b e8 9c cf ef 05 32 dd |Fp. ..E.k.....2.| +00000020 b2 9f e5 82 02 20 50 5d ac c9 35 69 78 f8 05 c3 |..... P]..5ix...| +00000030 e8 37 b3 34 07 53 be 32 02 cf f3 97 8d 9e 2e 24 |.7.4.S.2.......$| +00000040 c6 3a 0c 54 03 2f |.:.T./|" +"2019-07-20 02:40:48.732 UTC [cauthdsl] func2 -> DEBU 40fc 0xc004150600 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.732 UTC [cauthdsl] func1 -> DEBU 40fd 0xc004150600 gate 1563590448728648400 evaluation succeeds" +"2019-07-20 02:40:48.732 UTC [policies] Evaluate -> DEBU 40fe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 40ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4100 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4101 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4102 Obtaining identity" +"2019-07-20 02:40:48.733 UTC [msp] DeserializeIdentity -> DEBU 4103 Obtaining identity" +"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4104 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4105 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4106 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4107 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4108 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.733 UTC [policies] Evaluate -> DEBU 4109 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.733 UTC [cauthdsl] func1 -> DEBU 410a 0xc004151dd0 gate 1563590448733828600 evaluation starts" +"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410b 0xc004151dd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410c 0xc004151dd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410d 0xc004151dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.733 UTC [cauthdsl] func2 -> DEBU 410e 0xc004151dd0 principal evaluation fails" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 410f 0xc004151dd0 gate 1563590448733828600 evaluation fails" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4110 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4111 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4112 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4113 0xc004162610 gate 1563590448734115800 evaluation starts" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4114 0xc004162610 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4115 0xc004162610 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4116 0xc004162610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4117 0xc004162610 principal evaluation fails" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4118 0xc004162610 gate 1563590448734115800 evaluation fails" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4119 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 411b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 411c 0xc004162e50 gate 1563590448734427300 evaluation starts" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411d 0xc004162e50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411e 0xc004162e50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 411f 0xc004162e50 principal matched by identity 0" +"2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4120 Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:48.734 UTC [msp.identity] Verify -> DEBU 4121 Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func2 -> DEBU 4122 0xc004162e50 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.734 UTC [cauthdsl] func1 -> DEBU 4123 0xc004162e50 gate 1563590448734427300 evaluation succeeds" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4124 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4125 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4126 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.734 UTC [policies] Evaluate -> DEBU 4127 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4128 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:48.735 UTC [msp.identity] Verify -> DEBU 4129 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412a Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412b Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.735 UTC [policies] Evaluate -> DEBU 412e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.735 UTC [msp] DeserializeIdentity -> DEBU 412f Obtaining identity" +"2019-07-20 02:40:48.735 UTC [msp.identity] newIdentity -> DEBU 4130 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-07-20 02:40:48.735 UTC [cauthdsl] func1 -> DEBU 4131 0xc004172550 gate 1563590448735661200 evaluation starts" +"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4132 0xc004172550 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4133 0xc004172550 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4134 0xc004172550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-07-20 02:40:48.735 UTC [cauthdsl] func2 -> DEBU 4135 0xc004172550 principal evaluation fails" +"2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 4136 0xc004172550 gate 1563590448735661200 evaluation fails" +"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4137 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.738 UTC [policies] Evaluate -> DEBU 4139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.738 UTC [cauthdsl] func1 -> DEBU 413a 0xc0041736d0 gate 1563590448738604100 evaluation starts" +"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413b 0xc0041736d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 413c 0xc0041736d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 413d Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:40:48.738 UTC [msp] Validate -> DEBU 413e MSP Org1MSP validating identity" +"2019-07-20 02:40:48.738 UTC [msp] getCertificationChain -> DEBU 413f MSP Org1MSP getting certification chain" +"2019-07-20 02:40:48.738 UTC [cauthdsl] func2 -> DEBU 4140 0xc0041736d0 principal matched by identity 0" +"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4141 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 4142 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:48.739 UTC [cauthdsl] func2 -> DEBU 4143 0xc0041736d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.739 UTC [cauthdsl] func1 -> DEBU 4144 0xc0041736d0 gate 1563590448738604100 evaluation succeeds" +"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4145 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4146 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4147 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.739 UTC [policies] Evaluate -> DEBU 4148 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 4149 Exiting" +"2019-07-20 02:40:48.739 UTC [gossip.gossip] handleMessage -> DEBU 414a Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.739 UTC [msp] DeserializeIdentity -> DEBU 414b Obtaining identity" +"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414c Verify: digest = 00000000 16 b6 e3 42 24 40 ef 11 13 cc 2d 5a d1 1b 56 98 |...B$@....-Z..V.| +00000010 02 5c 5c 42 f9 05 4c 40 fb 3b 8c 58 1a 28 cb bd |.\\B..L@.;.X.(..|" +"2019-07-20 02:40:48.739 UTC [msp.identity] Verify -> DEBU 414d Verify: sig = 00000000 30 45 02 21 00 ec 67 d7 b2 1c 42 29 a3 5a e0 f7 |0E.!..g...B).Z..| +00000010 0c fb 3e 9f 47 c5 c9 2f de 20 2e d2 6b 4c 52 2b |..>.G../. ..kLR+| +00000020 4b d8 5f 47 b4 02 20 7b 54 98 34 7c ed 0e 62 50 |K._G.. {T.4|..bP| +00000030 d4 f2 c2 62 39 df fb a3 3a e9 16 72 6c 04 0b 3b |...b9...:..rl..;| +00000040 99 38 53 a7 74 6b 6d |.8S.tkm|" +"2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414e Verify: digest = 00000000 a3 c6 5d 24 ff bf 2f fa 4d ab b6 f0 71 94 2e a4 |..]$../.M...q...| +00000010 cc d5 ce 38 e5 c4 64 de 8f ec e3 48 d8 b3 cf 15 |...8..d....H....|" +"2019-07-20 02:40:48.740 UTC [msp.identity] Verify -> DEBU 414f Verify: sig = 00000000 30 45 02 21 00 ea 00 df d3 c2 83 28 0e 62 29 6b |0E.!.......(.b)k| +00000010 c3 c6 bd 17 8d 33 a1 2e 85 df c3 62 9c 4c 65 a1 |.....3.....b.Le.| +00000020 b9 39 46 f1 4b 02 20 28 d8 56 36 6e b9 18 91 18 |.9F.K. (.V6n....| +00000030 24 b0 b1 99 50 e9 d4 8a d2 a9 9c b4 38 52 9d 89 |$...P.......8R..| +00000040 74 6b 25 7e d3 af 5a |tk%~..Z|" +"2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4150 Obtaining identity" +"2019-07-20 02:40:48.740 UTC [msp] DeserializeIdentity -> DEBU 4151 Obtaining identity" +"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4152 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4153 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4154 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4158 0xc0041a23a0 gate 1563590448740710900 evaluation starts" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4159 0xc0041a23a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415a 0xc0041a23a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415b 0xc0041a23a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 415c 0xc0041a23a0 principal evaluation fails" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 415d 0xc0041a23a0 gate 1563590448740710900 evaluation fails" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 415f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.740 UTC [policies] Evaluate -> DEBU 4160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func1 -> DEBU 4161 0xc0041a2be0 gate 1563590448740959800 evaluation starts" +"2019-07-20 02:40:48.740 UTC [cauthdsl] func2 -> DEBU 4162 0xc0041a2be0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4163 0xc0041a2be0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4164 0xc0041a2be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4165 0xc0041a2be0 principal evaluation fails" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4166 0xc0041a2be0 gate 1563590448740959800 evaluation fails" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4167 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4168 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 416a 0xc0041a3420 gate 1563590448741207600 evaluation starts" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416b 0xc0041a3420 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416c 0xc0041a3420 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 416d 0xc0041a3420 principal matched by identity 0" +"2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416e Verify: digest = 00000000 d8 9b f6 6b a4 ec ab 06 75 c3 cd 17 cd 63 1b 29 |...k....u....c.)| +00000010 55 13 b8 6e 98 c1 5c 0d 4a a7 85 e7 8b 3f 60 fa |U..n..\.J....?`.|" +"2019-07-20 02:40:48.741 UTC [msp.identity] Verify -> DEBU 416f Verify: sig = 00000000 30 44 02 20 2d 95 09 38 85 29 c9 ab df f0 00 e8 |0D. -..8.)......| +00000010 5a 5a 18 64 49 53 46 cd 89 4a 6c 78 92 4c a3 82 |ZZ.dISF..Jlx.L..| +00000020 97 71 9b 5e 02 20 29 6f 98 16 b1 e1 41 5a 98 a6 |.q.^. )o....AZ..| +00000030 c7 1d 5c c2 ca fe cf 02 93 77 0f fb 1d 1d 54 2f |..\......w....T/| +00000040 5d 44 00 4b 5c 2a |]D.K\*|" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func2 -> DEBU 4170 0xc0041a3420 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.741 UTC [cauthdsl] func1 -> DEBU 4171 0xc0041a3420 gate 1563590448741207600 evaluation succeeds" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4172 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4173 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4174 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.741 UTC [policies] Evaluate -> DEBU 4175 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" +"2019-07-20 02:40:48.741 UTC [msp] DeserializeIdentity -> DEBU 4177 Obtaining identity" +"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4178 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.742 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 417e 0xc0041b2bf0 gate 1563590448742219200 evaluation starts" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 417f 0xc0041b2bf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4180 0xc0041b2bf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4181 0xc0041b2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4182 0xc0041b2bf0 principal evaluation fails" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4183 0xc0041b2bf0 gate 1563590448742219200 evaluation fails" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4187 0xc0041b3430 gate 1563590448742640000 evaluation starts" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4188 0xc0041b3430 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4189 0xc0041b3430 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418a 0xc0041b3430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 418b 0xc0041b3430 principal evaluation fails" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 418c 0xc0041b3430 gate 1563590448742640000 evaluation fails" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.742 UTC [policies] Evaluate -> DEBU 418f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func1 -> DEBU 4190 0xc0041b3c70 gate 1563590448742879200 evaluation starts" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4191 0xc0041b3c70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4192 0xc0041b3c70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.742 UTC [cauthdsl] func2 -> DEBU 4193 0xc0041b3c70 principal matched by identity 0" +"2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4194 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:48.743 UTC [msp.identity] Verify -> DEBU 4195 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 4196 0xc0041b3c70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 4197 0xc0041b3c70 gate 1563590448742879200 evaluation succeeds" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4198 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 4199 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.744 UTC [msp] DeserializeIdentity -> DEBU 419c Obtaining identity" +"2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 419e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 419f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a2 0xc0041c6d50 gate 1563590448744544700 evaluation starts" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a3 0xc0041c6d50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a4 0xc0041c6d50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a5 0xc0041c6d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41a6 0xc0041c6d50 principal evaluation fails" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41a7 0xc0041c6d50 gate 1563590448744544700 evaluation fails" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41ab 0xc0041c7590 gate 1563590448744793600 evaluation starts" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ac 0xc0041c7590 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ad 0xc0041c7590 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41ae 0xc0041c7590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func2 -> DEBU 41af 0xc0041c7590 principal evaluation fails" +"2019-07-20 02:40:48.744 UTC [cauthdsl] func1 -> DEBU 41b0 0xc0041c7590 gate 1563590448744793600 evaluation fails" +"2019-07-20 02:40:48.744 UTC [policies] Evaluate -> DEBU 41b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:48.745 UTC [policies] Evaluate -> DEBU 41b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:48.745 UTC [cauthdsl] func1 -> DEBU 41b4 0xc0041c7dd0 gate 1563590448745079700 evaluation starts" +"2019-07-20 02:40:48.745 UTC [cauthdsl] func2 -> DEBU 41b5 0xc0041c7dd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b6 0xc0041c7dd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:48.746 UTC [cauthdsl] func2 -> DEBU 41b7 0xc0041c7dd0 principal matched by identity 0" +"2019-07-20 02:40:48.746 UTC [msp.identity] Verify -> DEBU 41b8 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:48.747 UTC [msp.identity] Verify -> DEBU 41b9 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:48.747 UTC [cauthdsl] func2 -> DEBU 41ba 0xc0041c7dd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:48.747 UTC [cauthdsl] func1 -> DEBU 41bb 0xc0041c7dd0 gate 1563590448745079700 evaluation succeeds" +"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41be Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:48.747 UTC [policies] Evaluate -> DEBU 41bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:48.747 UTC [gossip.gossip] handleMessage -> DEBU 41c0 Exiting" +"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c1 Obtaining identity" +"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c2 Obtaining identity" +"2019-07-20 02:40:48.755 UTC [gossip.pull] Hello -> DEBU 41c3 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c4 Obtaining identity" +"2019-07-20 02:40:48.755 UTC [msp] DeserializeIdentity -> DEBU 41c5 Obtaining identity" +"2019-07-20 02:40:48.756 UTC [gossip.comm] Send -> DEBU 41c6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.756 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" +"2019-07-20 02:40:48.757 UTC [gossip.gossip] handleMessage -> DEBU 41c9 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.758 UTC [gossip.pull] HandleMessage -> DEBU 41ca GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.758 UTC [gossip.gossip] handleMessage -> DEBU 41cb Exiting" +"2019-07-20 02:40:48.842 UTC [gossip.gossip] handleMessage -> DEBU 41cc Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41cd Obtaining identity" +"2019-07-20 02:40:48.844 UTC [msp] DeserializeIdentity -> DEBU 41ce Obtaining identity" +"2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41cf Exiting" +"2019-07-20 02:40:48.850 UTC [gossip.gossip] handleMessage -> DEBU 41d0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.852 UTC [gossip.comm] func1 -> DEBU 41d1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d2 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:48.853 UTC [msp.identity] Verify -> DEBU 41d3 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d4 Exiting" +"2019-07-20 02:40:48.855 UTC [gossip.gossip] handleMessage -> DEBU 41d5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d6 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:48.856 UTC [msp.identity] Verify -> DEBU 41d7 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:48.857 UTC [msp] DeserializeIdentity -> DEBU 41d8 Obtaining identity" +"2019-07-20 02:40:48.857 UTC [gossip.gossip] handleMessage -> DEBU 41d9 Exiting" +"2019-07-20 02:40:48.859 UTC [gossip.comm] func1 -> DEBU 41da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.861 UTC [gossip.gossip] handleMessage -> DEBU 41db Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" channel_MAC:"\001\024\371\325\024xq\245\236HZ3a\263H\376T\323I\355\212\321#\245P\245\263=2\376n\371" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dc Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:48.861 UTC [msp.identity] Verify -> DEBU 41dd Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:48.862 UTC [msp] DeserializeIdentity -> DEBU 41de Obtaining identity" +"2019-07-20 02:40:48.862 UTC [gossip.gossip] handleMessage -> DEBU 41df Exiting" +"2019-07-20 02:40:48.899 UTC [gossip.gossip] handleMessage -> DEBU 41e0 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.900 UTC [gossip.pull] HandleMessage -> DEBU 41e1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:48.901 UTC [gossip.pull] SendDigest -> DEBU 41e2 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:48.901 UTC [gossip.gossip] handleMessage -> DEBU 41e3 Exiting" +"2019-07-20 02:40:49.008 UTC [gossip.comm] func1 -> DEBU 41e4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:49.009 UTC [gossip.gossip] handleMessage -> DEBU 41e5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:49.009 UTC [msp] DeserializeIdentity -> DEBU 41e6 Obtaining identity" +"2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e7 Obtaining identity" +"2019-07-20 02:40:49.010 UTC [msp] DeserializeIdentity -> DEBU 41e8 Obtaining identity" +"2019-07-20 02:40:49.010 UTC [gossip.gossip] handleMessage -> DEBU 41e9 Exiting" +"2019-07-20 02:40:49.013 UTC [gossip.comm] func1 -> DEBU 41ea Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.013 UTC [gossip.gossip] handleMessage -> DEBU 41eb Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.014 UTC [msp] DeserializeIdentity -> DEBU 41ec Obtaining identity" +"2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:49.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.015 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.015 UTC [policies] Evaluate -> DEBU 41f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.015 UTC [cauthdsl] func1 -> DEBU 41f3 0xc00421c6e0 gate 1563590449015768400 evaluation starts" +"2019-07-20 02:40:49.015 UTC [cauthdsl] func2 -> DEBU 41f4 0xc00421c6e0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f5 0xc00421c6e0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f6 0xc00421c6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:49.016 UTC [cauthdsl] func2 -> DEBU 41f7 0xc00421c6e0 principal evaluation fails" +"2019-07-20 02:40:49.016 UTC [cauthdsl] func1 -> DEBU 41f8 0xc00421c6e0 gate 1563590449015768400 evaluation fails" +"2019-07-20 02:40:49.016 UTC [policies] Evaluate -> DEBU 41f9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.017 UTC [policies] Evaluate -> DEBU 41fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.017 UTC [cauthdsl] func1 -> DEBU 41fc 0xc00421cf20 gate 1563590449017318300 evaluation starts" +"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fd 0xc00421cf20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41fe 0xc00421cf20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 41ff 0xc00421cf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:49.017 UTC [cauthdsl] func2 -> DEBU 4200 0xc00421cf20 principal evaluation fails" +"2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4201 0xc00421cf20 gate 1563590449017318300 evaluation fails" +"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4202 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.018 UTC [policies] Evaluate -> DEBU 4204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.018 UTC [cauthdsl] func1 -> DEBU 4205 0xc00421d760 gate 1563590449018686100 evaluation starts" +"2019-07-20 02:40:49.018 UTC [cauthdsl] func2 -> DEBU 4206 0xc00421d760 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4207 0xc00421d760 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.019 UTC [cauthdsl] func2 -> DEBU 4208 0xc00421d760 principal matched by identity 0" +"2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 4209 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:49.019 UTC [msp.identity] Verify -> DEBU 420a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:49.020 UTC [cauthdsl] func2 -> DEBU 420b 0xc00421d760 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.020 UTC [cauthdsl] func1 -> DEBU 420c 0xc00421d760 gate 1563590449018686100 evaluation succeeds" +"2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.020 UTC [policies] Evaluate -> DEBU 420e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:49.021 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.021 UTC [msp] DeserializeIdentity -> DEBU 4211 Obtaining identity" +"2019-07-20 02:40:49.021 UTC [gossip.gossip] handleMessage -> DEBU 4212 Exiting" +"2019-07-20 02:40:49.022 UTC [gossip.comm] func1 -> DEBU 4213 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.022 UTC [gossip.gossip] handleMessage -> DEBU 4214 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" channel_MAC:"\235\264\342\201}%OB^u2\263d1\250\270|e\304\272U\320\244\000\354kU\036\360.\304E" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.022 UTC [msp] DeserializeIdentity -> DEBU 4215 Obtaining identity" +"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4216 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4217 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4218 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 4219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.023 UTC [policies] Evaluate -> DEBU 421b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.023 UTC [cauthdsl] func1 -> DEBU 421c 0xc00422d230 gate 1563590449023690300 evaluation starts" +"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421d 0xc00422d230 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421e 0xc00422d230 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.023 UTC [cauthdsl] func2 -> DEBU 421f 0xc00422d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4220 0xc00422d230 principal evaluation fails" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4221 0xc00422d230 gate 1563590449023690300 evaluation fails" +"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4222 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4223 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.024 UTC [policies] Evaluate -> DEBU 4224 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func1 -> DEBU 4225 0xc00422da70 gate 1563590449024695200 evaluation starts" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4226 0xc00422da70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4227 0xc00422da70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.024 UTC [cauthdsl] func2 -> DEBU 4228 0xc00422da70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4229 0xc00422da70 principal evaluation fails" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422a 0xc00422da70 gate 1563590449024695200 evaluation fails" +"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.025 UTC [policies] Evaluate -> DEBU 422d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func1 -> DEBU 422e 0xc0042442b0 gate 1563590449025626500 evaluation starts" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 422f 0xc0042442b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4230 0xc0042442b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.025 UTC [cauthdsl] func2 -> DEBU 4231 0xc0042442b0 principal matched by identity 0" +"2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4232 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:49.026 UTC [msp.identity] Verify -> DEBU 4233 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:49.027 UTC [cauthdsl] func2 -> DEBU 4234 0xc0042442b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.027 UTC [cauthdsl] func1 -> DEBU 4235 0xc0042442b0 gate 1563590449025626500 evaluation succeeds" +"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4236 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4237 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4238 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:49.027 UTC [policies] Evaluate -> DEBU 4239 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.027 UTC [msp] DeserializeIdentity -> DEBU 423a Obtaining identity" +"2019-07-20 02:40:49.027 UTC [gossip.gossip] handleMessage -> DEBU 423b Exiting" +"2019-07-20 02:40:49.146 UTC [gossip.comm] func1 -> DEBU 423c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:49.147 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:49.147 UTC [msp] DeserializeIdentity -> DEBU 423e Obtaining identity" +"2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 423f Obtaining identity" +"2019-07-20 02:40:49.148 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" +"2019-07-20 02:40:49.148 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" +"2019-07-20 02:40:49.159 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.159 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" channel_MAC:"\221\203\374\270\341\303\211\366\313L\n7\002\333b\272W\035\374\237\010\to\025\263\311\360Vh\315\210_" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-07-20 02:40:49.160 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" +"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4245 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4246 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.161 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4248 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 4249 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:49.162 UTC [policies] Evaluate -> DEBU 424a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:49.162 UTC [cauthdsl] func1 -> DEBU 424b 0xc004245d80 gate 1563590449162855900 evaluation starts" +"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424c 0xc004245d80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424d 0xc004245d80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.163 UTC [cauthdsl] func2 -> DEBU 424e 0xc004245d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:49.164 UTC [cauthdsl] func2 -> DEBU 424f 0xc004245d80 principal evaluation fails" +"2019-07-20 02:40:49.164 UTC [cauthdsl] func1 -> DEBU 4250 0xc004245d80 gate 1563590449162855900 evaluation fails" +"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4251 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4252 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:49.164 UTC [policies] Evaluate -> DEBU 4253 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:49.165 UTC [cauthdsl] func1 -> DEBU 4254 0xc00426a5c0 gate 1563590449165223100 evaluation starts" +"2019-07-20 02:40:49.165 UTC [cauthdsl] func2 -> DEBU 4255 0xc00426a5c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4256 0xc00426a5c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4257 0xc00426a5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:49.166 UTC [cauthdsl] func2 -> DEBU 4258 0xc00426a5c0 principal evaluation fails" +"2019-07-20 02:40:49.166 UTC [cauthdsl] func1 -> DEBU 4259 0xc00426a5c0 gate 1563590449165223100 evaluation fails" +"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:49.167 UTC [policies] Evaluate -> DEBU 425c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:49.168 UTC [cauthdsl] func1 -> DEBU 425d 0xc00426ae00 gate 1563590449168326000 evaluation starts" +"2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425e 0xc00426ae00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:49.168 UTC [cauthdsl] func2 -> DEBU 425f 0xc00426ae00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:49.169 UTC [cauthdsl] func2 -> DEBU 4260 0xc00426ae00 principal matched by identity 0" +"2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4261 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:49.169 UTC [msp.identity] Verify -> DEBU 4262 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:49.170 UTC [cauthdsl] func2 -> DEBU 4263 0xc00426ae00 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:49.170 UTC [cauthdsl] func1 -> DEBU 4264 0xc00426ae00 gate 1563590449168326000 evaluation succeeds" +"2019-07-20 02:40:49.170 UTC [policies] Evaluate -> DEBU 4265 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4267 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:49.171 UTC [policies] Evaluate -> DEBU 4268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:49.172 UTC [msp] DeserializeIdentity -> DEBU 4269 Obtaining identity" +"2019-07-20 02:40:49.172 UTC [gossip.gossip] handleMessage -> DEBU 426a Exiting" +"2019-07-20 02:40:51.933 UTC [gossip.comm] func1 -> DEBU 426b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.933 UTC [gossip.gossip] handleMessage -> DEBU 426d Exiting" +"2019-07-20 02:40:51.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 426e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 426f Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:51.934 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" +"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:51.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:51.934 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:51.934 UTC [cauthdsl] func1 -> DEBU 4277 0xc0042881f0 gate 1563590451934376800 evaluation starts" +"2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4278 0xc0042881f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.934 UTC [cauthdsl] func2 -> DEBU 4279 0xc0042881f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427a 0xc0042881f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:51.938 UTC [cauthdsl] func2 -> DEBU 427b 0xc0042881f0 principal evaluation fails" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 427c 0xc0042881f0 gate 1563590451934376800 evaluation fails" +"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 427f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4280 0xc004288a30 gate 1563590451939377300 evaluation starts" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4281 0xc004288a30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4282 0xc004288a30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4283 0xc004288a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func2 -> DEBU 4284 0xc004288a30 principal evaluation fails" +"2019-07-20 02:40:51.939 UTC [cauthdsl] func1 -> DEBU 4285 0xc004288a30 gate 1563590451939377300 evaluation fails" +"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4286 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:51.939 UTC [policies] Evaluate -> DEBU 4287 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4288 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4289 0xc004289270 gate 1563590451940033300 evaluation starts" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428a 0xc004289270 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428b 0xc004289270 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428c 0xc004289270 principal matched by identity 0" +"2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428d Verify: digest = 00000000 fe b5 10 6f 4b 6c 86 45 a2 e0 2d f2 5e ee 45 a8 |...oKl.E..-.^.E.| +00000010 c3 67 ab 53 5c a7 f3 35 ea 66 82 2a c9 1a b1 e5 |.g.S\..5.f.*....|" +"2019-07-20 02:40:51.940 UTC [msp.identity] Verify -> DEBU 428e Verify: sig = 00000000 30 44 02 20 49 3a 0d e2 dd 57 ea c9 f8 6c bb 8b |0D. I:...W...l..| +00000010 b0 df f7 01 71 8e b4 67 e0 85 ba cc 62 62 0c 00 |....q..g....bb..| +00000020 bf 58 f7 72 02 20 10 4b 5b d0 1d 18 dd 6e 7f 09 |.X.r. .K[....n..| +00000030 a8 5a 2d a2 67 fa a0 ce a3 55 74 79 9f 76 b9 86 |.Z-.g....Uty.v..| +00000040 0d f5 5a 69 c7 57 |..Zi.W|" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func2 -> DEBU 428f 0xc004289270 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:51.940 UTC [cauthdsl] func1 -> DEBU 4290 0xc004289270 gate 1563590451940033300 evaluation succeeds" +"2019-07-20 02:40:51.940 UTC [policies] Evaluate -> DEBU 4291 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4292 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4293 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:51.941 UTC [policies] Evaluate -> DEBU 4294 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:51.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 4295 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4296 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4297 updating membership: timestamp: " +"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4298 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 4299 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:51.948 UTC [gossip.discovery] learnExistingMembers -> DEBU 429a Exiting" +"2019-07-20 02:40:51.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 429b Exiting" +"2019-07-20 02:40:51.948 UTC [gossip.discovery] sendMemResponse -> DEBU 429c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429d Obtaining identity" +"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429e Obtaining identity" +"2019-07-20 02:40:51.949 UTC [msp] DeserializeIdentity -> DEBU 429f Obtaining identity" +"2019-07-20 02:40:51.949 UTC [gossip.comm] Send -> DEBU 42a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:51.949 UTC [gossip.discovery] sendMemResponse -> DEBU 42a1 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\0208" signature:"0E\002!\000\311(\323\tz\256\024\220;b\276o\256z\361`Q\030\341nb~E\005RE\005V|\375\230\272\002 \027oR\301)\224\231\337\275\251xP\255\303n\337l\313\203\3715\356\205\267\222x\373u\352\3016\314" > alive:\212l9m\360\257\237\214" > alive: alive: " +"2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.949 UTC [gossip.comm] sendToEndpoint -> DEBU 42a3 Exiting" +"2019-07-20 02:40:51.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a4 Exiting" +"2019-07-20 02:40:51.951 UTC [gossip.comm] func1 -> DEBU 42a5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.951 UTC [gossip.gossip] handleMessage -> DEBU 42a6 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.952 UTC [gossip.pull] HandleMessage -> DEBU 42a7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a8 Obtaining identity" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42a9 Obtaining identity" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42aa Obtaining identity" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ab Obtaining identity" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ac Obtaining identity" +"2019-07-20 02:40:51.952 UTC [msp] DeserializeIdentity -> DEBU 42ad Obtaining identity" +"2019-07-20 02:40:51.952 UTC [gossip.pull] SendDigest -> DEBU 42ae Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:51.952 UTC [gossip.gossip] handleMessage -> DEBU 42af Exiting" +"2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b0 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:51.980 UTC [gossip.election] IsLeader -> DEBU 42b1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:51.980 UTC [msp] GetDefaultSigningIdentity -> DEBU 42b2 Obtaining default signing identity" +"2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD915100F1801 " +"2019-07-20 02:40:51.980 UTC [msp.identity] Sign -> DEBU 42b4 Sign: digest: 856682469DC7D1E9347963F414AE0038209189ADEBB806E700FC601EF802B0D4 " +"2019-07-20 02:40:51.980 UTC [gossip.election] waitForInterrupt -> DEBU 42b5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b6 Obtaining identity" +"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b7 Obtaining identity" +"2019-07-20 02:40:51.983 UTC [msp] DeserializeIdentity -> DEBU 42b8 Obtaining identity" +"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42b9 Obtaining identity" +"2019-07-20 02:40:51.984 UTC [gossip.comm] Send -> DEBU 42ba Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bb Obtaining identity" +"2019-07-20 02:40:51.984 UTC [msp] DeserializeIdentity -> DEBU 42bc Obtaining identity" +"2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.984 UTC [gossip.comm] sendToEndpoint -> DEBU 42be Exiting" +"2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.992 UTC [gossip.gossip] handleMessage -> DEBU 42c0 Exiting" +"2019-07-20 02:40:51.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.992 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 42c2 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:51.992 UTC [msp] DeserializeIdentity -> DEBU 42c3 Obtaining identity" +"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:51.993 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:51.993 UTC [policies] Evaluate -> DEBU 42c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:51.993 UTC [cauthdsl] func1 -> DEBU 42ca 0xc0042c8620 gate 1563590451993384600 evaluation starts" +"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0042c8620 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0042c8620 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42cd 0xc0042c8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:51.993 UTC [cauthdsl] func2 -> DEBU 42ce 0xc0042c8620 principal evaluation fails" +"2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42cf 0xc0042c8620 gate 1563590451993384600 evaluation fails" +"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:51.995 UTC [policies] Evaluate -> DEBU 42d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:51.995 UTC [cauthdsl] func1 -> DEBU 42d3 0xc0042c8e60 gate 1563590451995584800 evaluation starts" +"2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0042c8e60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.995 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0042c8e60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d6 0xc0042c8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42d7 0xc0042c8e60 principal evaluation fails" +"2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42d8 0xc0042c8e60 gate 1563590451995584800 evaluation fails" +"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42d9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:51.996 UTC [policies] Evaluate -> DEBU 42db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:51.996 UTC [cauthdsl] func1 -> DEBU 42dc 0xc0042c96a0 gate 1563590451996956400 evaluation starts" +"2019-07-20 02:40:51.996 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0042c96a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42de 0xc0042c96a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42df 0xc0042c96a0 principal matched by identity 0" +"2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e0 Verify: digest = 00000000 07 65 f8 b1 46 c6 71 bc 91 63 50 c6 61 e6 b3 0b |.e..F.q..cP.a...| +00000010 a3 db 09 f6 ea e5 83 3f 51 8b 3e fc 4c 29 55 92 |.......?Q.>.L)U.|" +"2019-07-20 02:40:51.997 UTC [msp.identity] Verify -> DEBU 42e1 Verify: sig = 00000000 30 45 02 21 00 d4 75 c4 4b 1d b3 ed 99 a8 76 08 |0E.!..u.K.....v.| +00000010 1a 73 87 c0 4c f3 1d d3 80 c8 f5 bd 83 b8 96 64 |.s..L..........d| +00000020 b0 85 bf 62 5c 02 20 64 c7 e6 be ea c5 6b ca bf |...b\. d.....k..| +00000030 bc f6 48 a6 f1 ce a6 12 ff 4f 6b 90 22 f4 d5 2b |..H......Ok."..+| +00000040 f8 91 6e 2e f1 09 c8 |..n....|" +"2019-07-20 02:40:51.997 UTC [cauthdsl] func2 -> DEBU 42e2 0xc0042c96a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:51.997 UTC [cauthdsl] func1 -> DEBU 42e3 0xc0042c96a0 gate 1563590451996956400 evaluation succeeds" +"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:51.997 UTC [policies] Evaluate -> DEBU 42e7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:51.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 42e8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42e9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ea updating membership: timestamp: " +"2019-07-20 02:40:51.998 UTC [gossip.comm] func1 -> DEBU 42eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.998 UTC [gossip.gossip] handleMessage -> DEBU 42ec Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.999 UTC [gossip.comm] func1 -> DEBU 42ed Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:51.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ee Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42ef Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:52.000 UTC [gossip.discovery] learnExistingMembers -> DEBU 42f0 Exiting" +"2019-07-20 02:40:52.000 UTC [gossip.discovery] handleAliveMessage -> DEBU 42f1 Exiting" +"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f2 Exiting" +"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f4 Exiting" +"2019-07-20 02:40:52.001 UTC [gossip.gossip] handleMessage -> DEBU 42f5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f6 Exiting" +"2019-07-20 02:40:52.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.002 UTC [gossip.gossip] handleMessage -> DEBU 42f8 Exiting" +"2019-07-20 02:40:52.002 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42f9 Exiting" +"2019-07-20 02:40:52.009 UTC [msp] DeserializeIdentity -> DEBU 42fa Obtaining identity" +"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fb Obtaining identity" +"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fc Obtaining identity" +"2019-07-20 02:40:52.010 UTC [msp] DeserializeIdentity -> DEBU 42fd Obtaining identity" +"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42fe Obtaining identity" +"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 42ff Obtaining identity" +"2019-07-20 02:40:52.011 UTC [msp] DeserializeIdentity -> DEBU 4300 Obtaining identity" +"2019-07-20 02:40:52.012 UTC [gossip.comm] Send -> DEBU 4301 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4302 Obtaining identity" +"2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4303 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.012 UTC [gossip.comm] sendToEndpoint -> DEBU 4304 Exiting" +"2019-07-20 02:40:52.012 UTC [msp] DeserializeIdentity -> DEBU 4305 Obtaining identity" +"2019-07-20 02:40:52.013 UTC [gossip.comm] Send -> DEBU 4306 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4307 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.014 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Exiting" +"2019-07-20 02:40:52.237 UTC [gossip.pull] Hello -> DEBU 4309 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.242 UTC [gossip.pull] Hello -> DEBU 430d Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:52.242 UTC [gossip.comm] Send -> DEBU 430e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.242 UTC [gossip.comm] sendToEndpoint -> DEBU 430f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4310 Exiting" +"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4311 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4312 Exiting" +"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4313 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.243 UTC [gossip.comm] sendToEndpoint -> DEBU 4314 Exiting" +"2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4315 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.246 UTC [gossip.pull] HandleMessage -> DEBU 4316 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.246 UTC [gossip.gossip] handleMessage -> DEBU 4317 Exiting" +"2019-07-20 02:40:52.246 UTC [gossip.comm] func1 -> DEBU 4318 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 4319 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.249 UTC [gossip.pull] HandleMessage -> DEBU 431a GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.249 UTC [gossip.gossip] handleMessage -> DEBU 431b Exiting" +"2019-07-20 02:40:52.251 UTC [gossip.comm] func1 -> DEBU 431c Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.251 UTC [gossip.pull] HandleMessage -> DEBU 431e GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.251 UTC [gossip.gossip] handleMessage -> DEBU 431f Exiting" +"2019-07-20 02:40:52.280 UTC [msp] GetDefaultSigningIdentity -> DEBU 4320 Obtaining default signing identity" +"2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4321 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151032 " +"2019-07-20 02:40:52.280 UTC [msp.identity] Sign -> DEBU 4322 Sign: digest: 9C399936F2F49BE9EE217CAB54B263EC9A942EB44DBB2EC94B19A5389E400421 " +"2019-07-20 02:40:52.281 UTC [msp] GetDefaultSigningIdentity -> DEBU 4323 Obtaining default signing identity" +"2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4324 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:52.281 UTC [msp.identity] Sign -> DEBU 4325 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4326 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4327 Obtaining identity" +"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 4328 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.281 UTC [msp] DeserializeIdentity -> DEBU 4329 Obtaining identity" +"2019-07-20 02:40:52.281 UTC [gossip.comm] Send -> DEBU 432a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.281 UTC [gossip.comm] sendToEndpoint -> DEBU 432c Exiting" +"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432e Exiting" +"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 432f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.282 UTC [gossip.comm] sendToEndpoint -> DEBU 4330 Exiting" +"2019-07-20 02:40:52.284 UTC [gossip.comm] func1 -> DEBU 4331 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4332 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4333 Exiting" +"2019-07-20 02:40:52.285 UTC [gossip.gossip] handleMessage -> DEBU 4334 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.285 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4335 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4336 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:52.286 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4338 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +"2019-07-20 02:40:52.287 UTC [msp.identity] Verify -> DEBU 4339 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +00000040 ca ca 4e 05 58 db b7 |..N.X..|" +"2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.287 UTC [gossip.discovery] isSentByMe -> DEBU 433b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.287 UTC [gossip.discovery] handleAliveMessage -> DEBU 433c Exiting" +"2019-07-20 02:40:52.287 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433d Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:52.288 UTC [msp] DeserializeIdentity -> DEBU 433e Obtaining identity" +"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 433f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4340 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4341 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4342 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4343 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 4344 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 4345 0xc00432a3d0 gate 1563590452288537200 evaluation starts" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4346 0xc00432a3d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4347 0xc00432a3d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4348 0xc00432a3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func2 -> DEBU 4349 0xc00432a3d0 principal evaluation fails" +"2019-07-20 02:40:52.288 UTC [cauthdsl] func1 -> DEBU 434a 0xc00432a3d0 gate 1563590452288537200 evaluation fails" +"2019-07-20 02:40:52.288 UTC [policies] Evaluate -> DEBU 434b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 434d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 434e 0xc00432ac10 gate 1563590452289139200 evaluation starts" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 434f 0xc00432ac10 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4350 0xc00432ac10 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4351 0xc00432ac10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func2 -> DEBU 4352 0xc00432ac10 principal evaluation fails" +"2019-07-20 02:40:52.289 UTC [cauthdsl] func1 -> DEBU 4353 0xc00432ac10 gate 1563590452289139200 evaluation fails" +"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4354 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4355 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.289 UTC [policies] Evaluate -> DEBU 4356 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.290 UTC [cauthdsl] func1 -> DEBU 4357 0xc00432b450 gate 1563590452290015700 evaluation starts" +"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4358 0xc00432b450 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 4359 0xc00432b450 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.294 UTC [cauthdsl] func2 -> DEBU 435a 0xc00432b450 principal matched by identity 0" +"2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435b Verify: digest = 00000000 c8 4a ac 4f 71 b3 e4 bd 69 2d bb e2 b3 7b 75 dc |.J.Oq...i-...{u.| +00000010 48 0d 1e cf 11 6d 74 d5 b2 c3 cb b7 9b a1 47 43 |H....mt.......GC|" +"2019-07-20 02:40:52.294 UTC [msp.identity] Verify -> DEBU 435c Verify: sig = 00000000 30 45 02 21 00 b8 46 89 61 0a 7f 6e 80 cd cd 78 |0E.!..F.a..n...x| +00000010 c4 0f 6b 13 9a 5f 51 fc 0f 48 3b 47 47 6a 34 ea |..k.._Q..H;GGj4.| +00000020 c9 87 9f 2b 44 02 20 07 f5 8d a1 90 91 28 70 9a |...+D. ......(p.| +00000030 c7 d4 e1 19 a0 0f 1a f1 78 05 1e 8a 3a 1c 3e 8a |........x...:.>.| +00000040 6c 39 6d f0 af 9f 8c |l9m....|" +"2019-07-20 02:40:52.294 UTC [msp] GetDefaultSigningIdentity -> DEBU 435d Obtaining default signing identity" +"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151033 " +"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 435f Sign: digest: 56A37E8BD80FA015C713558FB7A1BEA1925B1592315D72A856BE5481C7611A3C " +"2019-07-20 02:40:52.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4360 Obtaining default signing identity" +"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4361 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:52.295 UTC [msp.identity] Sign -> DEBU 4362 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:52.295 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4363 Sleeping 5s" +"2019-07-20 02:40:52.295 UTC [cauthdsl] func2 -> DEBU 4364 0xc00432b450 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.296 UTC [cauthdsl] func1 -> DEBU 4365 0xc00432b450 gate 1563590452290015700 evaluation succeeds" +"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4368 Obtaining identity" +"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 4369 Obtaining identity" +"2019-07-20 02:40:52.296 UTC [msp] DeserializeIdentity -> DEBU 436a Obtaining identity" +"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.297 UTC [msp] DeserializeIdentity -> DEBU 436d Obtaining identity" +"2019-07-20 02:40:52.297 UTC [gossip.comm] Send -> DEBU 436e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 436f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4370 Exiting" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4371 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4372 Exiting" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4373 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.297 UTC [gossip.comm] sendToEndpoint -> DEBU 4374 Exiting" +"2019-07-20 02:40:52.296 UTC [policies] Evaluate -> DEBU 4375 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.303 UTC [policies] Evaluate -> DEBU 4376 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4377 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.307 UTC [gossip.discovery] handleAliveMessage -> DEBU 4378 Exiting" +"2019-07-20 02:40:52.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4379 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437a Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +"2019-07-20 02:40:52.308 UTC [msp.identity] Verify -> DEBU 437b Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437c Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleAliveMessage -> DEBU 437d Exiting" +"2019-07-20 02:40:52.308 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437e Exiting" +"2019-07-20 02:40:52.309 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.309 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4380 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4381 Exiting" +"2019-07-20 02:40:52.309 UTC [gossip.gossip] handleMessage -> DEBU 4382 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4383 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +"2019-07-20 02:40:52.309 UTC [msp.identity] Verify -> DEBU 4384 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +00000040 ca ca 4e 05 58 db b7 |..N.X..|" +"2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4385 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:52.310 UTC [msp.identity] Verify -> DEBU 4386 Verify: sig = 00000000 30 45 02 21 00 ac e9 d3 31 c4 59 f7 8f ee 15 fd |0E.!....1.Y.....| +00000010 b8 35 b1 54 7e ca e3 c1 6f b0 7c f1 ca 95 16 93 |.5.T~...o.|.....| +00000020 0d 42 7c 4b b6 02 20 5a 8c 15 17 d8 aa 34 2b 40 |.B|K.. Z.....4+@| +00000030 bf 17 cc fb 27 00 a9 b8 a7 2c c2 90 68 f0 48 93 |....'....,..h.H.| +00000040 6f fc 6c b0 0f fb 9e |o.l....|" +"2019-07-20 02:40:52.310 UTC [gossip.discovery] handleAliveMessage -> DEBU 4387 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:52.310 UTC [gossip.discovery] isSentByMe -> DEBU 4388 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:52.311 UTC [gossip.discovery] handleAliveMessage -> DEBU 4389 Exiting" +"2019-07-20 02:40:52.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438a Exiting" +"2019-07-20 02:40:52.312 UTC [gossip.discovery] handleMsgFromComm -> DEBU 438b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.312 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 438c Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:52.312 UTC [msp.identity] Verify -> DEBU 438d Verify: digest = 00000000 8b bb dd 0d cc 9e 57 ed f6 80 f9 5b be 0d d5 f6 |......W....[....| +00000010 ba 34 a2 2b 07 48 d0 db fd 45 4b e2 3e 35 5a 96 |.4.+.H...EK.>5Z.|" +"2019-07-20 02:40:52.313 UTC [msp.identity] Verify -> DEBU 438e Verify: sig = 00000000 30 45 02 21 00 c9 28 d3 09 7a ae 14 90 3b 62 be |0E.!..(..z...;b.| +00000010 6f ae 7a f1 60 51 18 e1 6e 62 7e 45 05 52 45 05 |o.z.`Q..nb~E.RE.| +00000020 56 7c fd 98 ba 02 20 17 6f 52 c1 29 94 99 df bd |V|.... .oR.)....| +00000030 a9 78 50 ad c3 6e df 6c cb 83 f9 35 ee 85 b7 92 |.xP..n.l...5....| +00000040 78 fb 75 ea c1 36 cc |x.u..6.|" +"2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 438f Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.314 UTC [gossip.gossip] handleMessage -> DEBU 4390 Exiting" +"2019-07-20 02:40:52.314 UTC [gossip.discovery] handleAliveMessage -> DEBU 4391 Exiting" +"2019-07-20 02:40:52.320 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4392 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4393 Verify: digest = 00000000 9c 39 99 36 f2 f4 9b e9 ee 21 7c ab 54 b2 63 ec |.9.6.....!|.T.c.| +00000010 9a 94 2e b4 4d bb 2e c9 4b 19 a5 38 9e 40 04 21 |....M...K..8.@.!|" +"2019-07-20 02:40:52.321 UTC [msp.identity] Verify -> DEBU 4394 Verify: sig = 00000000 30 45 02 21 00 c9 1d 8b e4 51 a4 f0 90 89 4f 65 |0E.!.....Q....Oe| +00000010 ef ae 0f bd 13 85 ea 65 22 91 5e 72 39 07 ba 49 |.......e".^r9..I| +00000020 a8 d8 37 fd ab 02 20 70 ed d1 6f a6 a6 58 75 f5 |..7... p..o..Xu.| +00000030 02 d9 31 ea 6c 86 18 31 f1 d9 1a 9d 0c 5f 59 68 |..1.l..1....._Yh| +00000040 ca ca 4e 05 58 db b7 |..N.X..|" +"2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4395 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.323 UTC [gossip.discovery] isSentByMe -> DEBU 4396 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.323 UTC [gossip.discovery] handleAliveMessage -> DEBU 4397 Exiting" +"2019-07-20 02:40:52.324 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4398 Exiting" +"2019-07-20 02:40:52.340 UTC [gossip.gossip] handleMessage -> DEBU 4399 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.341 UTC [gossip.pull] HandleMessage -> DEBU 439a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.341 UTC [gossip.pull] SendDigest -> DEBU 439b Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439c Exiting" +"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.341 UTC [gossip.gossip] handleMessage -> DEBU 439e Exiting" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 439f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43a0 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a1 Verify: digest = 00000000 93 a9 43 89 ee 0d 68 00 49 2b fd 2d 56 38 2f d9 |..C...h.I+.-V8/.| +00000010 60 a6 e5 51 a4 21 d6 e7 3d 91 2b 47 dd 19 5f b9 |`..Q.!..=.+G.._.|" +"2019-07-20 02:40:52.341 UTC [msp.identity] Verify -> DEBU 43a2 Verify: sig = 00000000 30 45 02 21 00 d8 78 12 32 3a 72 01 c6 8e c3 5b |0E.!..x.2:r....[| +00000010 49 22 72 f1 b7 94 1f 40 54 b7 4d 71 54 dd eb c3 |I"r....@T.MqT...| +00000020 83 16 b9 03 67 02 20 45 12 b8 8f 7f e7 b1 3b 32 |....g. E......;2| +00000030 d2 3e fd cb 57 4a 00 2d de d8 c1 a0 c0 eb 52 12 |.>..WJ.-......R.| +00000040 c3 b9 f7 69 80 1a c3 |...i...|" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a3 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a5 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a6 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a7 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 43a8 Exiting" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 43a9 Exiting" +"2019-07-20 02:40:52.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43aa Exiting" +"2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43ab Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ac Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.349 UTC [gossip.gossip] handleMessage -> DEBU 43ad Exiting" +"2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ae Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.349 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43af Exiting" +"2019-07-20 02:40:52.349 UTC [gossip.comm] func1 -> DEBU 43b0 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.350 UTC [gossip.gossip] handleMessage -> DEBU 43b2 Exiting" +"2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b3 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.350 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43b4 Exiting" +"2019-07-20 02:40:52.350 UTC [msp] DeserializeIdentity -> DEBU 43b5 Obtaining identity" +"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b6 Obtaining identity" +"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b7 Obtaining identity" +"2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43b8 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.351 UTC [msp] DeserializeIdentity -> DEBU 43b9 Obtaining identity" +"2019-07-20 02:40:52.351 UTC [gossip.comm] Send -> DEBU 43ba Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bc Exiting" +"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.351 UTC [gossip.comm] sendToEndpoint -> DEBU 43be Exiting" +"2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43bf Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.365 UTC [gossip.gossip] handleMessage -> DEBU 43c0 Exiting" +"2019-07-20 02:40:52.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43c1 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.365 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43c2 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c3 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c4 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +00000040 86 01 4f b2 60 e9 82 |..O.`..|" +"2019-07-20 02:40:52.365 UTC [msp.identity] Verify -> DEBU 43c5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:52.366 UTC [msp.identity] Verify -> DEBU 43c6 Verify: sig = 00000000 30 45 02 21 00 fc 90 ff 73 60 f4 91 6a f6 d9 05 |0E.!....s`..j...| +00000010 be ba 76 e7 61 fe 1c 20 09 c2 f2 59 7e 3f 03 fc |..v.a.. ...Y~?..| +00000020 3f 34 b3 11 5c 02 20 70 8d ab 3f a6 3f 02 0f d4 |?4..\. p..?.?...| +00000030 f2 e8 6e 66 09 5b 59 5e 0a d8 84 09 03 5f 30 41 |..nf.[Y^....._0A| +00000040 cd d0 97 4d 87 3e 7b |...M.>{|" +"2019-07-20 02:40:52.366 UTC [gossip.discovery] handleAliveMessage -> DEBU 43c7 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43c9 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43ca Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cb Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] learnExistingMembers -> DEBU 43cc Exiting" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] handleAliveMessage -> DEBU 43cd Exiting" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43ce Exiting" +"2019-07-20 02:40:52.367 UTC [gossip.discovery] sendMemResponse -> DEBU 43cf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d0 Obtaining identity" +"2019-07-20 02:40:52.367 UTC [msp] DeserializeIdentity -> DEBU 43d1 Obtaining identity" +"2019-07-20 02:40:52.367 UTC [gossip.comm] Send -> DEBU 43d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.368 UTC [gossip.discovery] sendMemResponse -> DEBU 43d3 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" secret_envelope:{" > > alive: " +"2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.368 UTC [gossip.comm] sendToEndpoint -> DEBU 43d5 Exiting" +"2019-07-20 02:40:52.531 UTC [gossip.comm] func1 -> DEBU 43d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d7 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.531 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" +"2019-07-20 02:40:52.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43da Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:52.532 UTC [msp] DeserializeIdentity -> DEBU 43db Obtaining identity" +"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43dd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43de Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e2 0xc0043ca7a0 gate 1563590452532372000 evaluation starts" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e3 0xc0043ca7a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e4 0xc0043ca7a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0043ca7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43e6 0xc0043ca7a0 principal evaluation fails" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43e7 0xc0043ca7a0 gate 1563590452532372000 evaluation fails" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43eb 0xc0043cafe0 gate 1563590452532767400 evaluation starts" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ec 0xc0043cafe0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ed 0xc0043cafe0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ee 0xc0043cafe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func2 -> DEBU 43ef 0xc0043cafe0 principal evaluation fails" +"2019-07-20 02:40:52.532 UTC [cauthdsl] func1 -> DEBU 43f0 0xc0043cafe0 gate 1563590452532767400 evaluation fails" +"2019-07-20 02:40:52.532 UTC [policies] Evaluate -> DEBU 43f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43f4 0xc0043cb820 gate 1563590452533072400 evaluation starts" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0043cb820 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0043cb820 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0043cb820 principal matched by identity 0" +"2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f8 Verify: digest = 00000000 51 64 1f 03 f0 44 db ad 52 2d e9 8b 79 01 5f fe |Qd...D..R-..y._.| +00000010 2e 1a 82 e8 77 5d 22 1d 38 4e 11 32 9b 23 38 50 |....w]".8N.2.#8P|" +"2019-07-20 02:40:52.533 UTC [msp.identity] Verify -> DEBU 43f9 Verify: sig = 00000000 30 45 02 21 00 f8 2b 92 2d c8 e1 19 63 85 e4 03 |0E.!..+.-...c...| +00000010 5d c3 86 3d 87 46 73 64 82 8d 98 40 32 96 93 e0 |]..=.Fsd...@2...| +00000020 86 5e 77 4a 3e 02 20 0f ab df 7f 75 cf 31 34 a3 |.^wJ>. ....u.14.| +00000030 7e 0a d3 af d1 87 2e d8 cf cb b4 45 ef 91 da 84 |~..........E....| +00000040 b8 69 c9 aa 31 63 c4 |.i..1c.|" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func2 -> DEBU 43fa 0xc0043cb820 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.533 UTC [cauthdsl] func1 -> DEBU 43fb 0xc0043cb820 gate 1563590452533072400 evaluation succeeds" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43fe Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.533 UTC [policies] Evaluate -> DEBU 43ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4400 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4401 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4402 updating membership: timestamp: " +"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4403 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4404 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4405 Exiting" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 4406 Exiting" +"2019-07-20 02:40:52.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4407 Exiting" +"2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4408 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.535 UTC [gossip.gossip] handleMessage -> DEBU 4409 Exiting" +"2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 440b Exiting" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440d Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440e Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 440f Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4410 Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4411 Obtaining identity" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4412 Obtaining identity" +"2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4413 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.537 UTC [msp] DeserializeIdentity -> DEBU 4414 Obtaining identity" +"2019-07-20 02:40:52.537 UTC [gossip.comm] Send -> DEBU 4415 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4416 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4417 Exiting" +"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4418 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.537 UTC [gossip.comm] sendToEndpoint -> DEBU 4419 Exiting" +"2019-07-20 02:40:52.541 UTC [gossip.comm] func1 -> DEBU 441a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.542 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" +"2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 441e Exiting" +"2019-07-20 02:40:52.585 UTC [gossip.comm] func1 -> DEBU 441f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4420 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.585 UTC [gossip.gossip] handleMessage -> DEBU 4421 Exiting" +"2019-07-20 02:40:52.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4422 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4423 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:52.586 UTC [msp] DeserializeIdentity -> DEBU 4424 Obtaining identity" +"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4425 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4426 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4427 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 4429 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.586 UTC [policies] Evaluate -> DEBU 442a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.586 UTC [cauthdsl] func1 -> DEBU 442b 0xc0043e5df0 gate 1563590452586824100 evaluation starts" +"2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442c 0xc0043e5df0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.586 UTC [cauthdsl] func2 -> DEBU 442d 0xc0043e5df0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442e 0xc0043e5df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 442f 0xc0043e5df0 principal evaluation fails" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4430 0xc0043e5df0 gate 1563590452586824100 evaluation fails" +"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4431 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4432 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.587 UTC [policies] Evaluate -> DEBU 4433 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4434 0xc004400630 gate 1563590452587606200 evaluation starts" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4435 0xc004400630 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4436 0xc004400630 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4437 0xc004400630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func2 -> DEBU 4438 0xc004400630 principal evaluation fails" +"2019-07-20 02:40:52.587 UTC [cauthdsl] func1 -> DEBU 4439 0xc004400630 gate 1563590452587606200 evaluation fails" +"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.588 UTC [policies] Evaluate -> DEBU 443c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.588 UTC [cauthdsl] func1 -> DEBU 443d 0xc004400e70 gate 1563590452588208500 evaluation starts" +"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443e 0xc004400e70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 443f 0xc004400e70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.588 UTC [cauthdsl] func2 -> DEBU 4440 0xc004400e70 principal matched by identity 0" +"2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4441 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| +00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" +"2019-07-20 02:40:52.588 UTC [msp.identity] Verify -> DEBU 4442 Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| +00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| +00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| +00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| +00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" +"2019-07-20 02:40:52.589 UTC [cauthdsl] func2 -> DEBU 4443 0xc004400e70 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.589 UTC [cauthdsl] func1 -> DEBU 4444 0xc004400e70 gate 1563590452588208500 evaluation succeeds" +"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4447 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.589 UTC [policies] Evaluate -> DEBU 4448 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.589 UTC [gossip.discovery] handleAliveMessage -> DEBU 4449 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b updating membership: timestamp: " +"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:52.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 444e Exiting" +"2019-07-20 02:40:52.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 444f Exiting" +"2019-07-20 02:40:52.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4450 Exiting" +"2019-07-20 02:40:52.591 UTC [gossip.discovery] sendMemResponse -> DEBU 4451 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:52.591 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +"2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" +"2019-07-20 02:40:52.592 UTC [msp] DeserializeIdentity -> DEBU 4454 Obtaining identity" +"2019-07-20 02:40:52.592 UTC [gossip.comm] Send -> DEBU 4455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.593 UTC [gossip.discovery] sendMemResponse -> DEBU 4456 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " +"2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.593 UTC [gossip.comm] sendToEndpoint -> DEBU 4458 Exiting" +"2019-07-20 02:40:52.595 UTC [gossip.comm] func1 -> DEBU 4459 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 445a Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.595 UTC [gossip.pull] HandleMessage -> DEBU 445b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4460 Obtaining identity" +"2019-07-20 02:40:52.595 UTC [msp] DeserializeIdentity -> DEBU 4461 Obtaining identity" +"2019-07-20 02:40:52.595 UTC [gossip.pull] SendDigest -> DEBU 4462 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:52.595 UTC [gossip.gossip] handleMessage -> DEBU 4463 Exiting" +"2019-07-20 02:40:52.682 UTC [msp] DeserializeIdentity -> DEBU 4464 Obtaining identity" +"2019-07-20 02:40:52.683 UTC [msp] DeserializeIdentity -> DEBU 4465 Obtaining identity" +"2019-07-20 02:40:52.683 UTC [gossip.comm] Send -> DEBU 4466 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4467 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.683 UTC [gossip.comm] sendToEndpoint -> DEBU 4468 Exiting" +"2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 4469 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.684 UTC [gossip.comm] sendToEndpoint -> DEBU 446a Exiting" +"2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 446b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.685 UTC [gossip.comm] func1 -> DEBU 446c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.685 UTC [gossip.gossip] handleMessage -> DEBU 446d Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446e Obtaining identity" +"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" +"2019-07-20 02:40:52.686 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" +"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.687 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.685 UTC [gossip.comm] sendToEndpoint -> DEBU 4476 Exiting" +"2019-07-20 02:40:52.687 UTC [gossip.comm] func1 -> DEBU 4477 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.687 UTC [policies] Evaluate -> DEBU 4478 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 4479 0xc00442b6a0 gate 1563590452693436200 evaluation starts" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447a 0xc00442b6a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447b 0xc00442b6a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447c 0xc00442b6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func2 -> DEBU 447d 0xc00442b6a0 principal evaluation fails" +"2019-07-20 02:40:52.693 UTC [cauthdsl] func1 -> DEBU 447e 0xc00442b6a0 gate 1563590452693436200 evaluation fails" +"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 447f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4480 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.694 UTC [policies] Evaluate -> DEBU 4481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.694 UTC [cauthdsl] func1 -> DEBU 4482 0xc00442bee0 gate 1563590452694203000 evaluation starts" +"2019-07-20 02:40:52.694 UTC [cauthdsl] func2 -> DEBU 4483 0xc00442bee0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4484 0xc00442bee0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4485 0xc00442bee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.695 UTC [cauthdsl] func2 -> DEBU 4486 0xc00442bee0 principal evaluation fails" +"2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 4487 0xc00442bee0 gate 1563590452694203000 evaluation fails" +"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.696 UTC [policies] Evaluate -> DEBU 448a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.696 UTC [cauthdsl] func1 -> DEBU 448b 0xc004448720 gate 1563590452696747100 evaluation starts" +"2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448c 0xc004448720 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.696 UTC [cauthdsl] func2 -> DEBU 448d 0xc004448720 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 448e 0xc004448720 principal matched by identity 0" +"2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 448f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:52.697 UTC [msp.identity] Verify -> DEBU 4490 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:52.697 UTC [cauthdsl] func2 -> DEBU 4491 0xc004448720 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.697 UTC [cauthdsl] func1 -> DEBU 4492 0xc004448720 gate 1563590452696747100 evaluation succeeds" +"2019-07-20 02:40:52.697 UTC [policies] Evaluate -> DEBU 4493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4495 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.698 UTC [policies] Evaluate -> DEBU 4496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4497 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:52.698 UTC [msp.identity] Verify -> DEBU 4498 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 4499 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:52.699 UTC [msp.identity] Verify -> DEBU 449a Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449b Obtaining identity" +"2019-07-20 02:40:52.699 UTC [msp] DeserializeIdentity -> DEBU 449c Obtaining identity" +"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 449d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 449f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.700 UTC [policies] Evaluate -> DEBU 44a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.700 UTC [cauthdsl] func1 -> DEBU 44a3 0xc00445cd30 gate 1563590452700818900 evaluation starts" +"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a4 0xc00445cd30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a5 0xc00445cd30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a6 0xc00445cd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.701 UTC [cauthdsl] func2 -> DEBU 44a7 0xc00445cd30 principal evaluation fails" +"2019-07-20 02:40:52.701 UTC [cauthdsl] func1 -> DEBU 44a8 0xc00445cd30 gate 1563590452700818900 evaluation fails" +"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.702 UTC [policies] Evaluate -> DEBU 44ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.702 UTC [cauthdsl] func1 -> DEBU 44ac 0xc00445d570 gate 1563590452702591600 evaluation starts" +"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ad 0xc00445d570 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44ae 0xc00445d570 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.702 UTC [cauthdsl] func2 -> DEBU 44af 0xc00445d570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.703 UTC [cauthdsl] func2 -> DEBU 44b0 0xc00445d570 principal evaluation fails" +"2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b1 0xc00445d570 gate 1563590452702591600 evaluation fails" +"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.703 UTC [policies] Evaluate -> DEBU 44b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.703 UTC [cauthdsl] func1 -> DEBU 44b5 0xc00445ddb0 gate 1563590452703782000 evaluation starts" +"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b6 0xc00445ddb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b7 0xc00445ddb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.704 UTC [cauthdsl] func2 -> DEBU 44b8 0xc00445ddb0 principal matched by identity 0" +"2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44b9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:52.704 UTC [msp.identity] Verify -> DEBU 44ba Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:52.705 UTC [cauthdsl] func2 -> DEBU 44bb 0xc00445ddb0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.705 UTC [cauthdsl] func1 -> DEBU 44bc 0xc00445ddb0 gate 1563590452703782000 evaluation succeeds" +"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44bf Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.705 UTC [policies] Evaluate -> DEBU 44c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c1 Exiting" +"2019-07-20 02:40:52.705 UTC [gossip.gossip] handleMessage -> DEBU 44c2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c3 Obtaining identity" +"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c4 Obtaining identity" +"2019-07-20 02:40:52.706 UTC [msp] DeserializeIdentity -> DEBU 44c5 Obtaining identity" +"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.707 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.707 UTC [policies] Evaluate -> DEBU 44c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.708 UTC [policies] Evaluate -> DEBU 44cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44cc 0xc0044738c0 gate 1563590452708236700 evaluation starts" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cd 0xc0044738c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44ce 0xc0044738c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44cf 0xc0044738c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0044738c0 principal evaluation fails" +"2019-07-20 02:40:52.708 UTC [cauthdsl] func1 -> DEBU 44d1 0xc0044738c0 gate 1563590452708236700 evaluation fails" +"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44d5 0xc004486100 gate 1563590452709247200 evaluation starts" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d6 0xc004486100 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d7 0xc004486100 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d8 0xc004486100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func2 -> DEBU 44d9 0xc004486100 principal evaluation fails" +"2019-07-20 02:40:52.709 UTC [cauthdsl] func1 -> DEBU 44da 0xc004486100 gate 1563590452709247200 evaluation fails" +"2019-07-20 02:40:52.709 UTC [policies] Evaluate -> DEBU 44db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.710 UTC [policies] Evaluate -> DEBU 44dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.710 UTC [cauthdsl] func1 -> DEBU 44de 0xc004486940 gate 1563590452710265500 evaluation starts" +"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44df 0xc004486940 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e0 0xc004486940 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.710 UTC [cauthdsl] func2 -> DEBU 44e1 0xc004486940 principal matched by identity 0" +"2019-07-20 02:40:52.711 UTC [msp.identity] Verify -> DEBU 44e2 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:52.712 UTC [msp.identity] Verify -> DEBU 44e3 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:52.712 UTC [cauthdsl] func2 -> DEBU 44e4 0xc004486940 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.713 UTC [cauthdsl] func1 -> DEBU 44e5 0xc004486940 gate 1563590452710265500 evaluation succeeds" +"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.713 UTC [policies] Evaluate -> DEBU 44e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44ea Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:52.714 UTC [msp.identity] Verify -> DEBU 44eb Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ec Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:52.715 UTC [msp.identity] Verify -> DEBU 44ed Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ee Obtaining identity" +"2019-07-20 02:40:52.715 UTC [msp] DeserializeIdentity -> DEBU 44ef Obtaining identity" +"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.715 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44f2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.716 UTC [policies] Evaluate -> DEBU 44f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.716 UTC [cauthdsl] func1 -> DEBU 44f6 0xc004496f50 gate 1563590452716433600 evaluation starts" +"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f7 0xc004496f50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f8 0xc004496f50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.716 UTC [cauthdsl] func2 -> DEBU 44f9 0xc004496f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 44fa 0xc004496f50 principal evaluation fails" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44fb 0xc004496f50 gate 1563590452716433600 evaluation fails" +"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.717 UTC [policies] Evaluate -> DEBU 44fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 44ff 0xc004497790 gate 1563590452717497000 evaluation starts" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4500 0xc004497790 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4501 0xc004497790 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4502 0xc004497790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func2 -> DEBU 4503 0xc004497790 principal evaluation fails" +"2019-07-20 02:40:52.717 UTC [cauthdsl] func1 -> DEBU 4504 0xc004497790 gate 1563590452717497000 evaluation fails" +"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4505 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4506 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.718 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.718 UTC [cauthdsl] func1 -> DEBU 4508 0xc004497fd0 gate 1563590452718293100 evaluation starts" +"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 4509 0xc004497fd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450a 0xc004497fd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.718 UTC [cauthdsl] func2 -> DEBU 450b 0xc004497fd0 principal matched by identity 0" +"2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450c Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:52.718 UTC [msp.identity] Verify -> DEBU 450d Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:52.719 UTC [cauthdsl] func2 -> DEBU 450e 0xc004497fd0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.719 UTC [cauthdsl] func1 -> DEBU 450f 0xc004497fd0 gate 1563590452718293100 evaluation succeeds" +"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4512 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.719 UTC [policies] Evaluate -> DEBU 4513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4514 Exiting" +"2019-07-20 02:40:52.719 UTC [gossip.gossip] handleMessage -> DEBU 4515 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4516 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4517 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4518 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:52.720 UTC [msp.identity] Verify -> DEBU 4519 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451a Obtaining identity" +"2019-07-20 02:40:52.721 UTC [msp] DeserializeIdentity -> DEBU 451b Obtaining identity" +"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 451c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 451e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 451f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4520 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.722 UTC [policies] Evaluate -> DEBU 4521 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.722 UTC [cauthdsl] func1 -> DEBU 4522 0xc0044c2820 gate 1563590452722251500 evaluation starts" +"2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4523 0xc0044c2820 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.722 UTC [cauthdsl] func2 -> DEBU 4524 0xc0044c2820 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4525 0xc0044c2820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 4526 0xc0044c2820 principal evaluation fails" +"2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 4527 0xc0044c2820 gate 1563590452722251500 evaluation fails" +"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4528 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 4529 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.723 UTC [policies] Evaluate -> DEBU 452a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.723 UTC [cauthdsl] func1 -> DEBU 452b 0xc0044c3060 gate 1563590452723773300 evaluation starts" +"2019-07-20 02:40:52.723 UTC [cauthdsl] func2 -> DEBU 452c 0xc0044c3060 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452d 0xc0044c3060 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452e 0xc0044c3060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.724 UTC [cauthdsl] func2 -> DEBU 452f 0xc0044c3060 principal evaluation fails" +"2019-07-20 02:40:52.724 UTC [cauthdsl] func1 -> DEBU 4530 0xc0044c3060 gate 1563590452723773300 evaluation fails" +"2019-07-20 02:40:52.724 UTC [policies] Evaluate -> DEBU 4531 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4532 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.725 UTC [policies] Evaluate -> DEBU 4533 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.725 UTC [cauthdsl] func1 -> DEBU 4534 0xc0044c38a0 gate 1563590452725580700 evaluation starts" +"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4535 0xc0044c38a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4536 0xc0044c38a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.725 UTC [cauthdsl] func2 -> DEBU 4537 0xc0044c38a0 principal matched by identity 0" +"2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4538 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:52.726 UTC [msp.identity] Verify -> DEBU 4539 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:52.727 UTC [cauthdsl] func2 -> DEBU 453a 0xc0044c38a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.727 UTC [cauthdsl] func1 -> DEBU 453b 0xc0044c38a0 gate 1563590452725580700 evaluation succeeds" +"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453e Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.727 UTC [policies] Evaluate -> DEBU 453f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.727 UTC [msp] DeserializeIdentity -> DEBU 4540 Obtaining identity" +"2019-07-20 02:40:52.728 UTC [msp] DeserializeIdentity -> DEBU 4541 Obtaining identity" +"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4542 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4543 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4544 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4545 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4546 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:52.729 UTC [policies] Evaluate -> DEBU 4547 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:52.729 UTC [cauthdsl] func1 -> DEBU 4548 0xc0044d5070 gate 1563590452729448900 evaluation starts" +"2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 4549 0xc0044d5070 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.729 UTC [cauthdsl] func2 -> DEBU 454a 0xc0044d5070 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454b 0xc0044d5070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 454c 0xc0044d5070 principal evaluation fails" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 454d 0xc0044d5070 gate 1563590452729448900 evaluation fails" +"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 454f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:52.730 UTC [policies] Evaluate -> DEBU 4550 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func1 -> DEBU 4551 0xc0044d58b0 gate 1563590452730738200 evaluation starts" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4552 0xc0044d58b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.730 UTC [cauthdsl] func2 -> DEBU 4553 0xc0044d58b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4554 0xc0044d58b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 4555 0xc0044d58b0 principal evaluation fails" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 4556 0xc0044d58b0 gate 1563590452730738200 evaluation fails" +"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4557 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4558 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:52.731 UTC [policies] Evaluate -> DEBU 4559 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func1 -> DEBU 455a 0xc0044ee0f0 gate 1563590452731709400 evaluation starts" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455b 0xc0044ee0f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:52.731 UTC [cauthdsl] func2 -> DEBU 455c 0xc0044ee0f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:52.732 UTC [cauthdsl] func2 -> DEBU 455d 0xc0044ee0f0 principal matched by identity 0" +"2019-07-20 02:40:52.732 UTC [msp.identity] Verify -> DEBU 455e Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:52.733 UTC [msp.identity] Verify -> DEBU 455f Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:52.733 UTC [cauthdsl] func2 -> DEBU 4560 0xc0044ee0f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:52.733 UTC [cauthdsl] func1 -> DEBU 4561 0xc0044ee0f0 gate 1563590452731709400 evaluation succeeds" +"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4562 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4563 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4564 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:52.733 UTC [policies] Evaluate -> DEBU 4565 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:52.734 UTC [gossip.gossip] handleMessage -> DEBU 4566 Exiting" +"2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4567 Obtaining identity" +"2019-07-20 02:40:52.758 UTC [msp] DeserializeIdentity -> DEBU 4568 Obtaining identity" +"2019-07-20 02:40:52.758 UTC [gossip.pull] Hello -> DEBU 4569 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456a Obtaining identity" +"2019-07-20 02:40:52.759 UTC [msp] DeserializeIdentity -> DEBU 456b Obtaining identity" +"2019-07-20 02:40:52.759 UTC [gossip.comm] Send -> DEBU 456c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.759 UTC [gossip.comm] sendToEndpoint -> DEBU 456e Exiting" +"2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 456f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.760 UTC [gossip.pull] HandleMessage -> DEBU 4570 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.760 UTC [gossip.gossip] handleMessage -> DEBU 4571 Exiting" +"2019-07-20 02:40:52.843 UTC [gossip.gossip] handleMessage -> DEBU 4572 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.844 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" +"2019-07-20 02:40:52.845 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" +"2019-07-20 02:40:52.845 UTC [gossip.gossip] handleMessage -> DEBU 4575 Exiting" +"2019-07-20 02:40:52.900 UTC [gossip.gossip] handleMessage -> DEBU 4576 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.901 UTC [gossip.pull] HandleMessage -> DEBU 4577 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:52.901 UTC [gossip.pull] SendDigest -> DEBU 4578 Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:52.901 UTC [gossip.gossip] handleMessage -> DEBU 4579 Exiting" +"2019-07-20 02:40:53.012 UTC [gossip.comm] func1 -> DEBU 457a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:53.013 UTC [gossip.gossip] handleMessage -> DEBU 457b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457c Obtaining identity" +"2019-07-20 02:40:53.014 UTC [msp] DeserializeIdentity -> DEBU 457d Obtaining identity" +"2019-07-20 02:40:53.015 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" +"2019-07-20 02:40:53.015 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" +"2019-07-20 02:40:53.148 UTC [gossip.comm] func1 -> DEBU 4580 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:53.148 UTC [gossip.gossip] handleMessage -> DEBU 4581 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:53.148 UTC [msp] DeserializeIdentity -> DEBU 4582 Obtaining identity" +"2019-07-20 02:40:53.151 UTC [msp] DeserializeIdentity -> DEBU 4583 Obtaining identity" +"2019-07-20 02:40:53.152 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" +"2019-07-20 02:40:53.152 UTC [gossip.gossip] handleMessage -> DEBU 4585 Exiting" +"2019-07-20 02:40:55.938 UTC [gossip.comm] func1 -> DEBU 4586 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4587 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.939 UTC [gossip.gossip] handleMessage -> DEBU 4588 Exiting" +"2019-07-20 02:40:55.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4589 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 458a Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:55.940 UTC [msp] DeserializeIdentity -> DEBU 458b Obtaining identity" +"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 458c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458d Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:55.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458e Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 458f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4590 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4591 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4592 0xc004507d60 gate 1563590455940519200 evaluation starts" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4593 0xc004507d60 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4594 0xc004507d60 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4595 0xc004507d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 4596 0xc004507d60 principal evaluation fails" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 4597 0xc004507d60 gate 1563590455940519200 evaluation fails" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4598 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 4599 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:55.940 UTC [policies] Evaluate -> DEBU 459a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func1 -> DEBU 459b 0xc0045225a0 gate 1563590455940934400 evaluation starts" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459c 0xc0045225a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:55.940 UTC [cauthdsl] func2 -> DEBU 459d 0xc0045225a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459e 0xc0045225a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 459f 0xc0045225a0 principal evaluation fails" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a0 0xc0045225a0 gate 1563590455940934400 evaluation fails" +"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:55.941 UTC [policies] Evaluate -> DEBU 45a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func1 -> DEBU 45a4 0xc004522de0 gate 1563590455941246400 evaluation starts" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a5 0xc004522de0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:55.941 UTC [cauthdsl] func2 -> DEBU 45a6 0xc004522de0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45a7 0xc004522de0 principal matched by identity 0" +"2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a8 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| +00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" +"2019-07-20 02:40:55.949 UTC [msp.identity] Verify -> DEBU 45a9 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| +00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| +00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| +00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| +00000040 94 ae 7c fe f6 e1 |..|...|" +"2019-07-20 02:40:55.949 UTC [cauthdsl] func2 -> DEBU 45aa 0xc004522de0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:55.949 UTC [cauthdsl] func1 -> DEBU 45ab 0xc004522de0 gate 1563590455941246400 evaluation succeeds" +"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45ae Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:55.949 UTC [policies] Evaluate -> DEBU 45af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:55.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 updating membership: timestamp: " +"2019-07-20 02:40:55.949 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:55.950 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Exiting" +"2019-07-20 02:40:55.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b6 Exiting" +"2019-07-20 02:40:55.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Exiting" +"2019-07-20 02:40:55.950 UTC [gossip.discovery] sendMemResponse -> DEBU 45b8 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45b9 Obtaining identity" +"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45ba Obtaining identity" +"2019-07-20 02:40:55.950 UTC [msp] DeserializeIdentity -> DEBU 45bb Obtaining identity" +"2019-07-20 02:40:55.950 UTC [gossip.comm] Send -> DEBU 45bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.950 UTC [gossip.comm] sendToEndpoint -> DEBU 45be Exiting" +"2019-07-20 02:40:55.951 UTC [gossip.discovery] sendMemResponse -> DEBU 45bf Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020:" signature:"0E\002!\000\343S\037j1:\022\212\236\026\337pI\301\230\221\224\246<\335Ql\255\3028\254\037EI\305\177\t\002 \035\255\024h\243A\343g\225\027\007\014y5\271\201\026&\377s\265pg\265&\206\001O\262`\351\202" > alive: alive: alive: " +"2019-07-20 02:40:55.956 UTC [gossip.comm] func1 -> DEBU 45c0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.956 UTC [gossip.gossip] handleMessage -> DEBU 45c1 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.956 UTC [gossip.pull] HandleMessage -> DEBU 45c2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c3 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c4 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" +"2019-07-20 02:40:55.957 UTC [gossip.pull] SendDigest -> DEBU 45c9 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:55.957 UTC [gossip.gossip] handleMessage -> DEBU 45ca Exiting" +"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45cc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.243 UTC [gossip.pull] Hello -> DEBU 45cf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:40:56.243 UTC [gossip.comm] Send -> DEBU 45d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d3 Exiting" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d4 Exiting" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.243 UTC [gossip.comm] sendToEndpoint -> DEBU 45d6 Exiting" +"2019-07-20 02:40:56.244 UTC [gossip.comm] func1 -> DEBU 45d7 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45d8 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.244 UTC [gossip.pull] HandleMessage -> DEBU 45d9 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.244 UTC [gossip.gossip] handleMessage -> DEBU 45da Exiting" +"2019-07-20 02:40:56.245 UTC [gossip.comm] func1 -> DEBU 45db Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45dc Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.245 UTC [gossip.pull] HandleMessage -> DEBU 45dd GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 153 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.245 UTC [gossip.gossip] handleMessage -> DEBU 45de Exiting" +"2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45df Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.246 UTC [gossip.pull] HandleMessage -> DEBU 45e0 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.246 UTC [gossip.gossip] handleMessage -> DEBU 45e1 Exiting" +"2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e2 Obtaining default signing identity" +"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151034 " +"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e4 Sign: digest: B72C93CD94D2623F267EB63F6E6CA421F900643012C818FE189705252CFDEF4B " +"2019-07-20 02:40:56.282 UTC [msp] GetDefaultSigningIdentity -> DEBU 45e5 Obtaining default signing identity" +"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:56.282 UTC [msp.identity] Sign -> DEBU 45e7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45e8 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45e9 Obtaining identity" +"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ea Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.282 UTC [msp] DeserializeIdentity -> DEBU 45eb Obtaining identity" +"2019-07-20 02:40:56.282 UTC [gossip.comm] Send -> DEBU 45ec Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" +"2019-07-20 02:40:56.282 UTC [gossip.comm] sendToEndpoint -> DEBU 45f0 Exiting" +"2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.283 UTC [gossip.comm] sendToEndpoint -> DEBU 45f2 Exiting" +"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f3 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f4 Exiting" +"2019-07-20 02:40:56.284 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.284 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45f6 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:56.284 UTC [gossip.comm] func1 -> DEBU 45f7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.284 UTC [gossip.gossip] handleMessage -> DEBU 45f8 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.285 UTC [gossip.comm] func1 -> DEBU 45f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fa Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fb Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:40:56.285 UTC [msp.identity] Verify -> DEBU 45fd Verify: sig = 00000000 30 44 02 20 5c 6a c8 38 0b 2a 2d ca 3c df 1a 6e |0D. \j.8.*-.<..n| +00000010 b0 94 b2 07 cd 05 94 39 12 2c d3 e9 7d 61 6e 59 |.......9.,..}anY| +00000020 29 d8 a4 18 02 20 21 f4 05 d6 78 ec d3 77 33 89 |).... !...x..w3.| +00000030 2f db cb 10 5c 45 02 7a 54 8b a2 e1 5d 1d 4a 91 |/...\E.zT...].J.| +00000040 83 99 84 4f f2 07 |...O..|" +"2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 45fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:56.285 UTC [gossip.discovery] isSentByMe -> DEBU 45ff Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:56.285 UTC [gossip.discovery] handleAliveMessage -> DEBU 4600 Exiting" +"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4601 Exiting" +"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4602 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4603 Exiting" +"2019-07-20 02:40:56.286 UTC [gossip.gossip] handleMessage -> DEBU 4604 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4605 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4606 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +"2019-07-20 02:40:56.286 UTC [msp.identity] Verify -> DEBU 4607 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 4608 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.286 UTC [gossip.discovery] isSentByMe -> DEBU 4609 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.286 UTC [gossip.discovery] handleAliveMessage -> DEBU 460a Exiting" +"2019-07-20 02:40:56.286 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 460b Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:56.286 UTC [msp] DeserializeIdentity -> DEBU 460c Obtaining identity" +"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 460d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460e Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.286 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 460f Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.286 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4611 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4612 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4613 0xc004590b20 gate 1563590456287229700 evaluation starts" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4614 0xc004590b20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4615 0xc004590b20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4616 0xc004590b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4617 0xc004590b20 principal evaluation fails" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4618 0xc004590b20 gate 1563590456287229700 evaluation fails" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4619 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 461b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 461c 0xc004591360 gate 1563590456287552100 evaluation starts" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461d 0xc004591360 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461e 0xc004591360 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 461f 0xc004591360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4620 0xc004591360 principal evaluation fails" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4621 0xc004591360 gate 1563590456287552100 evaluation fails" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.287 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func1 -> DEBU 4625 0xc004591ba0 gate 1563590456287800000 evaluation starts" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4626 0xc004591ba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4627 0xc004591ba0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.287 UTC [cauthdsl] func2 -> DEBU 4628 0xc004591ba0 principal matched by identity 0" +"2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 4629 Verify: digest = 00000000 9a 1e bd 6e 4d 65 01 2b 0c 69 d4 f8 79 8e 47 2d |...nMe.+.i..y.G-| +00000010 67 a0 bb 40 a7 4d 60 c7 d5 35 13 31 3e 16 da af |g..@.M`..5.1>...|" +"2019-07-20 02:40:56.287 UTC [msp.identity] Verify -> DEBU 462a Verify: sig = 00000000 30 45 02 21 00 d5 bd 52 0f c0 50 6b 79 25 a6 97 |0E.!...R..Pky%..| +00000010 f1 c1 c0 f4 2f b3 3f bb 20 13 bd 5f b3 af da 64 |..../.?. .._...d| +00000020 eb 1f 26 29 a8 02 20 22 eb 33 0a 47 da 64 fd 25 |..&).. ".3.G.d.%| +00000030 10 45 23 aa 2b 5d 25 46 be 86 f8 f9 4b 2b 50 01 |.E#.+]%F....K+P.| +00000040 c2 21 d5 57 32 f2 73 |.!.W2.s|" +"2019-07-20 02:40:56.288 UTC [cauthdsl] func2 -> DEBU 462b 0xc004591ba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.288 UTC [cauthdsl] func1 -> DEBU 462c 0xc004591ba0 gate 1563590456287800000 evaluation succeeds" +"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 462f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.288 UTC [policies] Evaluate -> DEBU 4630 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4631 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4632 Exiting" +"2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4633 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4634 Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 4635 Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +00000040 86 01 4f b2 60 e9 82 |..O.`..|" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4636 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleAliveMessage -> DEBU 4637 Exiting" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4638 Exiting" +"2019-07-20 02:40:56.288 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4639 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.288 UTC [gossip.gossip] handleMessage -> DEBU 463a Exiting" +"2019-07-20 02:40:56.288 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 463b Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463c Verify: digest = 00000000 cc 74 a0 c8 2d 10 1a 96 e4 48 6f 4d 06 0e 11 bd |.t..-....HoM....| +00000010 e5 8b d7 72 d2 f1 e2 22 2b 45 73 14 6c 09 ea 32 |...r..."+Es.l..2|" +"2019-07-20 02:40:56.288 UTC [msp.identity] Verify -> DEBU 463d Verify: sig = 00000000 30 45 02 21 00 e3 53 1f 6a 31 3a 12 8a 9e 16 df |0E.!..S.j1:.....| +00000010 70 49 c1 98 91 94 a6 3c dd 51 6c ad c2 38 ac 1f |pI.....<.Ql..8..| +00000020 45 49 c5 7f 09 02 20 1d ad 14 68 a3 41 e3 67 95 |EI.... ...h.A.g.| +00000030 17 07 0c 79 35 b9 81 16 26 ff 73 b5 70 67 b5 26 |...y5...&.s.pg.&| +00000040 86 01 4f b2 60 e9 82 |..O.`..|" +"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463e Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 463f Exiting" +"2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4640 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4641 Verify: digest = 00000000 b7 2c 93 cd 94 d2 62 3f 26 7e b6 3f 6e 6c a4 21 |.,....b?&~.?nl.!| +00000010 f9 00 64 30 12 c8 18 fe 18 97 05 25 2c fd ef 4b |..d0.......%,..K|" +"2019-07-20 02:40:56.289 UTC [msp.identity] Verify -> DEBU 4642 Verify: sig = 00000000 30 45 02 21 00 f7 82 aa 35 1b 1d 8a 20 c6 82 0c |0E.!....5... ...| +00000010 b8 6e a7 28 0e c6 b8 5d 55 7a 63 e7 f9 10 4c 99 |.n.(...]Uzc...L.| +00000020 e0 78 2e 32 33 02 20 1a 84 70 95 ad 02 84 42 2c |.x.23. ..p....B,| +00000030 2c db 98 59 17 54 81 94 86 17 7d e1 4b b8 de c5 |,..Y.T....}.K...| +00000040 c9 d4 ba fc 26 f5 21 |....&.!|" +"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4643 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.289 UTC [gossip.discovery] isSentByMe -> DEBU 4644 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.289 UTC [gossip.discovery] handleAliveMessage -> DEBU 4645 Exiting" +"2019-07-20 02:40:56.289 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4646 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:56.289 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" +"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.289 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 464e 0xc0045c1640 gate 1563590456289653200 evaluation starts" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 464f 0xc0045c1640 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4650 0xc0045c1640 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4651 0xc0045c1640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4652 0xc0045c1640 principal evaluation fails" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4653 0xc0045c1640 gate 1563590456289653200 evaluation fails" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.289 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func1 -> DEBU 4657 0xc0045c1e80 gate 1563590456289889200 evaluation starts" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4658 0xc0045c1e80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 4659 0xc0045c1e80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.289 UTC [cauthdsl] func2 -> DEBU 465a 0xc0045c1e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 465b 0xc0045c1e80 principal evaluation fails" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 465c 0xc0045c1e80 gate 1563590456289889200 evaluation fails" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 465f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4660 0xc0045d46c0 gate 1563590456290124200 evaluation starts" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4661 0xc0045d46c0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4662 0xc0045d46c0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4663 0xc0045d46c0 principal matched by identity 0" +"2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4664 Verify: digest = 00000000 c5 3f e7 ed 5d ed 6b e6 c4 00 af 76 54 a4 0a bb |.?..].k....vT...| +00000010 0a d6 d0 46 33 68 dd 86 70 ea 9c b2 9f 47 91 8e |...F3h..p....G..|" +"2019-07-20 02:40:56.290 UTC [msp.identity] Verify -> DEBU 4665 Verify: sig = 00000000 30 44 02 20 1f 2c ce 2e 2c 51 39 50 93 9d 7d 62 |0D. .,..,Q9P..}b| +00000010 24 00 9f bc 38 2d 8d 77 fd 62 36 7b db 0f 42 4d |$...8-.w.b6{..BM| +00000020 2d 3a 7c c6 02 20 28 3a 69 09 76 b3 4d d9 24 2b |-:|.. (:i.v.M.$+| +00000030 ce 3b 98 e5 98 83 99 79 8e 0e ae 37 b5 6c 88 07 |.;.....y...7.l..| +00000040 94 ae 7c fe f6 e1 |..|...|" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func2 -> DEBU 4666 0xc0045d46c0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.290 UTC [cauthdsl] func1 -> DEBU 4667 0xc0045d46c0 gate 1563590456290124200 evaluation succeeds" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4668 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 4669 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.290 UTC [policies] Evaluate -> DEBU 466b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleAliveMessage -> DEBU 466d Exiting" +"2019-07-20 02:40:56.290 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466e Exiting" +"2019-07-20 02:40:56.345 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.345 UTC [gossip.pull] HandleMessage -> DEBU 4670 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.346 UTC [gossip.pull] SendDigest -> DEBU 4671 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:56.346 UTC [gossip.gossip] handleMessage -> DEBU 4672 Exiting" +"2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4673 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.361 UTC [gossip.gossip] handleMessage -> DEBU 4674 Exiting" +"2019-07-20 02:40:56.361 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4675 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.361 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4676 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4677 Verify: digest = 00000000 fa ab 73 5c f5 93 a1 b9 90 e2 8f 60 be 96 af ac |..s\.......`....| +00000010 0d 2e 82 19 75 db 5f 9a 3a 3f ba 59 fb 42 f7 78 |....u._.:?.Y.B.x|" +"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4678 Verify: sig = 00000000 30 45 02 21 00 ff 22 db 53 30 ca 08 2d 4b 6e bc |0E.!..".S0..-Kn.| +00000010 cb e8 e4 ed f2 a2 7e 51 f5 f2 33 63 30 39 09 9b |......~Q..3c09..| +00000020 93 47 20 9f 79 02 20 60 f1 a2 2b f8 d8 d2 5c d7 |.G .y. `..+...\.| +00000030 d5 d5 e1 34 23 fd 9b 89 ea 22 f6 60 17 b7 ce 85 |...4#....".`....| +00000040 78 ba 3e 8b aa b9 d9 |x.>....|" +"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 4679 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:40:56.361 UTC [msp.identity] Verify -> DEBU 467a Verify: sig = 00000000 30 44 02 20 05 cf 79 80 3d 45 b3 f7 3d 3b 60 b3 |0D. ..y.=E..=;`.| +00000010 72 86 c7 75 d4 53 ad 9f 97 86 aa 64 6e 5e 0e 1c |r..u.S.....dn^..| +00000020 a9 90 49 4d 02 20 22 09 d5 04 3f d4 c0 cb b6 62 |..IM. "...?....b| +00000030 cf f5 e6 ae 38 be b6 98 b7 11 56 d2 42 e8 68 ac |....8.....V.B.h.| +00000040 3a d7 07 37 b7 c6 |:..7..|" +"2019-07-20 02:40:56.361 UTC [gossip.discovery] handleAliveMessage -> DEBU 467b Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:40:56.361 UTC [gossip.discovery] learnExistingMembers -> DEBU 467d updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467e Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 467f Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:56.362 UTC [gossip.discovery] learnExistingMembers -> DEBU 4680 Exiting" +"2019-07-20 02:40:56.362 UTC [gossip.discovery] handleAliveMessage -> DEBU 4681 Exiting" +"2019-07-20 02:40:56.362 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4682 Exiting" +"2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4683 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4684 Obtaining identity" +"2019-07-20 02:40:56.362 UTC [msp] DeserializeIdentity -> DEBU 4685 Obtaining identity" +"2019-07-20 02:40:56.362 UTC [gossip.comm] Send -> DEBU 4686 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.362 UTC [gossip.discovery] sendMemResponse -> DEBU 4687 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" secret_envelope: > alive: " +"2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4688 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.362 UTC [gossip.comm] sendToEndpoint -> DEBU 4689 Exiting" +"2019-07-20 02:40:56.584 UTC [gossip.comm] func1 -> DEBU 468a Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.585 UTC [gossip.gossip] handleMessage -> DEBU 468c Exiting" +"2019-07-20 02:40:56.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 468d Got message: GossipMessage: tag:EMPTY mem_req:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 468e Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:56.585 UTC [msp] DeserializeIdentity -> DEBU 468f Obtaining identity" +"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4690 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4691 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4692 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4693 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4694 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.585 UTC [policies] Evaluate -> DEBU 4695 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 4696 0xc00460a820 gate 1563590456585620000 evaluation starts" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4697 0xc00460a820 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4698 0xc00460a820 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 4699 0xc00460a820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func2 -> DEBU 469a 0xc00460a820 principal evaluation fails" +"2019-07-20 02:40:56.585 UTC [cauthdsl] func1 -> DEBU 469b 0xc00460a820 gate 1563590456585620000 evaluation fails" +"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 469e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 469f 0xc00460b060 gate 1563590456586257100 evaluation starts" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a0 0xc00460b060 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a1 0xc00460b060 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a2 0xc00460b060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func2 -> DEBU 46a3 0xc00460b060 principal evaluation fails" +"2019-07-20 02:40:56.586 UTC [cauthdsl] func1 -> DEBU 46a4 0xc00460b060 gate 1563590456586257100 evaluation fails" +"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.586 UTC [policies] Evaluate -> DEBU 46a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.587 UTC [policies] Evaluate -> DEBU 46a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.587 UTC [cauthdsl] func1 -> DEBU 46a8 0xc00460b8a0 gate 1563590456587959800 evaluation starts" +"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46a9 0xc00460b8a0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46aa 0xc00460b8a0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.588 UTC [cauthdsl] func2 -> DEBU 46ab 0xc00460b8a0 principal matched by identity 0" +"2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ac Verify: digest = 00000000 1d ed 21 e4 a5 0c 7e 85 37 55 19 44 7f 43 9b 42 |..!...~.7U.D.C.B| +00000010 a3 96 63 da 16 62 19 0e 1c 46 2f 31 f2 3a 5a 12 |..c..b...F/1.:Z.|" +"2019-07-20 02:40:56.590 UTC [msp.identity] Verify -> DEBU 46ad Verify: sig = 00000000 30 44 02 20 4d 93 9d d4 48 e7 d0 dc ac 30 00 94 |0D. M...H....0..| +00000010 97 3e ac 27 2a 5e a5 d6 36 4b f1 ef cf 66 ad df |.>.'*^..6K...f..| +00000020 a5 36 c3 47 02 20 76 dd 44 92 0c 6c a8 3b 8a d8 |.6.G. v.D..l.;..| +00000030 83 a0 dd 52 97 2f cd 8b ab 36 c9 1f 2b e8 45 15 |...R./...6..+.E.| +00000040 bd e8 1f 15 3d e7 |....=.|" +"2019-07-20 02:40:56.591 UTC [cauthdsl] func2 -> DEBU 46ae 0xc00460b8a0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.591 UTC [cauthdsl] func1 -> DEBU 46af 0xc00460b8a0 gate 1563590456587959800 evaluation succeeds" +"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.591 UTC [policies] Evaluate -> DEBU 46b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 46b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b6 updating membership: timestamp: " +"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b7 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:56.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 46b9 Exiting" +"2019-07-20 02:40:56.594 UTC [gossip.discovery] handleAliveMessage -> DEBU 46ba Exiting" +"2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46bc Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bd Obtaining identity" +"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46be Obtaining identity" +"2019-07-20 02:40:56.595 UTC [msp] DeserializeIdentity -> DEBU 46bf Obtaining identity" +"2019-07-20 02:40:56.595 UTC [gossip.comm] Send -> DEBU 46c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.595 UTC [gossip.discovery] sendMemResponse -> DEBU 46c1 Exiting, replying with alive:\254'*^\245\3266K\361\357\317f\255\337\2456\303G\002 v\335D\222\014l\250;\212\330\203\240\335R\227/\315\213\2536\311\037+\350E\025\275\350\037\025=\347" > alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020;" signature:"0E\002!\000\377\"\333S0\312\010-Kn\274\313\350\344\355\362\242~Q\365\3623c09\t\233\223G \237y\002 `\361\242+\370\330\322\\\327\325\325\3414#\375\233\211\352\"\366`\027\267\316\205x\272>\213\252\271\331" > alive: " +"2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.595 UTC [gossip.comm] sendToEndpoint -> DEBU 46c3 Exiting" +"2019-07-20 02:40:56.598 UTC [gossip.comm] func1 -> DEBU 46c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.598 UTC [gossip.gossip] handleMessage -> DEBU 46c5 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.598 UTC [gossip.pull] HandleMessage -> DEBU 46c6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" +"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c8 Obtaining identity" +"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46c9 Obtaining identity" +"2019-07-20 02:40:56.598 UTC [msp] DeserializeIdentity -> DEBU 46ca Obtaining identity" +"2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cb Obtaining identity" +"2019-07-20 02:40:56.599 UTC [msp] DeserializeIdentity -> DEBU 46cc Obtaining identity" +"2019-07-20 02:40:56.599 UTC [gossip.pull] SendDigest -> DEBU 46cd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:40:56.599 UTC [gossip.gossip] handleMessage -> DEBU 46ce Exiting" +"2019-07-20 02:40:56.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46bb Exiting" +"2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" +"2019-07-20 02:40:56.682 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" +"2019-07-20 02:40:56.682 UTC [gossip.comm] Send -> DEBU 46d1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.682 UTC [gossip.comm] sendToEndpoint -> DEBU 46d3 Exiting" +"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d5 Exiting" +"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.683 UTC [gossip.comm] sendToEndpoint -> DEBU 46d7 Exiting" +"2019-07-20 02:40:56.685 UTC [gossip.comm] func1 -> DEBU 46d8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.686 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" +"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" +"2019-07-20 02:40:56.686 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" +"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.686 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.686 UTC [cauthdsl] func1 -> DEBU 46e3 0xc00461bbc0 gate 1563590456686774400 evaluation starts" +"2019-07-20 02:40:56.686 UTC [cauthdsl] func2 -> DEBU 46e4 0xc00461bbc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e5 0xc00461bbc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e6 0xc00461bbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46e7 0xc00461bbc0 principal evaluation fails" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46e8 0xc00461bbc0 gate 1563590456686774400 evaluation fails" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46ec 0xc00464a400 gate 1563590456687367200 evaluation starts" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ed 0xc00464a400 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ee 0xc00464a400 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46ef 0xc00464a400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func2 -> DEBU 46f0 0xc00464a400 principal evaluation fails" +"2019-07-20 02:40:56.687 UTC [cauthdsl] func1 -> DEBU 46f1 0xc00464a400 gate 1563590456687367200 evaluation fails" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.687 UTC [policies] Evaluate -> DEBU 46f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.688 UTC [cauthdsl] func1 -> DEBU 46f5 0xc00464ac40 gate 1563590456687994900 evaluation starts" +"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00464ac40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00464ac40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.688 UTC [cauthdsl] func2 -> DEBU 46f8 0xc00464ac40 principal matched by identity 0" +"2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46f9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:56.696 UTC [msp.identity] Verify -> DEBU 46fa Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:56.696 UTC [cauthdsl] func2 -> DEBU 46fb 0xc00464ac40 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.696 UTC [cauthdsl] func1 -> DEBU 46fc 0xc00464ac40 gate 1563590456687994900 evaluation succeeds" +"2019-07-20 02:40:56.696 UTC [policies] Evaluate -> DEBU 46fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 46ff Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.697 UTC [policies] Evaluate -> DEBU 4700 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4701 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:56.697 UTC [msp.identity] Verify -> DEBU 4702 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4703 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:56.698 UTC [msp.identity] Verify -> DEBU 4704 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +"2019-07-20 02:40:56.699 UTC [gossip.comm] func1 -> DEBU 4706 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.699 UTC [msp] DeserializeIdentity -> DEBU 4707 Obtaining identity" +"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4709 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.700 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 470a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.700 UTC [policies] Evaluate -> DEBU 470b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 470d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 470e 0xc004661250 gate 1563590456701197200 evaluation starts" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 470f 0xc004661250 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4710 0xc004661250 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4711 0xc004661250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func2 -> DEBU 4712 0xc004661250 principal evaluation fails" +"2019-07-20 02:40:56.701 UTC [cauthdsl] func1 -> DEBU 4713 0xc004661250 gate 1563590456701197200 evaluation fails" +"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4714 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4715 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.701 UTC [policies] Evaluate -> DEBU 4716 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4717 0xc004661a90 gate 1563590456702044300 evaluation starts" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4718 0xc004661a90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4719 0xc004661a90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471a 0xc004661a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 471b 0xc004661a90 principal evaluation fails" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 471c 0xc004661a90 gate 1563590456702044300 evaluation fails" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 471f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4720 0xc0046782d0 gate 1563590456702330000 evaluation starts" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4721 0xc0046782d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4722 0xc0046782d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4723 0xc0046782d0 principal matched by identity 0" +"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4724 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 4725 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func2 -> DEBU 4726 0xc0046782d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.702 UTC [cauthdsl] func1 -> DEBU 4727 0xc0046782d0 gate 1563590456702330000 evaluation succeeds" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4728 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 4729 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.702 UTC [policies] Evaluate -> DEBU 472b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472c Exiting" +"2019-07-20 02:40:56.702 UTC [gossip.gossip] handleMessage -> DEBU 472d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.702 UTC [msp.identity] Verify -> DEBU 472e Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 472f Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4730 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:56.703 UTC [msp.identity] Verify -> DEBU 4731 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4732 Obtaining identity" +"2019-07-20 02:40:56.703 UTC [msp] DeserializeIdentity -> DEBU 4733 Obtaining identity" +"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4734 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4735 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4736 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4737 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4738 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4739 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473a 0xc00468cb20 gate 1563590456703708200 evaluation starts" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473b 0xc00468cb20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473c 0xc00468cb20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473d 0xc00468cb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 473e 0xc00468cb20 principal evaluation fails" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 473f 0xc00468cb20 gate 1563590456703708200 evaluation fails" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4740 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4741 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.703 UTC [policies] Evaluate -> DEBU 4742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func1 -> DEBU 4743 0xc00468d360 gate 1563590456703960000 evaluation starts" +"2019-07-20 02:40:56.703 UTC [cauthdsl] func2 -> DEBU 4744 0xc00468d360 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4745 0xc00468d360 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4746 0xc00468d360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4747 0xc00468d360 principal evaluation fails" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4748 0xc00468d360 gate 1563590456703960000 evaluation fails" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 474b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 474c 0xc00468dba0 gate 1563590456704206600 evaluation starts" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474d 0xc00468dba0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474e 0xc00468dba0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 474f 0xc00468dba0 principal matched by identity 0" +"2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4750 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:56.704 UTC [msp.identity] Verify -> DEBU 4751 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func2 -> DEBU 4752 0xc00468dba0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4753 0xc00468dba0 gate 1563590456704206600 evaluation succeeds" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4756 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 4757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4758 Obtaining identity" +"2019-07-20 02:40:56.704 UTC [msp] DeserializeIdentity -> DEBU 4759 Obtaining identity" +"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 475a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 475c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.704 UTC [policies] Evaluate -> DEBU 475f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.704 UTC [cauthdsl] func1 -> DEBU 4760 0xc0046a1370 gate 1563590456704980700 evaluation starts" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4761 0xc0046a1370 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4762 0xc0046a1370 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4763 0xc0046a1370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4764 0xc0046a1370 principal evaluation fails" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4765 0xc0046a1370 gate 1563590456704980700 evaluation fails" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4766 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4768 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4769 0xc0046a1bb0 gate 1563590456705230500 evaluation starts" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476a 0xc0046a1bb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476b 0xc0046a1bb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476c 0xc0046a1bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 476d 0xc0046a1bb0 principal evaluation fails" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 476e 0xc0046a1bb0 gate 1563590456705230500 evaluation fails" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 476f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4770 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.705 UTC [policies] Evaluate -> DEBU 4771 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func1 -> DEBU 4772 0xc0046ae3f0 gate 1563590456705481100 evaluation starts" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4773 0xc0046ae3f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4774 0xc0046ae3f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.705 UTC [cauthdsl] func2 -> DEBU 4775 0xc0046ae3f0 principal matched by identity 0" +"2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4776 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:56.705 UTC [msp.identity] Verify -> DEBU 4777 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:56.709 UTC [cauthdsl] func2 -> DEBU 4778 0xc0046ae3f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.709 UTC [cauthdsl] func1 -> DEBU 4779 0xc0046ae3f0 gate 1563590456705481100 evaluation succeeds" +"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.709 UTC [policies] Evaluate -> DEBU 477d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477e Exiting" +"2019-07-20 02:40:56.709 UTC [gossip.gossip] handleMessage -> DEBU 477f Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4780 Obtaining identity" +"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4781 Obtaining identity" +"2019-07-20 02:40:56.709 UTC [msp] DeserializeIdentity -> DEBU 4782 Obtaining identity" +"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4783 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4784 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4785 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4786 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4787 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4788 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 4789 0xc0046aff00 gate 1563590456710676900 evaluation starts" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478a 0xc0046aff00 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478b 0xc0046aff00 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478c 0xc0046aff00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func2 -> DEBU 478d 0xc0046aff00 principal evaluation fails" +"2019-07-20 02:40:56.710 UTC [cauthdsl] func1 -> DEBU 478e 0xc0046aff00 gate 1563590456710676900 evaluation fails" +"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 478f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.710 UTC [policies] Evaluate -> DEBU 4790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4791 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4792 0xc0046ce740 gate 1563590456711223700 evaluation starts" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4793 0xc0046ce740 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4794 0xc0046ce740 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4795 0xc0046ce740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 4796 0xc0046ce740 principal evaluation fails" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 4797 0xc0046ce740 gate 1563590456711223700 evaluation fails" +"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4798 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 4799 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.711 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func1 -> DEBU 479b 0xc0046cef80 gate 1563590456711529900 evaluation starts" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479c 0xc0046cef80 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479d 0xc0046cef80 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.711 UTC [cauthdsl] func2 -> DEBU 479e 0xc0046cef80 principal matched by identity 0" +"2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 479f Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:40:56.711 UTC [msp.identity] Verify -> DEBU 47a0 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:40:56.713 UTC [cauthdsl] func2 -> DEBU 47a1 0xc0046cef80 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.713 UTC [cauthdsl] func1 -> DEBU 47a2 0xc0046cef80 gate 1563590456711529900 evaluation succeeds" +"2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.715 UTC [policies] Evaluate -> DEBU 47a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a5 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.723 UTC [policies] Evaluate -> DEBU 47a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.726 UTC [msp.identity] Verify -> DEBU 47a7 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:40:56.727 UTC [msp.identity] Verify -> DEBU 47a8 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47a9 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:40:56.730 UTC [msp.identity] Verify -> DEBU 47aa Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ab Obtaining identity" +"2019-07-20 02:40:56.730 UTC [msp] DeserializeIdentity -> DEBU 47ac Obtaining identity" +"2019-07-20 02:40:56.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47ae Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47af Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b3 0xc0046df590 gate 1563590456731249300 evaluation starts" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b4 0xc0046df590 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b5 0xc0046df590 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b6 0xc0046df590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47b7 0xc0046df590 principal evaluation fails" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47b8 0xc0046df590 gate 1563590456731249300 evaluation fails" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47b9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47bc 0xc0046dfdd0 gate 1563590456731619200 evaluation starts" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bd 0xc0046dfdd0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47be 0xc0046dfdd0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47bf 0xc0046dfdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func2 -> DEBU 47c0 0xc0046dfdd0 principal evaluation fails" +"2019-07-20 02:40:56.731 UTC [cauthdsl] func1 -> DEBU 47c1 0xc0046dfdd0 gate 1563590456731619200 evaluation fails" +"2019-07-20 02:40:56.731 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47c5 0xc0046f2610 gate 1563590456732071400 evaluation starts" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c6 0xc0046f2610 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c7 0xc0046f2610 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47c8 0xc0046f2610 principal matched by identity 0" +"2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:40:56.732 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func2 -> DEBU 47cb 0xc0046f2610 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.732 UTC [cauthdsl] func1 -> DEBU 47cc 0xc0046f2610 gate 1563590456732071400 evaluation succeeds" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.732 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.732 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" +"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d2 Obtaining identity" +"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d3 Obtaining identity" +"2019-07-20 02:40:56.760 UTC [gossip.pull] Hello -> DEBU 47d4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d5 Obtaining identity" +"2019-07-20 02:40:56.760 UTC [msp] DeserializeIdentity -> DEBU 47d6 Obtaining identity" +"2019-07-20 02:40:56.760 UTC [gossip.comm] Send -> DEBU 47d7 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.760 UTC [gossip.comm] sendToEndpoint -> DEBU 47d9 Exiting" +"2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47da Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.761 UTC [gossip.pull] HandleMessage -> DEBU 47db GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.761 UTC [gossip.gossip] handleMessage -> DEBU 47dc Exiting" +"2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47dd Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47de Obtaining identity" +"2019-07-20 02:40:56.843 UTC [msp] DeserializeIdentity -> DEBU 47df Obtaining identity" +"2019-07-20 02:40:56.843 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +"2019-07-20 02:40:56.904 UTC [gossip.gossip] handleMessage -> DEBU 47e1 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.904 UTC [gossip.pull] HandleMessage -> DEBU 47e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-07-20 02:40:56.905 UTC [gossip.pull] SendDigest -> DEBU 47e3 Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:40:56.905 UTC [gossip.gossip] handleMessage -> DEBU 47e4 Exiting" +"2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47e5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-07-20 02:40:56.981 UTC [gossip.election] IsLeader -> DEBU 47e6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-07-20 02:40:56.981 UTC [msp] GetDefaultSigningIdentity -> DEBU 47e7 Obtaining default signing identity" +"2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08ECCFA2A2ACA5BFD91510101801 " +"2019-07-20 02:40:56.981 UTC [msp.identity] Sign -> DEBU 47e9 Sign: digest: 06C4339B219403DF3CB6A5301108973FE10B0835912113BBA8296AE34A98D8D2 " +"2019-07-20 02:40:56.981 UTC [gossip.election] waitForInterrupt -> DEBU 47ea c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47eb Obtaining identity" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ec Obtaining identity" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ed Obtaining identity" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47ee Obtaining identity" +"2019-07-20 02:40:56.989 UTC [gossip.comm] Send -> DEBU 47ef Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f0 Obtaining identity" +"2019-07-20 02:40:56.989 UTC [msp] DeserializeIdentity -> DEBU 47f1 Obtaining identity" +"2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.989 UTC [gossip.comm] sendToEndpoint -> DEBU 47f3 Exiting" +"2019-07-20 02:40:56.991 UTC [gossip.comm] func1 -> DEBU 47f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f5 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.991 UTC [gossip.gossip] handleMessage -> DEBU 47f6 Exiting" +"2019-07-20 02:40:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.991 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47f8 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:56.991 UTC [msp] DeserializeIdentity -> DEBU 47f9 Obtaining identity" +"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.991 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 47ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4800 0xc00472cd70 gate 1563590456991667300 evaluation starts" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4801 0xc00472cd70 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4802 0xc00472cd70 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4803 0xc00472cd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 4804 0xc00472cd70 principal evaluation fails" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4805 0xc00472cd70 gate 1563590456991667300 evaluation fails" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4806 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:56.991 UTC [policies] Evaluate -> DEBU 4808 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func1 -> DEBU 4809 0xc00472d5b0 gate 1563590456991920000 evaluation starts" +"2019-07-20 02:40:56.991 UTC [cauthdsl] func2 -> DEBU 480a 0xc00472d5b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480b 0xc00472d5b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480c 0xc00472d5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 480d 0xc00472d5b0 principal evaluation fails" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 480e 0xc00472d5b0 gate 1563590456991920000 evaluation fails" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 480f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 4811 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4812 0xc00472ddf0 gate 1563590456992222000 evaluation starts" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4813 0xc00472ddf0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4814 0xc00472ddf0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4815 0xc00472ddf0 principal matched by identity 0" +"2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 24 c2 3a 95 db af e0 b6 1a 56 e0 d9 cb e0 f4 e9 |$.:......V......| +00000010 d8 5d bc 2a b8 63 83 cd f7 6d 37 bd 16 5a ce e6 |.].*.c...m7..Z..|" +"2019-07-20 02:40:56.992 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 45 02 21 00 9f 2c 9a 33 cd 0c 2d d4 a0 d5 3f |0E.!..,.3..-...?| +00000010 bd 17 1a e4 90 6c 53 57 eb 17 0f 56 6a 55 09 7d |.....lSW...VjU.}| +00000020 80 a3 61 17 c7 02 20 37 51 77 a5 ff 73 35 7a b2 |..a... 7Qw..s5z.| +00000030 68 c7 98 54 cd d1 2b 90 81 54 fb 85 98 87 a5 f2 |h..T..+..T......| +00000040 cd bb fa 10 81 05 77 |......w|" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func2 -> DEBU 4818 0xc00472ddf0 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:56.992 UTC [cauthdsl] func1 -> DEBU 4819 0xc00472ddf0 gate 1563590456992222000 evaluation succeeds" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:56.992 UTC [policies] Evaluate -> DEBU 481d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 481e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 481f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4820 updating membership: timestamp: " +"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4821 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4822 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] learnExistingMembers -> DEBU 4823 Exiting" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleAliveMessage -> DEBU 4824 Exiting" +"2019-07-20 02:40:56.992 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4825 Exiting" +"2019-07-20 02:40:56.993 UTC [gossip.comm] func1 -> DEBU 4826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4827 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.993 UTC [gossip.gossip] handleMessage -> DEBU 4828 Exiting" +"2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.993 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482a Exiting" +"2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482b Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.996 UTC [gossip.gossip] handleMessage -> DEBU 482c Exiting" +"2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 482e Exiting" +"2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 482f Obtaining identity" +"2019-07-20 02:40:57.005 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4833 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4834 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4835 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4836 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:57.006 UTC [msp] DeserializeIdentity -> DEBU 4837 Obtaining identity" +"2019-07-20 02:40:57.006 UTC [gossip.comm] Send -> DEBU 4838 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 4839 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.006 UTC [gossip.comm] sendToEndpoint -> DEBU 483a Exiting" +"2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.007 UTC [gossip.comm] sendToEndpoint -> DEBU 483c Exiting" +"2019-07-20 02:40:57.007 UTC [gossip.comm] func1 -> DEBU 483d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:57.007 UTC [gossip.gossip] handleMessage -> DEBU 483e Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:57.007 UTC [msp] DeserializeIdentity -> DEBU 483f Obtaining identity" +"2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4840 Obtaining identity" +"2019-07-20 02:40:57.008 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +"2019-07-20 02:40:57.008 UTC [gossip.gossip] handleMessage -> DEBU 4842 Exiting" +"2019-07-20 02:40:57.148 UTC [gossip.comm] func1 -> DEBU 4843 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:57.148 UTC [gossip.gossip] handleMessage -> DEBU 4844 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4845 Obtaining identity" +"2019-07-20 02:40:57.148 UTC [msp] DeserializeIdentity -> DEBU 4846 Obtaining identity" +"2019-07-20 02:40:57.149 UTC [msp] DeserializeIdentity -> DEBU 4847 Obtaining identity" +"2019-07-20 02:40:57.149 UTC [gossip.gossip] handleMessage -> DEBU 4848 Exiting" +"2019-07-20 02:40:57.295 UTC [msp] GetDefaultSigningIdentity -> DEBU 4849 Obtaining default signing identity" +"2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151035 " +"2019-07-20 02:40:57.295 UTC [msp.identity] Sign -> DEBU 484b Sign: digest: 1E2D2864C190B8E158F6625B3CCF586244BD30D9DA5BCDDC88828153AA686637 " +"2019-07-20 02:40:57.296 UTC [msp] GetDefaultSigningIdentity -> DEBU 484c Obtaining default signing identity" +"2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:40:57.296 UTC [msp.identity] Sign -> DEBU 484e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:40:57.296 UTC [gossip.discovery] periodicalSendAlive -> DEBU 484f Sleeping 5s" +"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4850 Obtaining identity" +"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4851 Obtaining identity" +"2019-07-20 02:40:57.298 UTC [msp] DeserializeIdentity -> DEBU 4852 Obtaining identity" +"2019-07-20 02:40:57.298 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4854 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:57.299 UTC [msp] DeserializeIdentity -> DEBU 4855 Obtaining identity" +"2019-07-20 02:40:57.299 UTC [gossip.comm] Send -> DEBU 4856 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Exiting" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.299 UTC [gossip.comm] sendToEndpoint -> DEBU 485c Exiting" +"2019-07-20 02:40:57.340 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.341 UTC [gossip.gossip] handleMessage -> DEBU 485e Exiting" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 485f Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.341 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4860 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4861 Verify: digest = 00000000 c3 88 5c 67 b0 0f 5e a2 52 b8 70 38 4f b8 a6 3f |..\g..^.R.p8O..?| +00000010 1c f1 17 3b e4 ce 70 11 db 63 69 c2 e6 f3 fd 92 |...;..p..ci.....|" +"2019-07-20 02:40:57.341 UTC [msp.identity] Verify -> DEBU 4862 Verify: sig = 00000000 30 44 02 20 23 3b 13 fe 9d 99 21 bc 0c 23 34 17 |0D. #;....!..#4.| +00000010 28 43 4c ac c7 86 67 da 5d 8d 0e df 86 63 45 39 |(CL...g.]....cE9| +00000020 a2 0c f1 62 02 20 14 37 bb cd c4 a6 e3 db c2 fb |...b. .7........| +00000030 83 74 aa 46 79 ea 11 39 8c 26 f0 ae 92 61 7a 50 |.t.Fy..9.&...azP| +00000040 90 9b 5c 1c e4 cf |..\...|" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4863 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4864 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4865 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4866 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4867 Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Exiting" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleAliveMessage -> DEBU 4869 Exiting" +"2019-07-20 02:40:57.341 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486a Exiting" +"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486b Obtaining identity" +"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486c Obtaining identity" +"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" +"2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:57.342 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +"2019-07-20 02:40:57.342 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" +"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.342 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" +"2019-07-20 02:40:57.344 UTC [gossip.comm] func1 -> DEBU 4875 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4876 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.344 UTC [gossip.gossip] handleMessage -> DEBU 4877 Exiting" +"2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4878 Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.344 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4879 Exiting" +"2019-07-20 02:40:57.351 UTC [gossip.comm] func1 -> DEBU 487a Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487b Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.351 UTC [gossip.gossip] handleMessage -> DEBU 487c Exiting" +"2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Got message: GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:40:57.351 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487e Exiting" +"2019-07-20 02:40:57.531 UTC [gossip.comm] func1 -> DEBU 487f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4880 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.531 UTC [gossip.gossip] handleMessage -> DEBU 4881 Exiting" +"2019-07-20 02:40:57.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.531 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:40:57.531 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" +"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:57.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:57.531 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:57.531 UTC [cauthdsl] func1 -> DEBU 488b 0xc0047a8300 gate 1563590457531851900 evaluation starts" +"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488c 0xc0047a8300 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488d 0xc0047a8300 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:57.531 UTC [cauthdsl] func2 -> DEBU 488e 0xc0047a8300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 488f 0xc0047a8300 principal evaluation fails" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4890 0xc0047a8300 gate 1563590457531851900 evaluation fails" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4894 0xc0047a8b40 gate 1563590457532213900 evaluation starts" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4895 0xc0047a8b40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4896 0xc0047a8b40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4897 0xc0047a8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 4898 0xc0047a8b40 principal evaluation fails" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 4899 0xc0047a8b40 gate 1563590457532213900 evaluation fails" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 489c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 489d 0xc0047a9380 gate 1563590457532574200 evaluation starts" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489e 0xc0047a9380 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 489f 0xc0047a9380 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a0 0xc0047a9380 principal matched by identity 0" +"2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a1 Verify: digest = 00000000 89 c9 04 02 9b 9c e1 a8 91 bf b0 ae 1d b1 4c a7 |..............L.| +00000010 b7 fd 2f 57 37 90 00 08 24 ef 7e 37 1d 53 21 e4 |../W7...$.~7.S!.|" +"2019-07-20 02:40:57.532 UTC [msp.identity] Verify -> DEBU 48a2 Verify: sig = 00000000 30 45 02 21 00 86 03 13 83 09 3d 22 96 40 5c 07 |0E.!......=".@\.| +00000010 cc fd a6 78 83 0e d3 6e 4f 96 fc cb ae 90 52 9b |...x...nO.....R.| +00000020 09 c5 70 0c 88 02 20 21 f0 da 32 e3 1b 9b e1 ed |..p... !..2.....| +00000030 72 5c 8d 98 c8 4d e5 c3 2b 1f d7 c1 cc 62 e5 7c |r\...M..+....b.|| +00000040 e2 18 3a 40 39 24 2d |..:@9$-|" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func2 -> DEBU 48a3 0xc0047a9380 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:57.532 UTC [cauthdsl] func1 -> DEBU 48a4 0xc0047a9380 gate 1563590457532574200 evaluation succeeds" +"2019-07-20 02:40:57.532 UTC [policies] Evaluate -> DEBU 48a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a7 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:57.533 UTC [policies] Evaluate -> DEBU 48a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48aa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ab updating membership: timestamp: " +"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ac Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ad Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ae Exiting" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 48af Exiting" +"2019-07-20 02:40:57.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b0 Exiting" +"2019-07-20 02:40:57.539 UTC [gossip.comm] func1 -> DEBU 48b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b2 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b3 Exiting" +"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b5 Exiting" +"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b6 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.539 UTC [gossip.gossip] handleMessage -> DEBU 48b7 Exiting" +"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b9 Exiting" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48ba Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bb Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bc Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bd Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48be Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48bf Obtaining identity" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c0 Obtaining identity" +"2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:57.540 UTC [msp] DeserializeIdentity -> DEBU 48c2 Obtaining identity" +"2019-07-20 02:40:57.540 UTC [gossip.comm] Send -> DEBU 48c3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c5 Exiting" +"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:57.540 UTC [gossip.comm] sendToEndpoint -> DEBU 48c7 Exiting" +"2019-07-20 02:40:59.496 UTC [endorser] ProcessProposal -> DEBU 48c8 Entering: request from 172.18.0.9:58510" +"2019-07-20 02:40:59.496 UTC [protoutils] ValidateProposalMessage -> DEBU 48c9 ValidateProposalMessage starts for signed proposal 0xc0047f0050" +"2019-07-20 02:40:59.497 UTC [protoutils] validateChannelHeader -> DEBU 48ca validateChannelHeader info: header type 3" +"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cb begin" +"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48cd creator is valid" +"2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48ce Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| +00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" +"2019-07-20 02:40:59.497 UTC [msp.identity] Verify -> DEBU 48cf Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| +00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| +00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| +00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| +00000040 29 90 0c e3 52 6f |)...Ro|" +"2019-07-20 02:40:59.497 UTC [protoutils] checkSignatureFromCreator -> DEBU 48d0 exits successfully" +"2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d1 validateChaincodeProposalMessage starts for proposal 0xc0033408c0, header 0xc0047f0460" +"2019-07-20 02:40:59.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 48d2 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-07-20 02:40:59.498 UTC [endorser] preProcess -> DEBU 48d3 [][01686455] processing txid: 0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9" +"2019-07-20 02:40:59.498 UTC [endorser] SimulateProposal -> DEBU 48d4 [][01686455] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:59.498 UTC [endorser] callChaincode -> INFO 48d5 [][01686455] Entry chaincode: name:"cscc" " +"2019-07-20 02:40:59.498 UTC [chaincode] Execute -> DEBU 48d6 Entry" +"2019-07-20 02:40:59.498 UTC [cscc] Invoke -> DEBU 48d7 Invoke function: GetChannels" +"2019-07-20 02:40:59.498 UTC [msp.identity] Verify -> DEBU 48d8 Verify: digest = 00000000 1d 45 9b 93 2d f4 42 d9 52 ca e9 c8 9e 51 27 36 |.E..-.B.R....Q'6| +00000010 cd f7 d8 94 97 25 64 91 6f 72 f7 c9 d6 ae 5f 3e |.....%d.or...._>|" +"2019-07-20 02:40:59.499 UTC [msp.identity] Verify -> DEBU 48d9 Verify: sig = 00000000 30 44 02 20 66 25 c2 bc 03 5b ff 4f 00 30 71 1e |0D. f%...[.O.0q.| +00000010 c2 eb 94 fc 77 b4 95 bb 5c 93 ac c2 53 1f 52 56 |....w...\...S.RV| +00000020 b2 17 a1 61 02 20 7d bc 19 2d 75 66 3c 06 ba 93 |...a. }..-uf<...| +00000030 a0 cc 2e b8 39 5f 5b 16 cc 4b 12 e8 be a0 a9 26 |....9_[..K.....&| +00000040 29 90 0c e3 52 6f |)...Ro|" +"2019-07-20 02:40:59.499 UTC [chaincode] handleMessage -> DEBU 48da [01686455] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:40:59.500 UTC [chaincode] Notify -> DEBU 48db [01686455] notifying Txid:0168645584149d7d35248ee1e1fa711483c01ad64ac198ad4f760d6114fd0cf9, channelID:" +"2019-07-20 02:40:59.500 UTC [chaincode] Execute -> DEBU 48dc Exit" +"2019-07-20 02:40:59.500 UTC [endorser] callChaincode -> INFO 48dd [][01686455] Exit chaincode: name:"cscc" (2ms)" +"2019-07-20 02:40:59.500 UTC [endorser] SimulateProposal -> DEBU 48de [][01686455] Exit" +"2019-07-20 02:40:59.501 UTC [endorser] func1 -> DEBU 48df Exit: request from 172.18.0.9:58510" +"2019-07-20 02:40:59.501 UTC [comm.grpc.server] 1 -> INFO 48e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58510 grpc.code=OK grpc.call_duration=5.3749ms +"2019-07-20 02:40:59.508 UTC [grpc] warningf -> DEBU 48e1 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:58510: read: connection reset by peer" +"2019-07-20 02:40:59.509 UTC [grpc] infof -> DEBU 48e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:40:59.944 UTC [gossip.comm] func1 -> DEBU 48e3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.945 UTC [gossip.gossip] handleMessage -> DEBU 48e5 Exiting" +"2019-07-20 02:40:59.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e7 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:40:59.945 UTC [msp] DeserializeIdentity -> DEBU 48e8 Obtaining identity" +"2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:40:59.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48ea Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:59.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48eb Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:40:59.947 UTC [policies] Evaluate -> DEBU 48ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:40:59.948 UTC [policies] Evaluate -> DEBU 48ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:40:59.948 UTC [cauthdsl] func1 -> DEBU 48ef 0xc00480cab0 gate 1563590459948105600 evaluation starts" +"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f0 0xc00480cab0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f1 0xc00480cab0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f2 0xc00480cab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:40:59.948 UTC [cauthdsl] func2 -> DEBU 48f3 0xc00480cab0 principal evaluation fails" +"2019-07-20 02:40:59.949 UTC [cauthdsl] func1 -> DEBU 48f4 0xc00480cab0 gate 1563590459948105600 evaluation fails" +"2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:59.949 UTC [policies] Evaluate -> DEBU 48f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:40:59.950 UTC [policies] Evaluate -> DEBU 48f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:40:59.950 UTC [cauthdsl] func1 -> DEBU 48f8 0xc00480d2f0 gate 1563590459950225200 evaluation starts" +"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48f9 0xc00480d2f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fa 0xc00480d2f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:59.950 UTC [cauthdsl] func2 -> DEBU 48fb 0xc00480d2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:40:59.951 UTC [cauthdsl] func2 -> DEBU 48fc 0xc00480d2f0 principal evaluation fails" +"2019-07-20 02:40:59.951 UTC [cauthdsl] func1 -> DEBU 48fd 0xc00480d2f0 gate 1563590459950225200 evaluation fails" +"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 48ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:40:59.951 UTC [policies] Evaluate -> DEBU 4900 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:40:59.952 UTC [cauthdsl] func1 -> DEBU 4901 0xc00480db30 gate 1563590459952843400 evaluation starts" +"2019-07-20 02:40:59.952 UTC [cauthdsl] func2 -> DEBU 4902 0xc00480db30 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4903 0xc00480db30 processing identity 0 with bytes of 114b950" +"2019-07-20 02:40:59.953 UTC [cauthdsl] func2 -> DEBU 4904 0xc00480db30 principal matched by identity 0" +"2019-07-20 02:40:59.953 UTC [msp.identity] Verify -> DEBU 4905 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| +00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" +"2019-07-20 02:40:59.955 UTC [msp.identity] Verify -> DEBU 4906 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| +00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| +00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| +00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| +00000040 6a 9a bd 38 f0 c1 06 |j..8...|" +"2019-07-20 02:40:59.956 UTC [cauthdsl] func2 -> DEBU 4907 0xc00480db30 principal evaluation succeeds for identity 0" +"2019-07-20 02:40:59.956 UTC [cauthdsl] func1 -> DEBU 4908 0xc00480db30 gate 1563590459952843400 evaluation succeeds" +"2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 4909 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:59.956 UTC [policies] Evaluate -> DEBU 490a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490b Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:40:59.957 UTC [policies] Evaluate -> DEBU 490c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:40:59.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 490d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:40:59.958 UTC [gossip.discovery] learnExistingMembers -> DEBU 490e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-07-20 02:40:59.959 UTC [gossip.comm] func1 -> DEBU 490f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4910 updating membership: timestamp: " +"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4912 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:40:59.960 UTC [gossip.discovery] learnExistingMembers -> DEBU 4914 Exiting" +"2019-07-20 02:40:59.960 UTC [gossip.gossip] handleMessage -> DEBU 4911 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.961 UTC [gossip.pull] HandleMessage -> DEBU 4915 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 4916 Exiting" +"2019-07-20 02:40:59.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4918 Exiting" +"2019-07-20 02:40:59.961 UTC [msp] DeserializeIdentity -> DEBU 4917 Obtaining identity" +"2019-07-20 02:40:59.964 UTC [gossip.discovery] sendMemResponse -> DEBU 4919 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" " +"2019-07-20 02:40:59.967 UTC [msp] DeserializeIdentity -> DEBU 491a Obtaining identity" +"2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" +"2019-07-20 02:40:59.968 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" +"2019-07-20 02:40:59.969 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:40:59.969 UTC [gossip.discovery] sendMemResponse -> DEBU 491e Exiting, replying with alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020<" signature:"0D\002 #;\023\376\235\231!\274\014#4\027(CL\254\307\206g\332]\215\016\337\206cE9\242\014\361b\002 \0247\273\315\304\246\343\333\302\373\203t\252Fy\352\0219\214&\360\256\222azP\220\233\\\034\344\317" > alive: alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +"2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:40:59.969 UTC [gossip.comm] sendToEndpoint -> DEBU 4920 Exiting" +"2019-07-20 02:40:59.966 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" +"2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4922 Obtaining identity" +"2019-07-20 02:40:59.980 UTC [msp] DeserializeIdentity -> DEBU 4923 Obtaining identity" +"2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4924 Obtaining identity" +"2019-07-20 02:40:59.981 UTC [msp] DeserializeIdentity -> DEBU 4925 Obtaining identity" +"2019-07-20 02:40:59.981 UTC [gossip.pull] SendDigest -> DEBU 4926 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-07-20 02:40:59.982 UTC [gossip.gossip] handleMessage -> DEBU 4927 Exiting" +"2019-07-20 02:41:00.245 UTC [gossip.pull] Hello -> DEBU 4928 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 4929 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492a Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.246 UTC [gossip.pull] Hello -> DEBU 492c Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-07-20 02:41:00.246 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Exiting" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4932 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.246 UTC [gossip.comm] sendToEndpoint -> DEBU 4933 Exiting" +"2019-07-20 02:41:00.255 UTC [gossip.comm] func1 -> DEBU 4934 Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4935 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.255 UTC [gossip.pull] HandleMessage -> DEBU 4936 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.255 UTC [gossip.gossip] handleMessage -> DEBU 4937 Exiting" +"2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 4938 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.258 UTC [gossip.pull] HandleMessage -> DEBU 4939 GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" digests:"\304P=_m;\234\214\304_v~\204\241\331uJ\024k8)\365\221\2626h\2245\0226\323-" digests:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.258 UTC [gossip.gossip] handleMessage -> DEBU 493a Exiting" +"2019-07-20 02:41:00.259 UTC [gossip.comm] func1 -> DEBU 493b Got message: GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.262 UTC [gossip.gossip] handleMessage -> DEBU 493c Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.263 UTC [gossip.pull] HandleMessage -> DEBU 493d GossipMessage: tag:EMPTY data_dig:}\237\274\305Ad\323\212z\311Q2b\247" msg_type:IDENTITY_MSG > , Envelope: 154 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.263 UTC [gossip.gossip] handleMessage -> DEBU 493e Exiting" +"2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 493f Obtaining default signing identity" +"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4940 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08F0BEE4C58CA5BFD9151036 " +"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4941 Sign: digest: C2615889418FFCA163D06A93ADDC2E02FFD4AC5E6620C5DE7FC1307F4AC429DB " +"2019-07-20 02:41:00.283 UTC [msp] GetDefaultSigningIdentity -> DEBU 4942 Obtaining default signing identity" +"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4943 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-07-20 02:41:00.283 UTC [msp.identity] Sign -> DEBU 4944 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4945 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4946 Obtaining identity" +"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4947 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.284 UTC [msp] DeserializeIdentity -> DEBU 4948 Obtaining identity" +"2019-07-20 02:41:00.284 UTC [gossip.comm] Send -> DEBU 4949 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494b Exiting" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494d Exiting" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.284 UTC [gossip.comm] sendToEndpoint -> DEBU 494f Exiting" +"2019-07-20 02:41:00.292 UTC [gossip.comm] func1 -> DEBU 4950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4951 Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.292 UTC [gossip.gossip] handleMessage -> DEBU 4952 Exiting" +"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.292 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4954 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4955 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +"2019-07-20 02:41:00.292 UTC [msp.identity] Verify -> DEBU 4956 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +00000040 b0 e0 30 43 5c f1 |..0C\.|" +"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4957 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:41:00.292 UTC [gossip.discovery] isSentByMe -> DEBU 4958 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" +"2019-07-20 02:41:00.292 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" +"2019-07-20 02:41:00.293 UTC [gossip.comm] func1 -> DEBU 495b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495c Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 495d Exiting" +"2019-07-20 02:41:00.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 495f Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4960 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +"2019-07-20 02:41:00.293 UTC [msp.identity] Verify -> DEBU 4961 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +00000040 b0 e0 30 43 5c f1 |..0C\.|" +"2019-07-20 02:41:00.293 UTC [gossip.gossip] handleMessage -> DEBU 4962 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4963 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:41:00.294 UTC [gossip.discovery] isSentByMe -> DEBU 4964 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:41:00.294 UTC [gossip.discovery] handleAliveMessage -> DEBU 4965 Exiting" +"2019-07-20 02:41:00.294 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4966 Fetched identity of [134 63 17 89 59 46 154 90 87 224 109 211 126 195 255 165 173 109 214 169 133 127 220 174 1 64 83 176 30 94 117 189] from identity store" +"2019-07-20 02:41:00.294 UTC [msp] DeserializeIdentity -> DEBU 4967 Obtaining identity" +"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4969 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.294 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 496a Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 496d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 496e 0xc004879410 gate 1563590460294665100 evaluation starts" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 496f 0xc004879410 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4970 0xc004879410 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4971 0xc004879410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4972 0xc004879410 principal evaluation fails" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4973 0xc004879410 gate 1563590460294665100 evaluation fails" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4974 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4975 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.294 UTC [policies] Evaluate -> DEBU 4976 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func1 -> DEBU 4977 0xc004879c50 gate 1563590460294955900 evaluation starts" +"2019-07-20 02:41:00.294 UTC [cauthdsl] func2 -> DEBU 4978 0xc004879c50 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4979 0xc004879c50 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497a 0xc004879c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 497b 0xc004879c50 principal evaluation fails" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 497c 0xc004879c50 gate 1563590460294955900 evaluation fails" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 497f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4980 0xc004890490 gate 1563590460295191000 evaluation starts" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4981 0xc004890490 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4982 0xc004890490 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4983 0xc004890490 principal matched by identity 0" +"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4984 Verify: digest = 00000000 28 db d2 b9 19 9f d2 cc b1 64 01 a7 ae 30 da 0d |(........d...0..| +00000010 dc 14 c1 d3 3b 3e a7 c7 ba db 5d 59 ac 03 a5 7a |....;>....]Y...z|" +"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4985 Verify: sig = 00000000 30 45 02 21 00 fa 62 e3 aa a8 f9 4f 17 a3 b4 bb |0E.!..b....O....| +00000010 35 04 41 6c fc 6e c1 e6 4a 0b c5 4a a8 db e6 39 |5.Al.n..J..J...9| +00000020 20 b7 db 0a c7 02 20 24 0d af 40 40 54 ee 1f 82 | ..... $..@@T...| +00000030 ce c3 f1 b3 4a 8d 48 6e d9 56 43 68 20 4f d2 ca |....J.Hn.VCh O..| +00000040 6a 9a bd 38 f0 c1 06 |j..8...|" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func2 -> DEBU 4986 0xc004890490 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.295 UTC [cauthdsl] func1 -> DEBU 4987 0xc004890490 gate 1563590460295191000 evaluation succeeds" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4988 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 4989 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498a Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.295 UTC [policies] Evaluate -> DEBU 498b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleAliveMessage -> DEBU 498d Exiting" +"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498e Exiting" +"2019-07-20 02:41:00.295 UTC [gossip.discovery] handleMsgFromComm -> DEBU 498f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.295 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4990 Fetched identity of [196 80 61 95 109 59 156 140 196 95 118 126 132 161 217 117 74 20 107 56 41 245 145 178 54 104 148 53 18 54 211 45] from identity store" +"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4991 Verify: digest = 00000000 c2 61 58 89 41 8f fc a1 63 d0 6a 93 ad dc 2e 02 |.aX.A...c.j.....| +00000010 ff d4 ac 5e 66 20 c5 de 7f c1 30 7f 4a c4 29 db |...^f ....0.J.).|" +"2019-07-20 02:41:00.295 UTC [msp.identity] Verify -> DEBU 4992 Verify: sig = 00000000 30 44 02 20 34 2b dd a6 db 99 7b 02 d1 d0 8d d2 |0D. 4+....{.....| +00000010 93 b3 71 a1 ef 8c a9 1e bd af 9b 85 c4 04 0d 66 |..q............f| +00000020 a0 50 5e bb 02 20 2a dc f3 97 dc 28 2d 71 9f b3 |.P^.. *....(-q..| +00000030 26 a0 d6 2a 1f 13 af 23 7a a6 80 a6 45 51 c0 4c |&..*...#z...EQ.L| +00000040 b0 e0 30 43 5c f1 |..0C\.|" +"2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4993 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-07-20 02:41:00.296 UTC [msp.identity] Verify -> DEBU 4994 Verify: sig = 00000000 30 45 02 21 00 96 b2 43 41 a9 5b 49 00 12 c7 01 |0E.!...CA.[I....| +00000010 b1 b7 69 8f b6 4f de 87 6c 57 3f 98 4e 50 c9 96 |..i..O..lW?.NP..| +00000020 eb 26 5a db a8 02 20 2b 85 b1 b6 cc de 66 6b 9f |.&Z... +.....fk.| +00000030 6e 8b 01 5a 5d 0e aa 9c 3b e4 40 5f 72 d9 5c c6 |n..Z]...;.@_r.\.| +00000040 29 e1 37 c9 f7 62 16 |).7..b.|" +"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4995 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:41:00.296 UTC [gossip.discovery] isSentByMe -> DEBU 4996 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleAliveMessage -> DEBU 4997 Exiting" +"2019-07-20 02:41:00.296 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4998 Exiting" +"2019-07-20 02:41:00.296 UTC [gossip.gossip] handleMessage -> DEBU 4999 Exiting" +"2019-07-20 02:41:00.339 UTC [gossip.gossip] handleMessage -> DEBU 499a Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.339 UTC [gossip.pull] HandleMessage -> DEBU 499b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.340 UTC [gossip.pull] SendDigest -> DEBU 499c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:41:00.340 UTC [gossip.gossip] handleMessage -> DEBU 499d Exiting" +"2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499e Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.365 UTC [gossip.gossip] handleMessage -> DEBU 499f Exiting" +"2019-07-20 02:41:00.365 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a0 Got message: GossipMessage: tag:EMPTY mem_req:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.367 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49a1 Fetched identity of [166 162 19 15 130 138 144 108 246 74 201 109 91 124 224 153 163 62 125 159 188 197 65 100 211 138 122 201 81 50 98 167] from identity store" +"2019-07-20 02:41:00.367 UTC [msp.identity] Verify -> DEBU 49a2 Verify: digest = 00000000 49 51 52 bd 11 4a b8 a3 53 97 cd 73 97 50 47 c7 |IQR..J..S..s.PG.| +00000010 f7 19 ff 3e 5b 7b 6b b2 51 fb 37 eb 30 f0 1e 28 |...>[{k.Q.7.0..(|" +"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a3 Verify: sig = 00000000 30 44 02 20 73 e9 4b 88 b7 1d 12 fa 3f c9 c6 07 |0D. s.K.....?...| +00000010 77 4f 29 fc 49 b3 4d 94 aa c1 fe 5a 7f e4 9b c9 |wO).I.M....Z....| +00000020 e7 5a 6f 77 02 20 02 9d c8 ed 33 b4 b0 96 38 17 |.Zow. ....3...8.| +00000030 c8 44 99 10 24 6b b7 b4 19 af f3 64 79 0a 93 b6 |.D..$k.....dy...| +00000040 3d cd a7 65 1a 5b |=..e.[|" +"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-07-20 02:41:00.368 UTC [msp.identity] Verify -> DEBU 49a5 Verify: sig = 00000000 30 44 02 20 76 c6 50 b4 a8 c9 a5 a4 5b 7b a9 51 |0D. v.P.....[{.Q| +00000010 94 dc 4e 9c 23 55 71 69 22 82 7f cf 78 9a 1b 78 |..N.#Uqi"...x..x| +00000020 68 ed 47 62 02 20 50 c6 26 68 cd d4 03 08 49 58 |h.Gb. P.&h....IX| +00000030 f2 d2 42 4f 35 7b 20 5a c9 11 20 5b 1c da bb ab |..BO5{ Z.. [....| +00000040 bc 02 fc 5a 8f 1c |...Z..|" +"2019-07-20 02:41:00.369 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a6 Entering GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-07-20 02:41:00.369 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a8 updating membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a9 Updating aliveness data: membership:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: " +"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49aa Replacing GossipMessage: tag:EMPTY alive_msg:}\237\274\305Ad\323\212z\311Q2b\247" > timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-07-20 02:41:00.370 UTC [gossip.discovery] learnExistingMembers -> DEBU 49ab Exiting" +"2019-07-20 02:41:00.371 UTC [gossip.discovery] handleAliveMessage -> DEBU 49ac Exiting" +"2019-07-20 02:41:00.371 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ad Exiting" +"2019-07-20 02:41:00.371 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" " +"2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49af Obtaining identity" +"2019-07-20 02:41:00.371 UTC [msp] DeserializeIdentity -> DEBU 49b0 Obtaining identity" +"2019-07-20 02:41:00.372 UTC [gossip.comm] Send -> DEBU 49b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.372 UTC [gossip.discovery] sendMemResponse -> DEBU 49b2 Exiting, replying with alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" secret_envelope: > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +"2019-07-20 02:41:00.372 UTC [gossip.comm] sendToEndpoint -> DEBU 49b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.373 UTC [gossip.comm] sendToEndpoint -> DEBU 49b4 Exiting" +"2019-07-20 02:41:00.454 UTC [endorser] ProcessProposal -> DEBU 49b5 Entering: request from 172.18.0.9:58518" +"2019-07-20 02:41:00.454 UTC [protoutils] ValidateProposalMessage -> DEBU 49b6 ValidateProposalMessage starts for signed proposal 0xc00489c6e0" +"2019-07-20 02:41:00.454 UTC [protoutils] validateChannelHeader -> DEBU 49b7 validateChannelHeader info: header type 3" +"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b8 begin" +"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49b9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-07-20 02:41:00.454 UTC [protoutils] checkSignatureFromCreator -> DEBU 49ba creator is valid" +"2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bb Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| +00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" +"2019-07-20 02:41:00.454 UTC [msp.identity] Verify -> DEBU 49bc Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| +00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| +00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| +00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| +00000040 04 80 97 3f 92 44 a1 |...?.D.|" +"2019-07-20 02:41:00.455 UTC [protoutils] checkSignatureFromCreator -> DEBU 49bd exits successfully" +"2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49be validateChaincodeProposalMessage starts for proposal 0xc003acee70, header 0xc00489caf0" +"2019-07-20 02:41:00.455 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 49bf validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-07-20 02:41:00.455 UTC [endorser] preProcess -> DEBU 49c0 [][889970b1] processing txid: 889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7" +"2019-07-20 02:41:00.455 UTC [endorser] SimulateProposal -> DEBU 49c1 [][889970b1] Entry chaincode: name:"qscc" " +"2019-07-20 02:41:00.455 UTC [endorser] callChaincode -> INFO 49c2 [][889970b1] Entry chaincode: name:"qscc" " +"2019-07-20 02:41:00.455 UTC [chaincode] Execute -> DEBU 49c3 Entry" +"2019-07-20 02:41:00.455 UTC [qscc] Invoke -> DEBU 49c4 Invoke function: GetChainInfo on chain: businesschannel" +"2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c5 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-07-20 02:41:00.455 UTC [aclmgmt] CheckACL -> DEBU 49c6 acl check(/Channel/Application/Readers)" +"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.455 UTC [policies] Evaluate -> DEBU 49c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.455 UTC [msp] DeserializeIdentity -> DEBU 49ca Obtaining identity" +"2019-07-20 02:41:00.455 UTC [msp.identity] newIdentity -> DEBU 49cb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-07-20 02:41:00.455 UTC [cauthdsl] func1 -> DEBU 49cc 0xc0048f4830 gate 1563590460455929300 evaluation starts" +"2019-07-20 02:41:00.455 UTC [cauthdsl] func2 -> DEBU 49cd 0xc0048f4830 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49ce 0xc0048f4830 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49cf 0xc0048f4830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d0 0xc0048f4830 principal evaluation fails" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d1 0xc0048f4830 gate 1563590460455929300 evaluation fails" +"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.456 UTC [policies] Evaluate -> DEBU 49d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func1 -> DEBU 49d5 0xc0048f59b0 gate 1563590460456331400 evaluation starts" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d6 0xc0048f59b0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.456 UTC [cauthdsl] func2 -> DEBU 49d7 0xc0048f59b0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.456 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 49d8 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-07-20 02:41:00.456 UTC [msp] Validate -> DEBU 49d9 MSP Org1MSP validating identity" +"2019-07-20 02:41:00.456 UTC [msp] getCertificationChain -> DEBU 49da MSP Org1MSP getting certification chain" +"2019-07-20 02:41:00.458 UTC [cauthdsl] func2 -> DEBU 49db 0xc0048f59b0 principal matched by identity 0" +"2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dc Verify: digest = 00000000 85 00 2b dd e9 4c 92 74 a3 7b 02 7e d0 3c 36 7b |..+..L.t.{.~.<6{| +00000010 7d 25 c4 4a c0 db cf b0 65 6e fd 0c cf 78 58 8c |}%.J....en...xX.|" +"2019-07-20 02:41:00.458 UTC [msp.identity] Verify -> DEBU 49dd Verify: sig = 00000000 30 45 02 21 00 9a 0f 58 7d c4 e9 ca 5d 48 78 ad |0E.!...X}...]Hx.| +00000010 55 bf ca 8c 70 23 b2 5d 03 22 41 5e cf e8 fb f1 |U...p#.]."A^....| +00000020 66 a9 4c 17 a7 02 20 33 19 b7 28 e3 af ad dc 21 |f.L... 3..(....!| +00000030 68 a6 a7 71 52 4a ed 03 4a 60 6a ad 1a fb 30 1d |h..qRJ..J`j...0.| +00000040 04 80 97 3f 92 44 a1 |...?.D.|" +"2019-07-20 02:41:00.459 UTC [cauthdsl] func2 -> DEBU 49de 0xc0048f59b0 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.459 UTC [cauthdsl] func1 -> DEBU 49df 0xc0048f59b0 gate 1563590460456331400 evaluation succeeds" +"2019-07-20 02:41:00.460 UTC [policies] Evaluate -> DEBU 49e0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.461 UTC [policies] Evaluate -> DEBU 49e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.461 UTC [chaincode] handleMessage -> DEBU 49e4 [889970b1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-07-20 02:41:00.461 UTC [chaincode] Notify -> DEBU 49e5 [889970b1] notifying Txid:889970b1dd55c6d7693a11bcb651af613bd7efe1575aa44d9c9631b5ded063c7, channelID:" +"2019-07-20 02:41:00.461 UTC [chaincode] Execute -> DEBU 49e6 Exit" +"2019-07-20 02:41:00.462 UTC [endorser] callChaincode -> INFO 49e7 [][889970b1] Exit chaincode: name:"qscc" (7ms)" +"2019-07-20 02:41:00.462 UTC [endorser] SimulateProposal -> DEBU 49e8 [][889970b1] Exit" +"2019-07-20 02:41:00.462 UTC [endorser] func1 -> DEBU 49e9 Exit: request from 172.18.0.9:58518" +"2019-07-20 02:41:00.462 UTC [comm.grpc.server] 1 -> INFO 49ea unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:58518 grpc.code=OK grpc.call_duration=8.4046ms +"2019-07-20 02:41:00.466 UTC [grpc] infof -> DEBU 49eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-07-20 02:41:00.588 UTC [gossip.comm] func1 -> DEBU 49ec Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ed Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.588 UTC [gossip.gossip] handleMessage -> DEBU 49ee Exiting" +"2019-07-20 02:41:00.588 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49ef Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.589 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49f0 Fetched identity of [6 204 163 80 253 253 83 182 231 87 116 27 75 204 186 237 131 237 146 77 54 97 211 115 41 19 141 246 26 249 32 48] from identity store" +"2019-07-20 02:41:00.590 UTC [msp] DeserializeIdentity -> DEBU 49f1 Obtaining identity" +"2019-07-20 02:41:00.600 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49f4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.601 UTC [policies] Evaluate -> DEBU 49f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.602 UTC [policies] Evaluate -> DEBU 49f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.601 UTC [gossip.comm] func1 -> DEBU 49f7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.602 UTC [gossip.gossip] handleMessage -> DEBU 49f9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.603 UTC [gossip.pull] HandleMessage -> DEBU 49fa GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.603 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" +"2019-07-20 02:41:00.605 UTC [msp] DeserializeIdentity -> DEBU 49fc Obtaining identity" +"2019-07-20 02:41:00.612 UTC [msp] DeserializeIdentity -> DEBU 49fd Obtaining identity" +"2019-07-20 02:41:00.579 UTC [msp] DeserializeIdentity -> DEBU 49fe Obtaining identity" +"2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 49ff Obtaining identity" +"2019-07-20 02:41:00.580 UTC [msp] DeserializeIdentity -> DEBU 4a00 Obtaining identity" +"2019-07-20 02:41:00.581 UTC [gossip.pull] SendDigest -> DEBU 4a01 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-07-20 02:41:00.581 UTC [gossip.gossip] handleMessage -> DEBU 4a02 Exiting" +"2019-07-20 02:41:00.582 UTC [cauthdsl] func1 -> DEBU 4a03 0xc0048e5110 gate 1563590460582117800 evaluation starts" +"2019-07-20 02:41:00.582 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0048e5110 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0048e5110 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.584 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0048e5110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.585 UTC [cauthdsl] func2 -> DEBU 4a07 0xc0048e5110 principal evaluation fails" +"2019-07-20 02:41:00.585 UTC [cauthdsl] func1 -> DEBU 4a08 0xc0048e5110 gate 1563590460582117800 evaluation fails" +"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a09 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.585 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.586 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc0048e5950 gate 1563590460585973400 evaluation starts" +"2019-07-20 02:41:00.586 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0048e5950 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0048e5950 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.587 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc0048e5950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.588 UTC [cauthdsl] func2 -> DEBU 4a10 0xc0048e5950 principal evaluation fails" +"2019-07-20 02:41:00.588 UTC [cauthdsl] func1 -> DEBU 4a11 0xc0048e5950 gate 1563590460585973400 evaluation fails" +"2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.588 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.589 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.589 UTC [cauthdsl] func1 -> DEBU 4a15 0xc00493c190 gate 1563590460589535900 evaluation starts" +"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a16 0xc00493c190 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a17 0xc00493c190 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.589 UTC [cauthdsl] func2 -> DEBU 4a18 0xc00493c190 principal matched by identity 0" +"2019-07-20 02:41:00.590 UTC [msp.identity] Verify -> DEBU 4a19 Verify: digest = 00000000 1d c4 48 eb 09 63 c9 43 1e 9c 1f 98 2a 93 3c 43 |..H..c.C....*. DEBU 4a1a Verify: sig = 00000000 30 44 02 20 6b ea f9 b0 bf 96 e2 a2 ef b3 af aa |0D. k...........| +00000010 cc 76 8c a9 97 a4 50 c7 b8 ea 41 9c 8a 4f b9 76 |.v....P...A..O.v| +00000020 a4 2f dd 96 02 20 1d aa 85 90 7f 83 96 e4 68 d9 |./... ........h.| +00000030 f7 20 c0 66 07 0f b2 7e 51 5f 88 b8 87 e4 29 17 |. .f...~Q_....).| +00000040 d9 96 73 42 71 fb |..sBq.|" +"2019-07-20 02:41:00.591 UTC [cauthdsl] func2 -> DEBU 4a1b 0xc00493c190 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.591 UTC [cauthdsl] func1 -> DEBU 4a1c 0xc00493c190 gate 1563590460589535900 evaluation succeeds" +"2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.591 UTC [policies] Evaluate -> DEBU 4a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a1f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.592 UTC [policies] Evaluate -> DEBU 4a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a21 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a22 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-07-20 02:41:00.592 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a23 updating membership: timestamp: " +"2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a24 Updating aliveness data: membership: timestamp: " +"2019-07-20 02:41:00.593 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a25 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-07-20 02:41:00.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a26 Exiting" +"2019-07-20 02:41:00.596 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a27 Exiting" +"2019-07-20 02:41:00.596 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a28 Exiting" +"2019-07-20 02:41:00.596 UTC [gossip.discovery] sendMemResponse -> DEBU 4a29 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" " +"2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2a Obtaining identity" +"2019-07-20 02:41:00.597 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +"2019-07-20 02:41:00.598 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +"2019-07-20 02:41:00.598 UTC [gossip.comm] Send -> DEBU 4a2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.598 UTC [gossip.discovery] sendMemResponse -> DEBU 4a2e Exiting, replying with alive: alive: alive:}\237\274\305Ad\323\212z\311Q2b\247\022\014\010\374\250\342\202\215\245\277\331\025\020=" signature:"0D\002 s\351K\210\267\035\022\372?\311\306\007wO)\374I\263M\224\252\301\376Z\177\344\233\311\347Zow\002 \002\235\310\3553\264\260\2268\027\310D\231\020$k\267\264\031\257\363dy\n\223\266=\315\247e\032[" > alive:'X\025\n\030\357\314\005\236\345Z+\250\317\217\230\036t\226\002 W\027\322X\303h\215X\375p=\2567\363f\265\336<\301\r\247M\267\356s\240" > " +"2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.598 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" +"2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a31 Obtaining identity" +"2019-07-20 02:41:00.648 UTC [msp] DeserializeIdentity -> DEBU 4a32 Obtaining identity" +"2019-07-20 02:41:00.648 UTC [gossip.comm] Send -> DEBU 4a33 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a35 Exiting" +"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a37 Exiting" +"2019-07-20 02:41:00.649 UTC [gossip.comm] sendToEndpoint -> DEBU 4a38 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.650 UTC [gossip.comm] sendToEndpoint -> DEBU 4a39 Exiting" +"2019-07-20 02:41:00.651 UTC [gossip.comm] func1 -> DEBU 4a3a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.651 UTC [gossip.gossip] handleMessage -> DEBU 4a3b Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3c Obtaining identity" +"2019-07-20 02:41:00.651 UTC [msp] DeserializeIdentity -> DEBU 4a3d Obtaining identity" +"2019-07-20 02:41:00.652 UTC [msp] DeserializeIdentity -> DEBU 4a3e Obtaining identity" +"2019-07-20 02:41:00.653 UTC [gossip.comm] func1 -> DEBU 4a3f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a40 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a42 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.659 UTC [policies] Evaluate -> DEBU 4a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a46 0xc004962cc0 gate 1563590460660063900 evaluation starts" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a47 0xc004962cc0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a48 0xc004962cc0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a49 0xc004962cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc004962cc0 principal evaluation fails" +"2019-07-20 02:41:00.660 UTC [cauthdsl] func1 -> DEBU 4a4b 0xc004962cc0 gate 1563590460660063900 evaluation fails" +"2019-07-20 02:41:00.660 UTC [policies] Evaluate -> DEBU 4a4c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.661 UTC [policies] Evaluate -> DEBU 4a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.662 UTC [cauthdsl] func1 -> DEBU 4a4f 0xc004963500 gate 1563590460662627300 evaluation starts" +"2019-07-20 02:41:00.662 UTC [cauthdsl] func2 -> DEBU 4a50 0xc004963500 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a51 0xc004963500 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a52 0xc004963500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a53 0xc004963500 principal evaluation fails" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a54 0xc004963500 gate 1563590460662627300 evaluation fails" +"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a55 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.663 UTC [policies] Evaluate -> DEBU 4a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func1 -> DEBU 4a58 0xc004963d40 gate 1563590460663562700 evaluation starts" +"2019-07-20 02:41:00.663 UTC [cauthdsl] func2 -> DEBU 4a59 0xc004963d40 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.664 UTC [cauthdsl] func2 -> DEBU 4a5a 0xc004963d40 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.665 UTC [cauthdsl] func2 -> DEBU 4a5b 0xc004963d40 principal matched by identity 0" +"2019-07-20 02:41:00.666 UTC [msp.identity] Verify -> DEBU 4a5c Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:41:00.667 UTC [msp.identity] Verify -> DEBU 4a5d Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:41:00.668 UTC [cauthdsl] func2 -> DEBU 4a5e 0xc004963d40 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.668 UTC [cauthdsl] func1 -> DEBU 4a5f 0xc004963d40 gate 1563590460663562700 evaluation succeeds" +"2019-07-20 02:41:00.668 UTC [policies] Evaluate -> DEBU 4a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.669 UTC [policies] Evaluate -> DEBU 4a62 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.670 UTC [policies] Evaluate -> DEBU 4a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.678 UTC [msp.identity] Verify -> DEBU 4a64 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:41:00.679 UTC [msp.identity] Verify -> DEBU 4a65 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a66 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:41:00.685 UTC [msp.identity] Verify -> DEBU 4a67 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:41:00.692 UTC [msp] DeserializeIdentity -> DEBU 4a68 Obtaining identity" +"2019-07-20 02:41:00.694 UTC [msp] DeserializeIdentity -> DEBU 4a69 Obtaining identity" +"2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6b Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.695 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a6c Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.695 UTC [policies] Evaluate -> DEBU 4a6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.695 UTC [cauthdsl] func1 -> DEBU 4a70 0xc00498a350 gate 1563590460695543200 evaluation starts" +"2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a71 0xc00498a350 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.695 UTC [cauthdsl] func2 -> DEBU 4a72 0xc00498a350 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a73 0xc00498a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.696 UTC [cauthdsl] func2 -> DEBU 4a74 0xc00498a350 principal evaluation fails" +"2019-07-20 02:41:00.696 UTC [cauthdsl] func1 -> DEBU 4a75 0xc00498a350 gate 1563590460695543200 evaluation fails" +"2019-07-20 02:41:00.696 UTC [policies] Evaluate -> DEBU 4a76 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.697 UTC [policies] Evaluate -> DEBU 4a78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.697 UTC [cauthdsl] func1 -> DEBU 4a79 0xc00498ab90 gate 1563590460697495500 evaluation starts" +"2019-07-20 02:41:00.697 UTC [cauthdsl] func2 -> DEBU 4a7a 0xc00498ab90 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7b 0xc00498ab90 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7c 0xc00498ab90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.698 UTC [cauthdsl] func2 -> DEBU 4a7d 0xc00498ab90 principal evaluation fails" +"2019-07-20 02:41:00.698 UTC [cauthdsl] func1 -> DEBU 4a7e 0xc00498ab90 gate 1563590460697495500 evaluation fails" +"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a7f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a80 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.698 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.699 UTC [cauthdsl] func1 -> DEBU 4a82 0xc00498b3d0 gate 1563590460699017400 evaluation starts" +"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a83 0xc00498b3d0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a84 0xc00498b3d0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.699 UTC [cauthdsl] func2 -> DEBU 4a85 0xc00498b3d0 principal matched by identity 0" +"2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a86 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:41:00.702 UTC [msp.identity] Verify -> DEBU 4a87 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:41:00.702 UTC [cauthdsl] func2 -> DEBU 4a88 0xc00498b3d0 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.703 UTC [cauthdsl] func1 -> DEBU 4a89 0xc00498b3d0 gate 1563590460699017400 evaluation succeeds" +"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.703 UTC [policies] Evaluate -> DEBU 4a8c Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.704 UTC [policies] Evaluate -> DEBU 4a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.704 UTC [gossip.gossip] handleMessage -> DEBU 4a8e Exiting" +"2019-07-20 02:41:00.705 UTC [gossip.gossip] handleMessage -> DEBU 4a8f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:41:00.705 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a92 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:41:00.706 UTC [msp.identity] Verify -> DEBU 4a93 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a94 Obtaining identity" +"2019-07-20 02:41:00.706 UTC [msp] DeserializeIdentity -> DEBU 4a95 Obtaining identity" +"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a97 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a98 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.712 UTC [policies] Evaluate -> DEBU 4a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.713 UTC [policies] Evaluate -> DEBU 4a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.713 UTC [cauthdsl] func1 -> DEBU 4a9c 0xc004999c20 gate 1563590460713243100 evaluation starts" +"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9d 0xc004999c20 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc004999c20 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.713 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc004999c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.714 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc004999c20 principal evaluation fails" +"2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa1 0xc004999c20 gate 1563590460713243100 evaluation fails" +"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.714 UTC [policies] Evaluate -> DEBU 4aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.714 UTC [cauthdsl] func1 -> DEBU 4aa5 0xc0049b8460 gate 1563590460714843000 evaluation starts" +"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc0049b8460 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc0049b8460 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc0049b8460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.719 UTC [cauthdsl] func2 -> DEBU 4aa9 0xc0049b8460 principal evaluation fails" +"2019-07-20 02:41:00.719 UTC [cauthdsl] func1 -> DEBU 4aaa 0xc0049b8460 gate 1563590460714843000 evaluation fails" +"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.719 UTC [policies] Evaluate -> DEBU 4aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.721 UTC [cauthdsl] func1 -> DEBU 4aae 0xc0049b8ca0 gate 1563590460720093200 evaluation starts" +"2019-07-20 02:41:00.721 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc0049b8ca0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.722 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc0049b8ca0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab1 0xc0049b8ca0 principal matched by identity 0" +"2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:41:00.723 UTC [msp.identity] Verify -> DEBU 4ab3 Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:41:00.723 UTC [cauthdsl] func2 -> DEBU 4ab4 0xc0049b8ca0 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.723 UTC [cauthdsl] func1 -> DEBU 4ab5 0xc0049b8ca0 gate 1563590460720093200 evaluation succeeds" +"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab8 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4aba Obtaining identity" +"2019-07-20 02:41:00.724 UTC [msp] DeserializeIdentity -> DEBU 4abb Obtaining identity" +"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4abc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abd Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4abe Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.724 UTC [policies] Evaluate -> DEBU 4abf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.725 UTC [policies] Evaluate -> DEBU 4ac1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.725 UTC [cauthdsl] func1 -> DEBU 4ac2 0xc0049ce470 gate 1563590460725231100 evaluation starts" +"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac3 0xc0049ce470 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac4 0xc0049ce470 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac5 0xc0049ce470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.725 UTC [cauthdsl] func2 -> DEBU 4ac6 0xc0049ce470 principal evaluation fails" +"2019-07-20 02:41:00.726 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc0049ce470 gate 1563590460725231100 evaluation fails" +"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4ac9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.726 UTC [policies] Evaluate -> DEBU 4aca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.727 UTC [msp] DeserializeIdentity -> DEBU 4acb Obtaining identity" +"2019-07-20 02:41:00.727 UTC [cauthdsl] func1 -> DEBU 4acc 0xc0049cecb0 gate 1563590460727922600 evaluation starts" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acd 0xc0049cecb0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ace 0xc0049cecb0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4acf 0xc0049cecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" +"2019-07-20 02:41:00.728 UTC [gossip.pull] Hello -> DEBU 4ad1 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc0049cecb0 principal evaluation fails" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad3 0xc0049cecb0 gate 1563590460727922600 evaluation fails" +"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad6 Obtaining identity" +"2019-07-20 02:41:00.728 UTC [policies] Evaluate -> DEBU 4ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func1 -> DEBU 4ad8 0xc0049cf4f0 gate 1563590460728919200 evaluation starts" +"2019-07-20 02:41:00.728 UTC [msp] DeserializeIdentity -> DEBU 4ad9 Obtaining identity" +"2019-07-20 02:41:00.728 UTC [cauthdsl] func2 -> DEBU 4ada 0xc0049cf4f0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4adb 0xc0049cf4f0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.729 UTC [gossip.comm] Send -> DEBU 4adc Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4add 0xc0049cf4f0 principal matched by identity 0" +"2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4ade Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:41:00.729 UTC [msp.identity] Verify -> DEBU 4adf Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.729 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" +"2019-07-20 02:41:00.729 UTC [cauthdsl] func2 -> DEBU 4ae2 0xc0049cf4f0 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.729 UTC [cauthdsl] func1 -> DEBU 4ae3 0xc0049cf4f0 gate 1563590460728919200 evaluation succeeds" +"2019-07-20 02:41:00.729 UTC [policies] Evaluate -> DEBU 4ae4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae6 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.732 UTC [policies] Evaluate -> DEBU 4ae7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae8 Exiting" +"2019-07-20 02:41:00.732 UTC [gossip.gossip] handleMessage -> DEBU 4ae9 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aea Obtaining identity" +"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aeb Obtaining identity" +"2019-07-20 02:41:00.733 UTC [msp] DeserializeIdentity -> DEBU 4aec Obtaining identity" +"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4aed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aee Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aef Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.733 UTC [policies] Evaluate -> DEBU 4af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.734 UTC [policies] Evaluate -> DEBU 4af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.734 UTC [cauthdsl] func1 -> DEBU 4af3 0xc0049e5000 gate 1563590460734350400 evaluation starts" +"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af4 0xc0049e5000 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af5 0xc0049e5000 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af6 0xc0049e5000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.734 UTC [cauthdsl] func2 -> DEBU 4af7 0xc0049e5000 principal evaluation fails" +"2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4af8 0xc0049e5000 gate 1563590460734350400 evaluation fails" +"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.735 UTC [policies] Evaluate -> DEBU 4afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.735 UTC [cauthdsl] func1 -> DEBU 4afc 0xc0049e5840 gate 1563590460735722000 evaluation starts" +"2019-07-20 02:41:00.735 UTC [cauthdsl] func2 -> DEBU 4afd 0xc0049e5840 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4afe 0xc0049e5840 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4aff 0xc0049e5840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.736 UTC [cauthdsl] func2 -> DEBU 4b00 0xc0049e5840 principal evaluation fails" +"2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b01 0xc0049e5840 gate 1563590460735722000 evaluation fails" +"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.736 UTC [policies] Evaluate -> DEBU 4b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.736 UTC [cauthdsl] func1 -> DEBU 4b05 0xc0049fc080 gate 1563590460736931300 evaluation starts" +"2019-07-20 02:41:00.738 UTC [cauthdsl] func2 -> DEBU 4b06 0xc0049fc080 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.739 UTC [cauthdsl] func2 -> DEBU 4b07 0xc0049fc080 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b08 0xc0049fc080 principal matched by identity 0" +"2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b09 Verify: digest = 00000000 da 46 31 b8 7c 92 d4 42 fb 84 2a 86 7e 4b 4f 33 |.F1.|..B..*.~KO3| +00000010 f8 d0 4c ed fa 06 00 21 d7 42 0b a3 05 c6 6f 91 |..L....!.B....o.|" +"2019-07-20 02:41:00.740 UTC [msp.identity] Verify -> DEBU 4b0a Verify: sig = 00000000 30 45 02 21 00 df 76 e1 42 34 f7 60 94 14 11 78 |0E.!..v.B4.`...x| +00000010 00 60 1a d0 e6 f8 1c c1 19 33 69 26 d2 30 44 43 |.`.......3i&.0DC| +00000020 96 27 6c bd ee 02 20 77 a7 47 de ee 7b 33 49 a9 |.'l... w.G..{3I.| +00000030 f2 e5 30 01 17 2b d4 be 10 4d a1 c6 49 68 4f 8b |..0..+...M..IhO.| +00000040 8e 09 3a 87 1b a2 bc |..:....|" +"2019-07-20 02:41:00.740 UTC [cauthdsl] func2 -> DEBU 4b0b 0xc0049fc080 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.740 UTC [cauthdsl] func1 -> DEBU 4b0c 0xc0049fc080 gate 1563590460736931300 evaluation succeeds" +"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b0f Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.746 UTC [policies] Evaluate -> DEBU 4b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b11 Verify: digest = 00000000 34 13 ab 16 e4 54 d4 d1 1a 5c f1 f1 c3 0b 23 9d |4....T...\....#.| +00000010 d0 40 ff 9b 6c 40 40 41 b3 84 89 80 d2 df 49 1c |.@..l@@A......I.|" +"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b12 Verify: sig = 00000000 30 44 02 20 26 28 61 6e 31 39 ba 13 48 17 3e a8 |0D. &(an19..H.>.| +00000010 1e d2 e1 15 74 0d 64 26 3d 6f c7 52 54 04 31 db |....t.d&=o.RT.1.| +00000020 9c a2 b0 4b 02 20 39 87 7f 0e 00 d4 2b 40 a9 1a |...K. 9.....+@..| +00000030 c0 24 cf 01 33 11 b2 b1 82 97 c9 2f 8a ce f1 48 |.$..3....../...H| +00000040 04 ec df 98 3f 3b |....?;|" +"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b13 Verify: digest = 00000000 c5 14 88 37 16 d0 89 fa a3 b6 ab 73 e9 46 30 52 |...7.......s.F0R| +00000010 09 5f af 8d d8 8a 4a d0 f2 a1 62 cf 33 6e 73 e6 |._....J...b.3ns.|" +"2019-07-20 02:41:00.747 UTC [msp.identity] Verify -> DEBU 4b14 Verify: sig = 00000000 30 45 02 21 00 9f 9e fe 4f 12 6b 41 17 d1 9d 77 |0E.!....O.kA...w| +00000010 a2 5a 2a 58 cf cd c1 1b 11 0e a3 80 3f 6c c9 5e |.Z*X........?l.^| +00000020 9c e6 a4 1f ac 02 20 0b 79 22 2a 78 6a e2 cb 3e |...... .y"*xj..>| +00000030 72 63 37 99 c1 a1 68 7f 7c 34 e4 2a c7 8f 44 1c |rc7...h.|4.*..D.| +00000040 c7 35 cf f0 e4 88 ab |.5.....|" +"2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b15 Obtaining identity" +"2019-07-20 02:41:00.748 UTC [msp] DeserializeIdentity -> DEBU 4b16 Obtaining identity" +"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b18 Got policy manager for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.750 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b19 Got reader policy for channel [businesschannel] with flag [true]" +"2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-07-20 02:41:00.750 UTC [policies] Evaluate -> DEBU 4b1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b1d 0xc004a1c690 gate 1563590460751179500 evaluation starts" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1e 0xc004a1c690 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b1f 0xc004a1c690 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b20 0xc004a1c690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func2 -> DEBU 4b21 0xc004a1c690 principal evaluation fails" +"2019-07-20 02:41:00.751 UTC [cauthdsl] func1 -> DEBU 4b22 0xc004a1c690 gate 1563590460751179500 evaluation fails" +"2019-07-20 02:41:00.751 UTC [policies] Evaluate -> DEBU 4b23 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-07-20 02:41:00.752 UTC [policies] Evaluate -> DEBU 4b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-07-20 02:41:00.752 UTC [cauthdsl] func1 -> DEBU 4b26 0xc004a1ced0 gate 1563590460752470400 evaluation starts" +"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b27 0xc004a1ced0 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b28 0xc004a1ced0 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b29 0xc004a1ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-07-20 02:41:00.752 UTC [cauthdsl] func2 -> DEBU 4b2a 0xc004a1ced0 principal evaluation fails" +"2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2b 0xc004a1ced0 gate 1563590460752470400 evaluation fails" +"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-07-20 02:41:00.753 UTC [policies] Evaluate -> DEBU 4b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-07-20 02:41:00.753 UTC [cauthdsl] func1 -> DEBU 4b2f 0xc004a1d710 gate 1563590460753743500 evaluation starts" +"2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b30 0xc004a1d710 signed by 0 principal evaluation starts (used [false])" +"2019-07-20 02:41:00.753 UTC [cauthdsl] func2 -> DEBU 4b31 0xc004a1d710 processing identity 0 with bytes of 114b950" +"2019-07-20 02:41:00.754 UTC [cauthdsl] func2 -> DEBU 4b32 0xc004a1d710 principal matched by identity 0" +"2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b33 Verify: digest = 00000000 12 71 33 8a 3b c2 3d ec 61 8f fe 3b 77 89 18 48 |.q3.;.=.a..;w..H| +00000010 90 29 80 9e bd ce 8b 0b 28 37 3d 76 a6 2e d7 2f |.)......(7=v.../|" +"2019-07-20 02:41:00.754 UTC [msp.identity] Verify -> DEBU 4b34 Verify: sig = 00000000 30 45 02 21 00 bf 00 7f f9 10 33 6c 83 eb 8a c2 |0E.!......3l....| +00000010 f1 76 b6 2d 85 8a ae 39 de 79 30 2b 27 74 2e 89 |.v.-...9.y0+'t..| +00000020 0b 24 36 71 c9 02 20 67 37 96 f6 9a e6 3a c7 0c |.$6q.. g7....:..| +00000030 e7 3e be 79 eb fe 44 c6 57 c8 ae b3 db 56 8d 7d |.>.y..D.W....V.}| +00000040 96 55 42 a1 79 77 18 |.UB.yw.|" +"2019-07-20 02:41:00.756 UTC [cauthdsl] func2 -> DEBU 4b35 0xc004a1d710 principal evaluation succeeds for identity 0" +"2019-07-20 02:41:00.756 UTC [cauthdsl] func1 -> DEBU 4b36 0xc004a1d710 gate 1563590460753743500 evaluation succeeds" +"2019-07-20 02:41:00.756 UTC [policies] Evaluate -> DEBU 4b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-07-20 02:41:00.757 UTC [policies] Evaluate -> DEBU 4b39 Signature set satisfies policy /Channel/Application/Readers" +"2019-07-20 02:41:00.758 UTC [policies] Evaluate -> DEBU 4b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3b Exiting" +"2019-07-20 02:41:00.758 UTC [gossip.gossip] handleMessage -> DEBU 4b3c Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.758 UTC [gossip.pull] HandleMessage -> DEBU 4b3d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.759 UTC [gossip.gossip] handleMessage -> DEBU 4b3e Exiting" +"2019-07-20 02:41:00.808 UTC [gossip.gossip] handleMessage -> DEBU 4b3f Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b40 Obtaining identity" +"2019-07-20 02:41:00.810 UTC [msp] DeserializeIdentity -> DEBU 4b41 Obtaining identity" +"2019-07-20 02:41:00.811 UTC [gossip.gossip] handleMessage -> DEBU 4b42 Exiting" +"2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b43 Entering, 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.870 UTC [gossip.pull] HandleMessage -> DEBU 4b44 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.870 UTC [gossip.pull] SendDigest -> DEBU 4b45 Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.6:34152 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-07-20 02:41:00.870 UTC [gossip.gossip] handleMessage -> DEBU 4b46 Exiting" +"2019-07-20 02:41:00.973 UTC [gossip.comm] func1 -> DEBU 4b47 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.973 UTC [gossip.gossip] handleMessage -> DEBU 4b48 Entering, 172.18.0.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b49 Obtaining identity" +"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4a Obtaining identity" +"2019-07-20 02:41:00.974 UTC [msp] DeserializeIdentity -> DEBU 4b4b Obtaining identity" +"2019-07-20 02:41:00.974 UTC [gossip.gossip] handleMessage -> DEBU 4b4c Exiting" +"2019-07-20 02:41:01.112 UTC [gossip.comm] func1 -> DEBU 4b4d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:01.112 UTC [gossip.gossip] handleMessage -> DEBU 4b4e Entering, 172.18.0.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b4f Obtaining identity" +"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b50 Obtaining identity" +"2019-07-20 02:41:01.114 UTC [msp] DeserializeIdentity -> DEBU 4b51 Obtaining identity" +"2019-07-20 02:41:01.114 UTC [gossip.gossip] handleMessage -> DEBU 4b52 Exiting" diff --git a/hyperledger_fabric/v1.4.2/scripts/download_images.sh b/hyperledger_fabric/v1.4.2/scripts/download_images.sh new file mode 100644 index 00000000..9ba90b4e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/download_images.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +pull_image() { + IMG=$1 + #if [ -z "$(docker images -q ${IMG} 2> /dev/null)" ]; then # not exist + # docker pull ${IMG} + #else + # echo "${IMG} already exist locally" + #fi + docker pull ${IMG} +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & +done + +pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag +# core.yaml requires a latest tag, but nodeenv is not available in docker hub yet +# pull_image hyperledger/fabric-nodeenv:latest +pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag +docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.2/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/env_setup.sh b/hyperledger_fabric/v1.4.2/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.2/scripts/func.sh b/hyperledger_fabric/v1.4.2/scripts/func.sh new file mode 100644 index 00000000..0285c14a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/func.sh @@ -0,0 +1,973 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path +chaincodeInstall () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommit channel org peer name version +chaincodeQueryCommit () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.2/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.2/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.2/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.2/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.2/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.2/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.2/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.2/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.2/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.2/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.2/scripts/json_flatter.py b/hyperledger_fabric/v1.4.2/scripts/json_flatter.py new file mode 100644 index 00000000..fb6957fc --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + if success: # result_bytes = b'xxxx\xx' + print('===================Start==================================') + print(raw) + print(result) + print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.2/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.2/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..e87bf4cd --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0 4peers..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.2/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.2/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.2/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.2/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.2/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.2/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.2/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.2/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.2/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.2/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.2/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.2/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.2/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.2/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.2/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.2/scripts/test_temp.sh b/hyperledger_fabric/v1.4.2/scripts/test_temp.sh new file mode 100644 index 00000000..38b8ede8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.2/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.2/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.2/scripts/variables.sh b/hyperledger_fabric/v1.4.2/scripts/variables.sh new file mode 100644 index 00000000..f3edea61 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.15 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=latest + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=2.0.0 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.2/solo/README.md b/hyperledger_fabric/v1.4.2/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..52706030 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSP.json @@ -0,0 +1,164 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 0000000000000000000000000000000000000000..092daac107ad52365eed51223920522d81b93d49 GIT binary patch literal 324 zcmd-&$iyYfCC$Mk#m3RS>+4fiCH|z+;>^6%;^O3t#Js%J9HIG4TyvPXFoY9?;<&gS z3kq^FlM_oa^YeuKIT(e!x!C=S(hYrs1B4u;*twWN3+4fiCH|z+;>^6%;^O3t#Js%J9HIG4TyvPXFoY9?;<&gS z3kq^FlM_oa^YeuKIT(e!x!C=S(v5tB1B4u;*twWN3DON)ZEm(5}*J# z7kf}@VoGXJF@zIdlvx7daB;CYrsQVk0VSlCF$yhaM73iwBhZpQMuaU*KmoW#Qf5Ha zdC3|1MFFWG!9VT|auw`a82X&im`gz%V#D0?X#e)J_AZ$*##&-H^8gJgl#F8D56F!3 z-6mh`Jp7|=9m|1o>73sdoUApr75Qb69~RsN!W3if6O47@9^daoh-3vWyNwZTcY>Px z5~+ugf(LNkH>f6tz8nN7;&zCv5V;OZ?+mi;OZK)t=p1e}3ts5F YTr-56YVKy234z5n4MKl-Ow1+!3;8_%IsgCw literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..d86afab4 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:19:53Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block new file mode 100644 index 0000000000000000000000000000000000000000..1f2b8a7862e313bc231e896cb3dc94dd0e5a4137 GIT binary patch literal 18510 zcmeHPdywQtdAHBUdg(jchwk9)HFoaSCInAl-Y*DA^p<8unvq8H492C=XfzLLG$Uz7 z(xf1eqGFsPhJ-R;OcFxE9|=WF5)vxl0xAUw1V}2RfD}a)5Q^X;n8HP#PE|;2Ub}be zz1`a!wu{=mx}DutcdOOizwi5fzy7pfd+Wj{|MB6*AAbD)?%SW-prkuqatr<7Km6{e zo_gIA%{Tqo#cydJya##D+pY)ig8x7N*6YC+H^A+i*KciXzU!m^{_W>&-_n}cy`gH` zN>?5ZRUP@$4e-zg07a{2Sm?R0g@W$GN!HVDn~^o%JImtn11WSpXb5pwVcB#JU__ zt#TeYLq$yEtFR{tAMo84tsAX)ZX(x6kLsh9#Wh7Ds_jlSWLRHDVc$BGB@p zf+^v#YNAn#x-Gf_uV)=jR9s4E5LH1SNH^JUl#{wjQw~sQPcIn!v?ZY`E_3)4*9Yt^GfBBfRfDLG?}s*=*yN~$u> zD8$I&L87SHa*pqhvXOqCDvt0{F_Wz2^LcD)c8g{R$INDCME4~LD{yEcSg|(Yl33Uk zf~91DMxb0U8H~tbXeUFWeH7(zdtQ-sg#m}>QI>0`;^nM3RN*(yPb9U{`2FK{-;uS=6R|Iu~k_2`ZTyXBrhXQY++BfDcXW zy2uc^Xe%6!rG2k1qdnC2b96gmIdwx;v#ofk8dj${zM*QOASxx-3)Q{8Kww@M2*Rsh z4d%O=9fd3&mtc=yS^S2{?&nCD-jTE zYH@Y{Ut+3-HD6q)9hdt;|S? zgQyO`hhtn`h*7p&Yr>6}95p1e#$mz&m>$PhV$_5sn?7jNl6|?(_ggcv!eQ*9ahEGJ z>)mdvj@iv}vfqkDJZgqk7eM4B!r;3FV*y66MkAJ}6B3!^2*KqfG{H&mlQLl$3(L3w zaI3PpomiO(a8x_7G85pac47rU(318daJ5s>6#(fL6HUa)QjS3fEhe3b)(Uzh)^Yq) z2Gl9bj?hE2*{DcVrlSy+HzV<~m9MmV4VEbiOxubyEy*&lT&7=;*jcn#k*YJ(tM%c{ zEod|MAP^h%(e@mG)ZD5#CVc-Z|Km>+Hj7X@!gfX<@!a^)O zLr3!tgapZIg674ob|Fe-GJVsFs>i7qrq^&8e`1Le|ICM&feQPKdBe z5oI;Lh3CB%9Uq7En$Jecnk`kD?qmR*$duA1Y%QFZ=|-_UY7Zc^$?#BCZHdox)AfSY zH(C`voDu2+Oc}X#pK;qAH0lyP(SY`1f1qx^@jwva{lH`4J0Oy08N87R;fYS(!9rG{ z$l;TpED%-uB(&TMUwdspMEB9g65||Mp$4s*J`w24oGvwh`>nw&-9C;A3km=r2Ov8`atIFu~Zac134} z-3(5a88n7$1mBaX+}|IF332XN#w$#SD3_fuBHb{%(^5Op*6?w=LYFI-L)~o=&n$~G zU3$Tz2uKJcEry>nIS^2}m5IJ8CP%w-CI=Q<`RGgz1XOOpu zGUQ2fzlnOB*rq*5T**n`Kfx{s>eeJw!Zc;+!dYy`opTuG@;Hi?rxKs1;^}NM9U{}* zwCVspRWAq@q(puigWJf@gtBykG4k!1Z6$N&B{4gING9` zUc-)oP_E>ev4|_r(Bi@uWaeycPQc`b%LM#EjOZ9PXS2JU3Jb}a4M8PTD9nZY6wL(B zxB?i(L3Rjfp_^ZHP{g3IXE8|lC^9=pp;Os6O1h2qK!s_iCU_c6bZDv_P{d&-PWV=G zFCEk%9jxH2Ky--JpxWXk4{c7O&?6~qHKb0` zQx|WJaXOwXjKp}WS)uE*>TD=Pr$8Jvtg@?T?1*_KI=HogwvFD<-cEq!PslyU1;_zk zjBFws@bkpxbz5hUn|IT@GcfR4wu*xrMOB7DmW})jawn|5wX509$m!k9b~mb7J?E+# z-Lt&o)=z=6_#(&?Rok(8iqkWPHnO?ued}&;8ka|MtEcyzo@yiK5CAs8$!hGr2y)%J z)gKx2-Qf9{>?qxGZ>A#Wk()OE?S?aNc*7f>cPsq1 zo`J19!RdJ|sb{F>#6fOGPJ$CLd)3SKHn?&1ut6U;AkSYH?5eYx`&*HlVHL1ii!&$I zb?yPTV7jRcs$Fxs>>s49bbGb~b{#Nse{6GY!(9uZmDT_|OA;MMs@4Eu_ zuf+l`|HNHe4{a~F{%>p}zq*b5=;F@BZyjilD*;F8^mgnqU(U=b64`f#-JXF-Y*VML z%pU6HDzj^Ck7)_5FRY^}k#yE?&e*xZ+GVdihCt;d8IZ^r-vtF2_&!ZVm+2}zCkf-)FgbF+Z_FUmlzkIjOh<)|?WSOqP+Vip)VE324AfU3ff>s=mQlM08K z^Ev~|p6|P=kg_#5PtT)(!vq1)sqG&H93}_=9c-9a zD4BrNyj93ky|&(IXgJTQ4X->)FkvP^G(`Av>a(WiX~5{AXf-YL^CQ0;S9w)*<`at zrKKX1Q|n_U?Ou@uZU6CsD9g_v%G&fUl#$bE39o5bJl38xtn^HpW_|MVXZuM)nSHHM zR^rge0%aaYH)2o(t0g0xm|4&Vs7DZ36Km4ZQEPxrp?;_MD|uk84(t;)?2a0Gl$FD# zVhdQQtd`?VPVIA+UA6}mGl|)g^rSVe>bfI!lNBZtDn{%K8Lec~Lsjvn`QBt8OM{Nf zHHiTbb9A>7<+7EG7#WVQ95(DCHS4GW><$}_0+=8g3S_i7V&;HhEuxui7!IBkJc?13 zQYFF5IZHR|I6vj_G#`tTp;V9N6D$Ob3t-I5Yd&7iB_{$)J82?olroah9MzakvsfFD z1##4hwzck6h7I325J1%cK%LYMfO3Z3;HJ$?%Xirf)F12Fa3QqEIJj*Xk6v5x_fT$X zwopkRp_QniXa~|O6sL~vs=(ZT^|9DdK?JZ}`r1{xst$)m=7B5;T~%!rOI)qH0&CF< z)!H*P?K1T;4h{RbOIORrI50271`0u4&P#>Asws^+XVtJ)ySN&&D`;pU5p+q!mwuf8OqNxsad`6cvJuF*kSxEA}kA;(pgNJzS5;DEw z(jYhiZcWRvevi*$QLD^glc+sZ3C`(eQ+BS)H)1@N8H_ZYXwEPbXDMgc8ikTl-5gUb zJqGy5c-ERkGRd(}@1XTg+V>Mxv&>jgG<5|seH7g%-}8#~fn&;cYx>gt|~SB0==U-$8jqWhSHE!gd_3N+QGaV>+@#x=j27iLbjILM|9#f{nK12C6tDh(gg>Z=Hn?TPbN3oMOADO^}dCc}(aAT(>#@A6Ld$FKYFlff|7o$Ai0faRQyRjP$b@a+Hcq`zlE_t}FB zkJ(@M*;DyYAbJLMpFQ4(yn^ntr}F-;YDf1WnsFf+avRfJIXTNH>2bM%3qm5=3G-Y| z6VjEK&@AxrSbCV~;!%Q}^s+Ozk_L|C>-@OUm{~?cZ~1mCG^{siH{MYxJZ8uTx~glZ z`#4gmf%m7$EX~HGNyp*MXffu-8}RI6wq0&d zD{j+4C-qjio*Kli;HsKm4RoLHZh&J__}tKa_5f(V1HnBN_ea`FV1);Q$E5JtB86+s z=ka5(Jy$fJJs3I$+am31k%9}3LMm5hi9rhPvlf9JRqqM(k*m{tE^l$L-g8Nd!{|Lh zgS~psA@ikv08^+?ykH~W*+jm!2@(KNY()vvssq!gpu{6ts*2nRUL0N~XN7m=6or?$ zM<4@Uq%T_$>PR>JKsGCnROP^yNpN<&Y&p+@!hFeNi36Ku!TD7)$&!b*JkJ)x{6jQ- z6}T(YXMKA@?evB)xeca(?Kk7g?E^?~*RFnqiE8;*)6Ht(UJg#FQ@B>)`Q-0=*Hv}6 zT8rvbPlsuKYWr}_QsCTtd#p!DdOh2*4|BWKDlaz&Bir2roBblVbF~}Uq3y^+rw5m& zy}tXwH+}^;J>MfG%N&{Z{;RrLjW~G0YM}GGu)~gd;4stRg{wx(r{gC^OSKNuaP@ra zXCh=rKCmHNzDvP7%-U_0cXnd zo9~pa1|Foy9yE8?Dvfrv2FROl2aj!m{|sIug*mqSy+-<#4e-&8`C&=mJdq>h;T`L- zSM`S8(`CC}bspZa9(#En-m|2~BDaRl|8n7-udjXoMQ_)idaU&Rzr5qKriJEtyf{@^JnOYIzY zBC8%2-EAGS+GAFG%xV{JeypRkV^#|ztMzPLV^(`O`gE=6&h~ST`)*%iv(G&pFGPO- zMsQ5L=6`_TP-l2S>UQv&(eXj}@j>|V&)Fci-aGr?BUbO?eds&SYbVElV@U6aef$f5 z{l8yA=m>e@;&op+|Ja2Ood4uQnGbFW94$Y^Px2I;kQ2c*tyeo<7JP&?SXf11ND_(_`tHGhrg|DB;R+&yZP&Vas0V2 z8jt_xb)WlG=`$aD-`yM4-+MI7oVZZ`r;k1L`d6Oc_|V6{a&h#U2f4z(KKaORzvt&4 z8$5n%`0l^G{b7WP5GO8def|!6`z?=u3{CvjEnk{G@jst?@8)~|{HC{f$-Ce7q0ZL3 z?>%v0mVUv#AO6(C58Z$7H~;7_YJc~-Klp6Bqp9A{z4NQu$@?BH(_5S1y2Zc$1O7I> A?EnA( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..51fe1023 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1064 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDakNDQWJDZ0F3SUJBZ0lRVmF6OENZOCtDNGZLdEIrckxPTUN1REFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dWakVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4R2pBWUJnTlZCQU1NRVVGa2JXbHVRR1Y0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJCnpqMERBUWNEUWdBRVlFSGtJbmxGK3luNnlWSGlPa2pMcnlLOWRkOUhFWFczMU1aekNhODRTS2ZITnRtU1UxVG4KSmc0OG0vL1FVVzJXQ1dGT3FJRUdFTHJ0bUY5ZjBqUVJrNk5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3RwpBMVVkRXdFQi93UUNNQUF3S3dZRFZSMGpCQ1F3SW9BZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGhiN2dXCnRVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURTQUF3UlFJaEFLamduTFIxa3kyL3RnUEVuMEkvWGFuZUpBWmEKMG4rVzlnbTZqSTFLL1pFQ0FpQmFmTFdOZmlzalhsVjhRMHJwY3FGL0ZKdTZJT0FITElhSTFsSXFuNEhzd2c9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDXF7wgqxfAlTitGlFF4TPuyG2v1jTct4QcWPPfSasBbwIgEg1cT2fWdn9eCJU3ErSPjrwUDHNZKa+QiZoiCmU6zas=", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org1MSP" + }, + "nonce": "XXqtm3JpIV9BlxdnBHHHbVSWMr7Nxv7V" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:08Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "Kxd7TJd+V+4Wk2z6vFCluR3JDEgUBUWx" + } + } + }, + "signature": "MEUCIQCZ5WcGNaIQeA7falJxy9Jt6JEAy8RQyLuiJAZWoa8vSAIgWNi7+n46FwawvtchcFyOTUzr8ZudnD68a+gYLyTKG5k=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:08Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "jltc+uqH523sBm89XifxvxuJpZvxirfs" + } + } + }, + "signature": "MEQCIBrMHXMijOi7QTSSD9V27fvLoAigtQ2MeDUkkLBmGppdAiB6NxFdtMSZlYdd4aq2V859pMlkZmdleDyX2mcEX69TRw==" + } + ] + }, + "header": { + "data_hash": "wNOZWam+h2iT8QZGVB0lD0eO0Z/E+n3tWoSzIeNnrSo=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block new file mode 100644 index 0000000000000000000000000000000000000000..96f60a070713d3d3904e758398f65b40be58c0fc GIT binary patch literal 18236 zcmeHP39#dKdEbk-Z~sYl7j2T=JV@9)LPORhzONK$bW64+Te5u4G*p&l*|H_sl5E+A zPD6&H8LpPI938HEGvjyDz)%?GiQ& z^WMz6r2i%Tzu))$zMnoBP^){9lONB&PQ3r2f7Fc^hwV4~=*IgVdD(yUKmF<}AAZlb zK6CiW2d<{pP7a@Q{a=1O^uX&s^wN9vcYk94uT!t9^{#z>@g+ZfRr8*&T^aia_9(v(e8?I0gn0dHCXAZyoETeZ1- z4td4Ojgv2oq*?wXPKpvsu{bJ`)1!c6S)7n?9IfRw)MGJJV?{KDQItqz#<7AK_XoU8 zp`EG^IS z>dPf^Na<){c21FqB0Sf^XrLHWzY^+CNH3~a^3je;Q!Y^GVJBnogPMe@louFgB{aanCRu`nzcCpe8^L2^PH!)daa4PV zkKu*Fl>!W{NNA@haU$oDvl&>@>k^gHuv;~fqngoaa$?1!(CO?9=>?@qDWZvHs#!Dm zE>J@JfD;2A?ah}r6bFhSb`+yH;_%rrH&%&NIgF#RQIF1ZktC{-G{EusKOV`T0T#tr zjBBNbW*}3tik-|LQ6ARHK_U`Ui+&Fy)f_p+>)m8PPgB`0 zp35eprF1%t4XkF?^5K|OO>}8plCTViMkYH}Cp;4Kd%|QZ8K4m;H@O*%$YE$BL83Z} za=0^X$a+GX!_z3s)nnm&QXKI8QK&p{W292C68&~r4;4V9qwe9FE0D!?KLFP-m2) z>jB#>8?u_Lg>yx}I!N&qRTBkK$$3Lxd8i8nHf#bxc)<(6)T&9I*lOv>iI0Boz0zYJ zT@@d{;h|f>qr-LPXYZFI>1VtJx%1D!JI&R7$lFZh{^Q`_96ZR^k0YlpH}W6SfCga5KE)^Y^Inwni;O(-S?Z8hamVm?BR`t@2Uno24J zn#MG(*KF(A9JF>+$GV*0cmSUnCrx^(Vqr{590c_QdpO3Wg%IV)r7E<$XtyGfB@Pp2 zxEykPAw>0AvN{5lQdF1Ayj~lV1rB3pots>yT5dLLWz4DOqk1hA7*b=jIKv?)5eDDP z7&9z_B^a?tnUKgRM+hD#p%G4kzbOkIW8pDwg15!7she1M32>oqV&Nsgg}R9a{yALw*Q;QdP+;H+JwQzSj2Mtmf$?K#!Gi}e{}}B~2M{78s|ngLY}YeEIuVLzs;Vz+ ziNlsYiiv8jDm6hZu9e&Z+s-6MxLS#v>DdVp4k@Cn#@F!luttY_zD{Yx2J)IC6{=pp z4cx$h()w)4pO)!LHs7tcA+kxoDXWgeCz|nc#@3Bmq2o^oJ2pL5iQYx z?&9n?U4QAeAj0)Yz`{2`B##q#CE>#(jkJsT>`a!!`@dfxD(WP3+_O;ocsK~UkZ9QX; z(#d)~$&lqzILKAUxSWXO(+!4qjeH>}nINS_5{BO|6iT5IUZS!+mZZsy?HW|F5zqy( z9pib9bUZ?vntE<#>d+TzD$1cA4JHwcoJBC4Ls1U`WP%AD!v&AE&~w`V#Qedz>^~0& z6a}`4rghECh{5(KKfjw7wCN9OsIP`;^LAx%cEyBihz7DP-FNhkpmMZw{X$tMdWC2 zO60)IlrNmffeDkF5jnvlCsrp2Y0`729CKr3qzq}&G;X3pPOQ^I$Xm(&Bz}TT0n{r= zsDx?CJcP5@MmXm%%;Rws%?~6#O@-shXxvA}xk1qde5{-iY{-a4aSWQ#DB(-e5ynW@ z$BrEl8X38y2E&>^QR>J2O`+@0nwp(*F@LZ|RfiQP1bnI7&XyTnO)$e&F2l8pHC`H`)qW60B!w;d)P8*6;nf~ahohOU7_L*H+NF(K4O&2$=tcoI*~*gzcHgDzXB9?_1rob`&|hncf|RdDpyG z7#tK;8Rl3H@?7K^*nDkMx5LP#o4al9RI*#{d38E9pK6T{=tTi!&$89E;4&QcQ%$GuNTaTb97R^Z0mtfC z%O=->LzwI;&3tRDBFB--R)4bp=xw*%_Oui5$MO!WT>~ziwvt+gYV}>@FmeFw3ptBX z*4M$o#l=p>*pD1q9@x}oaqmwchhY=2*o&k4mTgXfBUr~$+C{n3s>_p$p04RE<1Ke( zIp=(v7UM1MC-Q+jxCHHXJ1u24=-cve7k~Eb3H#SV6E6S#XRp0!ea7`)vyR-pjy!(t z#>ww&>yHZ)j?!pt_+vhw7#Ac`cg<$Yz$CWXq3y&L>g6fpC)*#>5?Y>lM@u5<H7?o==j!8XFFeQ#cEm$B=HJ1F05Jg9L{~BU#8%@HXnl z(J1h_QlOzBJwXXE*D`6URqr$^8qRZSWtbmF z7(WvsDlJ3qMO5@mWGNFV? zJDbcv5|rg>G#{wDiY*TYAeHg;MJp%?{shIl$!N7k#icBhQp-Ii?wykbt$%1+l%>ZI zWp#QJ%E-YWhnF-g9IE##c6=-ik|XlWYx{jdne$|$EXSdN8OnwnT?s)AtP~A!Vq!)g zpdLYBRjf(}yR|kpfbyL(TF3)Sb>J*%!{)4^McFBAAl85#OKK_J;#8fpoxIa7SW(RB z$NRNjvD0y-X0*U0eA$4LAcKWu+*Fm}Al>S>WvSipxGK>GVv24Sf?TqY5CdlK+-bum zQnSn&z~;2!LI5+#h9)Z76fsl4ur^UmRty)93PXxfm0Tgh%PG5Km2rN+<8eL|CVjCM z%|}=W7!Salnb$^mJ{9c?EbYdLq>)QVMzvdF8r5v6O=iSyEm+r@=b1J%UQtMrqrQ(z)#N}J6Y|9phKnT5GI6Y0C}N9M6?d-A>nsj&8=BE{5uDD8l7?=Mb%`_gx0*+ z!5WJ@=IYN&*O5oBMSeU}f2ODZds|vvn3Pm(R)5k18V&Po0OhD$v_}ofNxW=qRpT#) z`ZJTOccA`kY52RQ{>&>tHmUPxQGd2H+>!d@_vu`=JBU{W)*mg4eJV}nBXr-^0#QMY zKr#QNZ>W>_E zGdZGKa)!7)$XaTQVAEjo47fJPhx8Vo#DaF7 z!TLeRR0+;)CSy*j$yY)=mS}gi4pALr7S2+xS?l_uQrYTJwN41|f!?^*4Jq1-^r zjreF3DO!2P4x+Jh(CG_Ne$uUBw%m3tIa&{oQt-KVKW38Nnb&nul%FlYIh($^rQvxY z?5S6Nh8LpzScD@ub-xNU)uC}Mft7ltQ8O)!-DI|xVx(LY4O5+-z>h~|n;B&+K4S8i zGB9<98kKB4k}(CpkLRnPlZbXh(N52oEcT4_Z>aoS2w1i%KPe+f=t(2f!pwlg3)sku zW2)Zrmxm=aA2qur)4~e@Bd%1UQ2C)iP){V2O+QS`S+W=!M21pA9LE&SuSBDMM$8bJ z-PN1CTm0=SKYYJ!hMI$p+s$Apw_)c>z8rk|e`eL+#ZZ2>;9|&}UHRG4ct;?*h|15F z=tG`E`PtI=?4fEy`5~%dA?ouggH%2`PAKtSzJd!vB-rrtTuKw-g^*Cq@ZnJ0j5P5e zLH1k8u~&!#R~mKrUZpa&jY_9BazZ|{T&2BmL#6PLA#WS1o;>Bpm2wqaA4HQh8uzR;~o8UPccDa1P7ri9xCEP-`xe_qdKblA{*b}nFTo@k*I?Xc47hp_kx#WN1_ zz$$X@Du@6?aTLW*t1c|Sg3^#=t15C0c&2||*5%(+jpUzKErA5MvNP{RsNIe=nh0+B zuBvR?GYXFN<~^tNQ`krvvc$IClHmBFn`FzTBTwthu+a{>{vo((Vi1$-X_<;uS0!ut z=eG0y5x9DKd-5%#-;rH);~o{du&bc zZ5jxItb%#L{j%MS;Hv3fPRwB5A@ACK#qHbE+S%2|;n$I6a}^w&zdeT5>o$BZ6BgnM zNDN$M&0fe1Yz~w+#{<#8^3-WDbb4y-_%b%k2lda(k1yiZE%pF;_0z%KN5Ny0_fKJU z?%Ccy{m&I}*UH9&lnbcf+tqQ;>)pO5s*^qM3cg((_sj~ur%1;|PJHg$Pg}e6hg|Wp z{hj}L*(Vb3{_4wrec-XT-u4URGl#%C_JJ)geE$h@>*(i6Ze1W!@v4+{`hOyxLWyH?|GlU=WiZ< z(dBQs)kUZPvG3%O=2gir-Tk?{55D;I>DT}9k$;Qa{0k(u`o@=hC3WuymBt73eJ9<$ z_kBt|bSH}c`Q1M~^#0pVT>n?^sx!lnyzh|z2ki%+{xNelj&SFxo3H=w4SQ~KKk%c* zslQJ>_^kWx!ruLudarYcf8^tzxq08o_CJ4e_^KPel*I2JJbc*quU~$_e*{0hc8hxZ zFVly9Qhn>4Uzm-9f9`hjq4)nP{;hrAyYp)YerW`lBkwKo_dlrr@}BR%9IYt(PG0%> z=N|v3%YN`(%BlVQkvneeU;CXmfA*H-S|axF6_@|yo67BLZ#)QIc@V&Nm!L=c^$OVi z{EXet&)EI^j3@s5jMeH}iw|1fH~;;ee|pQWe(;T7JQREFYyTQO=11rNx$oLN?|C!- z;ZF=sVBh}msTbDX^_Iu)-2dpQzunJ1|I+-?M{m97)AYWRl^?JF#TOsH`{zG$UikLj ip?hygd_(x^9am_rXMXa!58jw~48HU{fg#uf_WVCzjAWkx literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..dd2e1f06 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,983 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNSRENDQWVxZ0F3SUJBZ0lSQU05dUhSR1lvaHZQZDRkZ0NxZFVHU1V3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTdlROS0YzNzk1NytFN012VnQKTjZYTFFyOFlVeTdCV05meTgrOUc0SG1LZHpzcjRRZkxhV2UxM2cvOFd1Ny9oUXAvT25nckp0Qi8xYkZaeFlzMgorSlB4bzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSUI0RnJGRTlrNkF2YXltUGxzQWkKVUhkNnVDN0E0ZkdGZHZ0NkVuODNEeXI1TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFEbEhnQlQxSk4ya2h5ZgptRkg4YlVvcFgzb3JESHhpUExNa1ZiTlR4QVp1MUFJZ2NJVitldTd2d0NacUNHMzVMcFIzYlpVR1h6VnpuUTF2ClJwWXJTd2w4czBvPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIA9oGTnQwcnBB3uSS5JdD840OvsSNgiUfNVK3KtjZqpqAiB0AeK+ZQmxQUOIwfgJqIIYJ5igZEh4sqcJL+9r6RG3bg==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "5r6v/dJTF41JN2VZ+XEszMOk8V8Ul150" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:12Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "yeEFGgzwTVYNA2zkhLw4odaF/gT3mYD7" + } + } + }, + "signature": "MEQCIFGxKjon6CkALnSq8mYqqUrpH+K6QqH3ZdxzCU71u8Q6AiBrv714iynQOUPmdvEOK8bSPdMxwBpAZYL8Swn0WpmxzQ==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:12Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "s+yjVPezCFL/KepeCvZ4Ikj5qGE0SxuX" + } + } + }, + "signature": "MEQCIEPJgkXqqP034ALssdkE/G0wSA+jV07m6Wr8w+2FQVljAiAWzCgXuQ3v6EZzYvr1iS11IeOWxUA5Gjg28RUU9N1jgg==" + } + ] + }, + "header": { + "data_hash": "eCUnkbsy55KugdxqobwD/kqPYnEhPFZ8+Itow9kWNrU=", + "number": "1", + "previous_hash": "u1OPUubqtmptezNyk/It4vWE3nXAjBbxouDEDhbnHUY=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAQ==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block new file mode 100644 index 0000000000000000000000000000000000000000..a3848a028e238211510e9b122faeeeef494fc6c2 GIT binary patch literal 18295 zcmeHP36SJgdEQ;GXUEUSE?VPbz?=1CZ4)=%zAuaex~1-xx}{d1#1OSwtv)1mx1?@$ zHvt2oZ0^I9i-dq<$`z;zIWWdfWjO*QgakqvTuw+RbA-z=1q1>iqyjikea-9+yED6( zwTqgm+UcFA|LHyHz3>0O|I@Dq)apLuXtzwssG#+?SboV zz5Asf_|^wM6ntXs=->wa#_!*N{nsP<$6vsb|NhTcJeoZA_|54*c;v$;j0fKHp(=9M z9ecrB;lIDTeJ^-;1w3nY@7l`h-6#J0n-{JhtPSjzsoJ*Eluc9Bkq@kZyH)_mT6NV@ zEiRu!ZeO{{`@u+><&WZ|D6tfaqY^o71su!bgoNX0Ew7<2i=i4TqA84`L?SbZ70kFl z;ARS)RDHy`xK?4)-6}h22S{k^$`Y9Y9NMALV1dM%99}GPBXWX@n8p|3nIyc!H*2(R z)WWHOTp~wQ8!gO^DH2hH$66Q-6oVR6Li(fDy5)XqYLnO(&0qK zrGyGm6a<2FqwPvQs;e~R0EHgu8G|3zBvhr`z$h!B0S=mE2@-x{GHe^ewh7nnEZaD$ zGr}kELg7pShE^n0FG`%qx#VmFmUMeWr8MeQjpVpy=uJ+nxD+}aogv+zR4GL?(M&aK z2Hyiph#zudz@^>!^hV-PF+^Q4ienC+O><+GSe3XNcNJQqo#8c72jpa0>K3>sij zjK#QCdSnJNrEXEr3=`#1tsEpGF}0Y9$qB1hl$5%bQG8`K5R;*6AB<6PoZz&m|5h&-~3`XQIw2>gu zHi~k%JvC%qp~K;6l;!HNa6Tyx`N23;9y&2nsdN*APPrW_fJn&~p{ydF!u^V78d(nQ z(u>Q&;Hl7nf^wvQv#3pv>6EWdMyP14pQsenKq-@s0p2&X%OXSQqOEW^79WqwGTK7z zaf+@7ET?S9YO)s275(Zk#aC2K6htNGj(p`&TOhDe69~dBw}9!cCV67(PDif#!_^00 z_7z(A*f(B$^iz9Y|D3x%e9(R76}KJu8{|8;fqyesFF+nKk#AiI4$Q%WeDO-;j%O~h zl(jVECzr2%_At1>gViSwBPR|ce|30y+-v;Awphy%5Nm37fi+WY`Ij0`!3q6 zNMwn_gc&YJ9A5}g1D33gL8TOJ%VoY@n~((#V`rV4T&7xXHfv?fuI8idS|~80CTMYn zLrx+LzL_y*SOiNjVv#Z-kx`BiTuwqGoCH6qE^K3A8|UF|(KdAx3oilA)lDqC1UOeW zvA`dwNm~K9*r@0Ne{_urM#5w+#h{%U6Hf$78NCo{IOA9Xlqt&&&?Z`~6eKFqPzY-@ zA@RJGF4S5TmdOfC-3nAK$uh81qMec0NibWGij(fB)P{pw&}D7`Al7T6^(p@H1#;#l zH4D>73KQUN@cgb@!7!n~z!|!L@cfJzkWhi~V`#yJjhKIe_NFHgA|$H`+9+(*GeJ5L zif5{-FWePJt@b!3s=2Dv1hu$UatdrGlN{q}C331~Cq#Hk5oI;LhNnk0I^6f^r7;`G zYqnIVx`PgI0z*n0uqA(5rYqTeuik;kCjF+Y+7h2=#>*M2ZPW_7KOvMmn9_60W5%sF z(4b4SL<72u)8lmgmD_>{Z+ig?-vE(3N#K=)505m`4(78mSq>lkdV#3eCZXe=h1w?v zM06Xi%rVZ91*%gk=>vg2CFW8cxZf(wJnG}9Fk=7!QUC&lTT{?bvO+Q)*3>EA*o=*f zOe@=IXRL8LS+6G|2#aQD6ma5-PX*E80?Hgen-oZW`OmVWm8R|RT%_KUn!{>u{Ik_`>Q05wlKMo zDe;Y#-7f3Jgb=WLN}uvmsX>g*qD+RB*`Ut$%?M+=+8JXNb{W{8XV4I`;{A@sQV(s5 z32_=&`U^~mD3=^CB3G9 z3m1J>M2>c+L=Mch^0^Z^;4!%wkrQ0f+jWAFCS7OBF*jyL%8({a<0d-d#5z5KypIpm0Jrf&TTS4na%e2?S;6TZ0IjUtN&q0o??nTy+Rb&Nz?pxin zb{TTXW`4Kq6an+@$c@NRX#4C z5V8XH+g-i8Fj>D59K`gl(kaS%t1f%POlN%oa?$dJFKySsfyIsSu54;EZ`f?JSf{1U zykV2gVp*<2E`z55i)A{rZ(*~zpU5}z;9|7b(_6}Ha*yQUI^KWGWB*#nnB=K;=0dkjN0<1R0q5{sKdnX(~J?bzGi+9+1#R@Y5}M zZ7{v&CLaBtwSiI_n|Nu$_ggeIyJo}6%Ol8Z2+90;nBNz0ALW8bdrUOK^C>H8to==kf8XFEzQaB5_$B1sBL#Y-} zg9L{~BU#8&@DA$7(J1Q{$OfnAM$jxDPpF8VJ)JXtQZa+6-E@JD!D?0ms6JB zE#v%<$K!k`O!{Iinvbv$FfM>uGp~*Dd@4E+SlWpbNh6n#jB2mMG^*KBhs=n*TClD) z&oXg%Y+C>oJpeUg8vsffdW9QS6Sc9+CZGUWPWm&xEzZHM!;JLFReyIBrY19;1X5aw zGDX|dUZFg7?x6}y<5wFCohyg{wnFf}y;PWuT_0^?Q!Y6k-#!oyO~K2SSKwjQyfm zwE9we!1qGkc&4eGWnI-Lf(k_=oHlrG2GBJ`$Zv1jt4$2Rg(i@Ovo2Y z7%q}H%fzv2p@@M&zB5z{IVjyla6DH++g7?hvfF0N?qO)V17)~;{|vHK^=p?x0{Oia zuuBYgiQz6W{1p>JWJS?is_CqKXBTk0nb>Y7_AAfCko`SXwH7MMS`3OOrqb+MIoN6= zHz3!5XMrm`lfdyV6i|+T#uO9D03x(QiEhE+)--*RoXuq8GUifyE3^7urzV zF81`HxdgN971+>+cHU#57VWS{aG@1>7Xv4C^`=Q(id?*$)P|n7l#<>%Q;mY2YV=2* zYV_KdqsbM*ZmyNAD{`pXi zW)6;aKI>EX)OF3q(=Zi|^Zl9{@A;1UvliDDVi1vkY11&e= z<8h?e%`;XIjh%sppNnFYZjG|#j?9Si4&kA8r zy<#*v7saSc*n(a6t3Xq28rKq7sb3m5)563_X8S2d%0)pIMd}LCXXpY zv&~TBlGTo6Ou_Ht`6|#8(OxL3_kGD?-$?(GiqW}%WvgP8GJ-@qX=GZM8IX7Z8@q8# zZMXd8QAy25&0fju;)Q?_S1M7c7*QbDP9&2}KTPOZvKSghMp8nY#1zi2M5BI2%n+K@ zYd3kP_^Vfp_(8`EHHW&>%U~&|VdYA`9IP8SwO;UiC`MawF=9@y7;Q1$5s1#CVzedt zkY`Ygwius2RBb3mL^Ui#eQsr#%10*&CEm|ha6yO!8-AWkX+pdZ5~>+K9EzKfCLScn zK`S|N3vu8`W1a6;Dih17=(VvO@|oo-?S>mFg@+7z+feo7DMpTztKjWnG)c1|Y0z-^ zZZI2i!xc+KJCjMS#m8G^tHk=G?8&6*B*lmsvDKs@z-qg4i{s*fagYd&j7&XB(6JB~ z&4qeYzuD(TBN{43M8qnMswBY5l_1s6v;zU0!?NwfuvEA6^2Ei z^^2Zj^z9X}OA4PJiqRGTo$gWM7Q@pcZ6VFVM~S^QH!=JRS*G)Vk?TDRvlPQ1w|jpQdQ&#c(#9Dq~+gKq2!-eM1cgjLZ9~{)SliQ zds14yrz+d_jDo}cdCzHW7B-efEU|63B)D?XO|oRumZw!?*mwtBZw6O;qM&y@EmP^% zRjIrD@3!N<09-S@J^7X~&}B#6xJQK^EGgUmPEp|4OY~MlRmO_0`thz|w4CMegxYAC zu*eM-rk(DN&o>4j!EbIlk1$ZJ@!6bav2Ztmi`5}qEC2N7pLW!RIb5xoIn~l(eWF_5 zS+^Lte7ZfBGbBeX+p%{t++vmIn}d<<=C<8l2#zdvBWv1@Y&tEtH1*}^+YfvkTr%Aw zIjh_2+NWRD#cG7XGZqt_j>4La?zYp6gJ&)}&99Ch7&X<}Nyo+YEw71?9eLZ1aQRLK z_s*8@~+^C^kKacgA z>rrrdW&z>Nj}Fc}#f3J%v&&z*5dg2AwQD)8fdQ*|5pXC!eSWdgy1b#+gF_xLTBe5T zS{IfMHw^?qR>8bfe`$9UxO%$c-e#G1$UD|RaR%13UUu~f_;YY+u7X4J_s-CI-GXm) z!s1&2iGi!TvsXC-n*-(Z;(=&jdFZ4VIz6;@K9hPiIwGJ7G$^bZwE>7Q?KLhR{lLrD*uqH-u}U_3+&ep+V8vbp}+j_ z!#}wpYd>`8qPKqOKID@Zfp_i$TV56aUF5|lm%wMC9F^Wc;0xCd%!=Rlte+eSkUi`0 zdFY&`%>GzV=soMpntS-VzhTAw zC+yV0$KL+?^uNUShJSeJN7nxJw}w~$^!j~AuluuqIPm9R`qpa;&o3gMxl{e|!Ef(f zy?O0j*S%`*r~m2R3$Oa(d_v#-$6H^Tf8Pg#Kd1x`eg2*oTDSh5{}J%coA3GK+rRm) zAHC?hL;H@_F8b*4JKpluPal25TfT06`SN%F_%na~_G>@Vd-$I9QSEuuYhr6}I{*zH+H{!;}?JT#-R9)m9Jj^=KuYHc>j^rgWrGP=ZC-hv*5S; z@1KF%NZcL&ljqh8g>T-*IF0|*uF&7(-15ec)!z1IY42z6(~j&r`r9vU^RIT^@#q(n kH-F(x_rK+_*ln-B<<8iNm*`gcK=dnL{`m}rU=P^y{}Wwo>;M1& literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..70a3c8e2 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,995 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDakNDQWJDZ0F3SUJBZ0lRVmF6OENZOCtDNGZLdEIrckxPTUN1REFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dWakVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4R2pBWUJnTlZCQU1NRVVGa2JXbHVRR1Y0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJCnpqMERBUWNEUWdBRVlFSGtJbmxGK3luNnlWSGlPa2pMcnlLOWRkOUhFWFczMU1aekNhODRTS2ZITnRtU1UxVG4KSmc0OG0vL1FVVzJXQ1dGT3FJRUdFTHJ0bUY5ZjBqUVJrNk5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3RwpBMVVkRXdFQi93UUNNQUF3S3dZRFZSMGpCQ1F3SW9BZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGhiN2dXCnRVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURTQUF3UlFJaEFLamduTFIxa3kyL3RnUEVuMEkvWGFuZUpBWmEKMG4rVzlnbTZqSTFLL1pFQ0FpQmFmTFdOZmlzalhsVjhRMHJwY3FGL0ZKdTZJT0FITElhSTFsSXFuNEhzd2c9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQDu0LU4kqDP+1IdacOqTLMUtjwLaLah3Fj8MxYhtQ/pOAIgJHQJijKMJsGe/6PGwi5TflDxTls1WUd90V62sYkMBAQ=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "bLGKcLbH54ywMi0QWZXkuumHhAGIaiaB" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:14Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "l7TjUUniD3Orks+vvNL4J09zzxAJkd2x" + } + } + }, + "signature": "MEQCIGcuXU5BXEbptlq6c0oP55eDR9Y3ATPzDb0a2Cl2GfwmAiAlrMgHrd3miVU8VhLLkmX2D+oBCDsanSWCAcrMowUY2g==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:20:14Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "mQi2fd9HUcDkXiDHAIsolbwPdxUWfwe/" + } + } + }, + "signature": "MEUCIQDtyV17U6u0MfFZMRDRoEByXXwv1AqcO6CfhuWd9FslEAIgYgm+LoeQ4MogjJDjct4UofbLuZchvXDSoCJ4YjpGiDY=" + } + ] + }, + "header": { + "data_hash": "dSdOKvAnQvLUbME/SUXh1RbcOSTpO0uY1Ly6bbWmu1o=", + "number": "2", + "previous_hash": "M1c5Gj4FfulT9NK+HtAgIo5xLAZntSVdnnuy5rS7Mf8=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block new file mode 100644 index 0000000000000000000000000000000000000000..39d05b3a5d885c9d7523211baf8dae956d8b49af GIT binary patch literal 4699 zcmeH~dz2IP701~JunzcWfELoV#6>G5KqkpdGU13iue@inGn=;*NG6lVL}Usmnh%u2GzB1x~gC548fj1_Q;GCgsqU73)tN z8hF{#FK(IN*mh~STufy6Vv&o7G8sNK?s`P0Ln09#gkT6V>L4!4Lt#@$YlNZ*WI`f5 z6a~W}$P|r6U|6q@LQx$E84X%Kst-Yk0R|^sq8O?Grlk^5o~v>xUh(=MVErIqu&WT$ zQXTDz)q^I~e;8@8(JGu|-8QogN8Mzv6`*W3+)=}EG-8RNq76f1HWqaxB$q!~%7);G zzG_Ew#??9L(g{##(t>I|Bo?P|ua}a@8p>iZ+ABwL<4HOm zwxrTwy}cark&;#QY5Xs_3{e2EuH)%0dgEg`o^vC02 zKUNHOz(QCDN>&05_4!b4Qb)%DXZmX$MQfa+DR)w&2~?tpm?WP?U)?4oMXF|l`)z+ z3|0d^SP1!PAzUNdDHQBmEK!z#PRa#+Fi5e8XzhClL0~~FXwl}vNvtB*fRmhQFBI@; z#jwRA*TYnz%t?_H1J<(@$5G~7^$C>W2quP-S)#}kBN`rv@kI+BLoi?7SB*QETFK$~ygFp&_b2>PcSDU=~w1cK8 zvM3TUxgIRojxtsahB5>i<53C~>uE(uk;F72gHtFfI>Z10$c_SrGomev#zMxDvz-X~ ziV|L^xUzgQh1V?Yv6LoMFoqbIu2wM(%$0C89Xq$FfU~=b=#V3_j4h7Z(^^6>rJV^Z z1G;GjtBOX97ZMu3@hsz{(%@5`$@9lf+?sv0 zqS!MW*gYKhPG7x3{7zrr>FZn8*U5{4tqs5n4M2CpzxFic;|)L?n#&ck6&{a=5*aQV z;R!yP$RtXMY{r}|P*u6#0i6vk4T^!hlmm6jChbH}Hx3wEk0e_gTL#ESgK~)CqI13R z+=WhVl-D=dX@wK8_pY8MFP@~0f(9_8jeu|%gpCms!pjF2LgY?tvbbny8ypW%4r zs%Busv_v|WN^ptNv}_?Zt-tSo*i;Yj&PPRfEWhfCr^X*Hzx8-**zw0ZGn*Fmj7NJW zk6-D1>gu}BgFTB*Tzg}idY z^!Jk&2c|Tw+%t2Ieeyo4bxdpI){9U5{F&F*?@_9jj(4r@s$H_ab5DNmjbEIe^oBOu z(RlS{@wy>hbCwG?FRVwo(Ay|g3HIp0wr#5y-}^)R{d-^g+1w5H{)k?7+nG=1wO65e zLpGJ`QAR->bYa_yO$Qo^%W`jx*s}Flw)$q{-9O&Ay|ip~kb;z|mc28`Z7N*+%X@9M z9S`QOTg87by>H#N;3(VLL+g;057ncb-2ZZX$%Ln8?@Y`qzfR8m^uV#HYX&7hxc81_ zvlh?YKJ0f&)u%n7GxvWvZrjS)rSd0uajB=zbnm_^K0!BSz{Yp#Q4TE}J)1pn zvU6l=#Wl%IgNB~5KqL0Q_=6R@<{iHErHT8WQL0$xdD9l;CQtUaBOM(xe*N*2cb>ld zCm)Ww=MM|^l#A6>ntGHA{R2wX-NSYJial=+JGyaPXwAX*)sJbeu{sVuIeqJ?HCujk z%rZ!+nl3#0wsPH{ZoFaD`T@5$Y-;8{qPy5jU*53si_Qr&Do?4Txs6moBZOsCCOJKruFBkB8HAj?>W+gI}uSs&pa2r}R zq$Pb65aVbiD^#4eM6wulA#9Ycs!6*#CbGt?pi6~eLn8K{NYMh4jaLk~&wYA&sQK?p zX7GETI7~lW`10U=llHYf^=$Z&cOISvO>Jvbp}W4H{KOg9`Q(%ZS7CR(a$*;?KwQC4}&51w>=D+ z3ACes7{qm7+3qYSn$J#BqzDUvv$6;Nsr&z4&hn&nPR#&@esejWuV$cE&MYWe`s7TI z5-UrVO>t>i()d@uPMG`!qbyi8Z|R^Q6B;8e0FIx%5J@Wv+EC1fQ3;2X0iC|AH|4A# zekttN5|DxSIt?MDkn_5^NUWXb@(4%dN;CkuV#Sc17IG#~aF|^=yxoPsK8M4BRkCqc zR*hrXAd<5PZa3znP^fpFBl_mK`dn`XVgyRnD{o~f42>crDxfHZ7keFTB9o+W2Wq1t z27QN#tUFwSSIbF(5$6DElduDf*eYbjI6|> zrE0OOBP3*o4S6Ks;X$9%VE|}#rRZm^M2anP6pk6Il0Sqd&|=kYiGYQYKON#tVST$- z!&mHdfRC{Z%e9M=+Aj$Vfk|`~2~F~YMKgp2t-HrBe#}-mePqZT$Cpu!DmYWRGqRj*-TY|PGi#~; cc+=b$Zb1xz<_*v1=kNS$58o$4U;r@SAHeEXRR910 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..907ae50b --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "5dbkpYCBw7zvgDc6dAf4VT2OKC7Kb9J2" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQCfVPlgYQT/mnxl2rXmTqxy/eCfOtscucFireKsgDReIgIgQc8Wa/BMWc62XJElQpbR9c9NmrG7H880kfCs1iuoNsQ=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "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", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "jqP9Rp+0jO2RohjcI8l/a/7LbR9YjfbONmlV3FKnsoU=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:20:20.566361500Z", + "tls_cert_hash": null, + "tx_id": "8228dde04544724cfe4b9a174f8498de4f0ba49ffd5533f4f204761ef3a48650", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "5dbkpYCBw7zvgDc6dAf4VT2OKC7Kb9J2" + } + } + }, + "signature": "MEQCICj6GR3j7WTSQIM+JUKyhFnC5ly8xWbgz3zbSwTe4zPpAiBLCnLESn016GrjfRCDr3OM+EWWOF3AizU1kk5Pg8EFcQ==" + } + ] + }, + "header": { + "data_hash": "FDpiWfLN9NlX+OEDXs06xEScctoT2FHogfc/XqP6N7A=", + "number": "3", + "previous_hash": "x4oaEpDyxDhzZhktwmMSpyckjPdbickH+X2Bp5rNYIE=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block new file mode 100644 index 0000000000000000000000000000000000000000..0e7b7847f461231b450ba091ef15145c449726fe GIT binary patch literal 4699 zcmeH~dz2IP7020SS=QgGXn<2msRrx;VUeB8=1E1ESCUCGlg(uElolqF$>jZ-O(qFy zMMbFH77?*pMbRQ`wIYauf-EhFRiIV{0Tl$a(29Vf2ZRcHI@x6@wVqO2|1{^!nKO6p z@6Ozt-*@ik0!veaN)s8_Iq<|ZDOlOPY)XF3T@O4&u6Yu9_R(n*=FXebwO~P7t@&ck z>Dh}G9eHfs$5ZGZ&w75sjZd$f;JDT?>F>L)yIs^Y=TxUhf|Db`lOw_FgF&Hbpt`wf z+1e8a2VHT`ycOd{4+$5gct(&UKE`D-LTdcf2pl!(AuX(fA!EeI^ExdL8zXHH7lj1@ zf}tqHN5hc86g9&U6QnbR!#a~83h8-s6gF}?Xwv1XOI2WcDjpU13ZD{GyBfjTMlje_ z5Mj#Gu3FxBeeH)5R+83W1jCXR5<^&`*9s_-#2i%&Ln2lYkx3L0Nd}>bQmGyDi)b4h zDFzG1DqAvF2pJQDq$3+5s|koud}Y2$I01zut%%l3pfL*b`KU5cMHp11eM%%2OVY8h zHI)vx*^8W?C|eSUx9=X$;y&eG9JK;IZ7BxfR5b{j%2pN$^f_c%!fLLBs$?+~h{eJI zR0?_Yi7*V6Z8*a9`A{qY(=p&of32fzi}5tYCS@8&$`me^m9y-x*%C>as*?JC8}KJk ziE>La<__XMx7$j{cAvLOu#{4>T51?dIoz;C;{2f!pVsGsEa9h6cVF6NiUwZTQY48` zCFs{DxB#69SBZ8Cf%+DgDQgfe=R$rxL@_4W*7pz`M?+}Hs?CLyXi2F7UvZ{=x}aYx zhpk?v9_9|pl9UNKXggPN3~`^YK90C~+$|zR+)}WkB_<3C2D50Vvy_ma3X(@kdb4^| zDjJL7yf2mNU}Ji(&D7$8Bom?anvEHOFP9wgVv=K%QJD(iNx;~xF|U>~drb_K$gy zS~Fp%!xE3AqCpX(DIr+)RCTsin+^}g(_CIBAm=v~IJc{Cj}nn_lQD!W;30D`-GS-d zWs6PV+r2uPvlmj?07jQ+%t*s+M2jJArFA3{M`gg$CR(gu9=pEiCaoPt+?;MVvFT9G zZ;OUp{v_dKa$#*mjER#cgWlaw(D=VALUmQ{(T|S36Z<4RjJ;vv;?19K+aUf;6S^Nx zs&)Som?y}ePZ z^v3fSwMIF$&Q7bGz}~xhy0UnZHVPRaP8)&rVMuR`m`#Fm@SG_c(Hn&}&Y;&R9XS#e z+DvVn5RDpi0&FrHwI(iX(rX1ctXg_0czh7h93JTywBS(Ps4j_J@BKq?*O=D^^DnNU ze|hzRJ;$exnLkE#wgK#KQ0;917q;;qg3&;e;nISX<9I=8jmCvkL~8AQy;hHqFA5o6 zP5VW0dSHS*e#k-INDb^C@LYj>(O4^MC{Usk<*ZRgJX?3rJlp0rz= z_0*5uC{Jl#cE@iLcivlzataqH}t9=V!c^oui}&TX&g z<~Da1Yf(n%Jal2}lJ0$V(xTkn;hVM`&sN^4e{jtDZ5@l2hbWy|)Aa7m#8wR^|Mf4U z$v-`jpVB2a0>V!ytA-K^K+bBnu(*`Mz_{*x7r$-|G_ zv*@;kv$qZXty=SW4|itq+3{PK&N`(oZ*E!SST;Vj?##>E?~h#%PaClQgIbh>_g*uL z*>|$@s??GjlHHA$p0VnN?|JomOa46f(A}?1+_OQgVcf5nH<^Cw%|3RO!*lbmK3Tos z^bf`z8S&5y^LG}dN>^(w%EkTxwdTQL@Ox6v`$LbeAJ47W|53}z)*Eb&{i|neIkjTb z)yJ)kYR!zqGw-XPdwb?hU26x-tLtvykI~DRA#c32{>#q8K7pUB9@zA1-RPkgqM~{b zJQ11*sd^g0vlkHK(u)$Ky+(|@p`RGte4DqLHIo5dGRwiVy(Nwq+N%k~fr?^2mQ1+X z-3mP<&}xmc!2gO_{geeRz^o93@_m>UqudH+W~jJ6C0H#TytSNirs-0cC3p(W_WCFo z$Od7e2)^DC5iBxPcCiRV;e_nM3FVA(imjs9sx@ltw*ktUEn`*0-p8Rq7D@S7ilJnp z5AH}p&f!770(}aahSRAS#RO#w(o2^%Le{cM3ObR=*kj=|o#SD;M7bduQ!q-wPbVQW za>(ziTu6&VIn-yv^a_IV6$N^~IV~0=5nW5%YJ#d+0mvQYpvPX7P!TUeY&DQ_g#E^F z%z)UmSyw1QV1d?97Uo4=MyO=%Q6m*W-Fds1O12lGX%^;z*V2||A{HCWeREo@!6Nv7 zXt4&1K$$^sMpkGMAw>^IrXZ;;1v%TaDU`^00vJcRDh3g+$^n=YT(JNP8AV;pE@C8+ zceIKD5*Q`Y)RGD2jc}^NnL)ErKf{>xx{id?<;zhl8fr^A{}U-%A)Y~1Y& z&idVO^Emt4U0YOrfezmFif`=Qo0mL%dI9(0yy_fB_v$M@?%Ci?-lm`V;FUu*)@!a9 z_1S@SszYzxdf@2KwzOUGOzWk~mwpYFjwh5z5{SsAs?%Nd}^H`nupat6J6W+2(xr)Qif zGm2)J6rWZ!jeYg=gespf%8FLlRMAtje;e7*LZLqfi5l5(6br!dr5DF-+tjz|@|H3Ahn0%=Y#huhkH ztwPC82L+LFGkm*TZV8kVZX7MgfZKhMDG!Ba%s+eh%^|B?M*6e-##N=A@x$VV%V(Yw z;}=_R**)V#U8Tjcv*$;a@wR4czHjB(?!0^49h*OV>tT1jM*WO^T>7>(2Ra**clxDF d?xzyFW9+6kUK-T=(D7XZqDT5<2nK)w{{Z?FPvigq literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..a9d5d44c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "cJ/p7tlo720UVDwuoMXwzL9n6CBaljJr" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcyTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRYzNVem85SVg0a29hMk5KK2lBNlB6akFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN5CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUV1ZGQ0K2lHODB6b2UKd3R4WVNKenNCZ0R1MFR6WGxLYlc3Ymg2QUgxb09aakVDWC9abzJjZzRuZXlvSmY3TWRCUXFKZ2xrUHJmbVQyYwpVRjNtUmRGSDJhTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnU2FJbDBzM2wwTDMxbEJFcFNYQ2FNT3k2Z0R6d1gyYWVPaFhUMDdnNGhKZ0NJRXFLL2dYSQo3c0k4K25ZcTcybHRMbkJvZldSUjg1NHRqTE9WcE1UQloza0wKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "signature": "MEUCIQCgRMBxTiFFA0Hdq62lWk5+Pea+1dP4FVLMjHBvGgFl0wIgK6GxogWHN+rzduxA8dQEP79ZuMLYVlmBrBU5KUrVqMo=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "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", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "6hxLBZPmASGoc1S9VcFZ1ybJB2O5t06OHuHc8UAmkSY=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:20:23.086771600Z", + "tls_cert_hash": null, + "tx_id": "d2f850124207d7cc41c27d30af2ee020f0cfb068f92d8048bb486f05c9f27a40", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "cJ/p7tlo720UVDwuoMXwzL9n6CBaljJr" + } + } + }, + "signature": "MEUCIQDlhsZWJ4rFpJz5k2Hjj3qHS762Eev+v1VrgDV7mREPwgIgECHy4bsS5tJ+4e2JyjMQry/XW5brbtkE7Ivfs1G2WVM=" + } + ] + }, + "header": { + "data_hash": "94f5hZ2d7KG76z9OXYG1LD6tsSxLI0s6+tcogmcgC3A=", + "number": "4", + "previous_hash": "ZAOMA/Vcc1l52Kc/cbeGmJtJt6pBsp9cLIiPh6iTk20=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block new file mode 100644 index 0000000000000000000000000000000000000000..a962325c850dd3a98877b343738c198587fb4fe0 GIT binary patch literal 5700 zcmeI03yjK}uTJ-FU>O!TSnzRS!7mDs-+%r|juRZnK8$0L+ABBC=rcQqZq-k@kks)SYmP%knuQ{>|q!pL?y(Gqlgq| zkYv?L=W8vU^9$Z?A_NE90gW(COe(~adNJOUA;OL|`5uu1BvOkao^b-LkXSZLT0{?F zP>IUgGqG5Ws+6LNTJk2^T#m3JGBQ4Ojc4(!eXWW{0k1~d1z717;E)w%k^EGE&JxjZ zx7Z`v#eAhw%A-ax0;Vb;r5-WRj8%AwWNRjcBNmBEmVGpH{V};_ zlD)WpdJN=b)F5fY#OMN^rRgYPCbHu_f+g*m^_PaBWRiv>2A3;#c-3DoutbhT>8WK~ zBn8IdNIOmxyM>%z=JJ$W>Jeik0!{tcBBKS^suy#9h-5-$Z0aUBjuz2k)Kf3j(2iXL z-b$%iUm@o)OVM$=9^n=lshNaXh#jgphR}zrk0UgX(-K1HxIr6&TLhA5L@_CZ<{G(f zB}w;M;dCPrW5@i6H=;CXs@KgoW8IWa`7{dUJDMDebaPGFm(pmri=v7^3Hj@=Uun3) z*@l{=D3UNtT(axIKw}6UbE622Ba(=ah}mD3K$ryTHffAR5Ho2Oa9{_@C`Oxc9g(a4}bB2XAJ8504DOfK$CMj;N8RTd`)$O8gKi|S!lyrDgfkV3r&)73Ebi9HjR1YqP z)l?PLAeN%ht{Fr{x$4eaIWgnc>N!ov#vwJx7yL*SjR21v3WqChBdNxTEZp%~Y>4Rv zc+$=L{q7i(!lh%hfiSJ8ZRDjymcyg zeF%(B{OkI}9P(CzOl3%VOFt*j78+qvW2lVdKgIkyE-rL%C zTaonHn`d@E?%=bJS8h1(-nDWb=$tZdHvq`JE!Ab-neir zv;W|R1SO{5$F!dG^uMC-zw~oTE&BGVUmnpNu<-?<|`ecj^ zoNNIm+Th56h!`;;E6pMhi4$fTC+s82*<)RMtk>t$=`lb?bqnhui7DbOu!xdnNrp6u zDU6I0W*sl&Y`nA~xTGo-k|~%GWRhcJgy~`JCHN#pOH@iKRp()aPrUO*agUY$9sA>p7+&s4yF>WDiRp${ci+VJz4>NEb#wGfZfj} zz_uXxT-9g@>gggdTUH^H=ozSlw;{HdSCXY%uv7^kF^`@u$^@2o7j>AIe45zR6XhT& zpmZZ4DYda?S!H1!j7PjGBSc~__XP!5Mztg#;c&vOl~Tz_RZz+W38P4{U}bu~m^RkLaMX9U>ykA~yxm*&UvUAm)qH}vZ2J{YZryy~ zmYw_lbj7b$W*n3AEZh3M=HShjJJoA$zidJ7k#}FZ@~VT)Ijh!pABqWg2425raCG(M zk34keQ2lK8y4sl=+|TYVZQXMR_*re~z4NTmU2ETb#JTA>aMf{O4j3FBJf!K(Hk_uL zg4h(BeN4FOGp!Y8ZEG!MrmdB+O(qgy@Ki4_t_9tYnHsMp1dII8gXp(?IQGkK`$TXg zGu`&V;E&i1!<&&qJrlz8%Y{R>3;yf7N3UkPr*ha$0g4>Eoz8SqFlna@WJag#6eldk zwoFFhRoharkN!EKHbIb4wA+YgNM9I{h$z6YLnkH?L!dZ<#!<4Gv@|G{)3Zvd6Utkq zya)FM#B3_Sg_`v&%L~$&$TvbfUT;yrmzE4JLCN(nBqt;3IyROL`E$u+67A@fwC=)C zy%?%TWtK%#B;uRw+~8B4n|=o`1|%FI`<0I|B#M+n1R^5{i5ZiDag(l*SQ3eocH=P< zW;#^63+Fqn0KpgZP`j3w;c?*0xqOjk7E54mUeeSwiRjVkWuf*|2*e{KLEBDfM7z<1 zOCWp^f1nX6jEhh%l?(vN)iLr+3|AO~CoweGwelQNMT~ADDnQLvUghl0r*|yt7CQ;5 zAW96)@MEUs%3CsxqgDmb^k=kl>aTA3&aZEK=CnPx-0j(tJFw@fMR%-v@ICUHDJ{Yi zI~M-=@8RNeK|OHF_T#VLGL*sR?kKn)&qUd6Pe1V3;Am{`>dbo^-+R$vDtElH?wu#j bePhYom-aOrA6)zX2H<^Q>68k=EHLXo9fV#k literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..a91c74c9 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,170 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "Mcw6fWbGqId1kFGDmqGf9iC9JgGkGPtk" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQC2QUUDBN4mxVUr8Kkq14OrZKmLx5N+fcxZt+kX6VeSDQIgfd9bjPZbgUtkECQ2bjgG+dopQN+FHExKE1XgUVQVSnk=" + }, + { + "endorser": "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", + "signature": "MEQCICqI0h9PqLV4N3s4pbZT7RoWKz7BYvMSfZsgjh7nH4xFAiA0HStbfSYzeaLffjtSmXfRUnulftSZlfGiqc/VfrQ8Uw==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIAwomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAMKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggDCiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIAw==", + "pvt_rwset_hash": null + }, + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIBAomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAQKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggECiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIBA==", + "pvt_rwset_hash": null + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + }, + { + "key": "namespaces/metadata/exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "namespaces/fields/exp02/Collections", + "value": "EgA=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/EndorsementInfo", + "value": "Eg0KAzEuMBABGgRlc2Nj" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/Sequence", + "value": "CAE=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/ValidationInfo", + "value": "EjIKBHZzY2MSKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==" + }, + { + "is_delete": false, + "key": "namespaces/metadata/exp02", + "value": "ChNDaGFpbmNvZGVEZWZpbml0aW9uEghTZXF1ZW5jZRIPRW5kb3JzZW1lbnRJbmZvEg5WYWxpZGF0aW9uSW5mbxILQ29sbGVjdGlvbnM=" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "pPqYSgRNpkVNTFNNUZLE7Hr0KhVtfyRRpEJIt0qkRBY=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "Q29tbWl0Q2hhaW5jb2RlRGVmaW5pdGlvbg==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEAB" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:20:26.598565200Z", + "tls_cert_hash": null, + "tx_id": "0ddd88a6528d1de432b3564bafd23d00849ef69e9bd635c7f2da2d4a9d5ed055", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "Mcw6fWbGqId1kFGDmqGf9iC9JgGkGPtk" + } + } + }, + "signature": "MEQCICmZiXICoHwabY2wexhXx/Xkgob2cgQ/hXnDSGSzNuqNAiBefMfDswZwHS+DaxuML9y9YpnEsQqnaye7C3ggtYHtxw==" + } + ] + }, + "header": { + "data_hash": "Z+vxpJ8/+ALLwik7zzwUULaCfHhMmUwbg21iNHBYnpM=", + "number": "5", + "previous_hash": "LqRiv+EnxXLqEuOi1Olg7jSBPxSgjPYbPCU5ABWW4R0=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_6.block new file mode 100644 index 0000000000000000000000000000000000000000..d76254db67a8a36d87ff63d39cbdc47728a11eba GIT binary patch literal 4047 zcmeH~ZLA|z8OQhDyD!({>SB%Ta)D5YxWdKlblT|)f^cT$%yin$v@>^Z-z1uu>D+0j z?M&NgJ2QpEgb)Z~B)F@htFT$37!_p+AIO5N(Zv-4N-#oEz6^8C;5U%U!>oy%47S)=eKny|4ZDk{3IFJI8d{DIJx&?epMVtD9@ z&EVi>u%*y9qWn@Z^rOw6n!HHFazdCwlFTt21!c4v1w6-5xiLk-I%`0eBcZ`bFxT`7 zmDa#kh}0tW0VIxY_Tx9jK~I0l}fya#!w;+p%m;S zQ!SyPvh9u<%MO(?@)#2?PuDb=E(L2%k_B3a8CLQ3xQeGdR)&>nf-NI9?bpU=SgSM| zYK3%aON6Q7n3tiUGR@&-gbNLj@4RiIn`vkQFSlHQh8|BFUhs6wlbG3Z`7uYV$3WR6 z9bR-?O03c)QDl*uEiI3c%m+Q2ltz(!PQ)2UDc43?hv-&iROU%>TDHdvU>RqI9IE-% zGGQte!Boen$U|)UWshg8xYwmX8XN7ZEpim}K=bmQQoLG@x+=RI z^dmjsnU;&(YG$qD6ckT(pN67Fiv~nC?TAi2q60&BSjtF|B zrri^Tv0v$D{Jbs1ErHZVmYHGva^H;SEitkv2sO}75nY^U_ZHKoUMD9AJaSyx2>Kym zMJQ$>Bot|A=#Yo*q^vq}5gBnsiign6xm6kji6%*jE@wkSNe=Qwx>j~Psy`~&daF&1 z*`m>oDE*`&5`yoO5kebKi-K`-sKDA((M!ROlE^h+wiBhzbSK{=Eld_f(sz@jZZ;zo zudFW-R<~@~)H2pdYE=R@Nd`pCR65;=IJpjoO86-5$th`^(D;Z(5Rr_Or;UEsYzTvr zap|RCb^4J&|GOeWJC2k-`ohEGV;4Oc-a~$A&r8?9%h*p3uDtH_(4*VHBiq3H`dSs@ z`}%rcU+=NLj?IG$z)o=f{LD$3E$jdrn^toGW)v_N#V|0Vf;k++cFcr+HV+QXfbfGq zAK!gtJoCsMn}pVU@6F?P6&{Su`3DxaoYQ14{mb(gg}ylhu9*oX0Qh{nxuR>n*49Ix z1fKw5OX=uNSJ8AQveMMsbtke4(8!YB8|s#(hi2zDg|c7`s}O|1X&YX-@z9~kd74VQ zIo9h7+utTO7u|&|%m*i4n4Ea>PF7tx6j*=v9buiF zz*aNvI>+&bXEDTJ%> zq&6j7gBJtBTl^By)>&qtv0gjh5k{(vG@i6qa{>a(RU8e$+b2SuaWStTLyV`9TcA)(3ud^dlGOzx&LQAO88w-|*-EI+MU>!*K{j3D19c_oMZ% z44=Z4y-&^GcEw#MI=iFK-8dUY;mA|3A5MM$rQOOUpSxxMj+U|g@zR~oT=~oLIJ! z5zNgmx3YDQKk1m(ZMY)8*EXD?;nKPdr|`E-yQI0ynukR$VOG~v5B??l|6a|3$2}=# zK*D#g=2OKCR@E$FE<05-jXWt(tkl*zfugCmUQT3if$=Qq_t+&qo`wcu0Y$BSa8U+g z93(lCZ{|D;%a`p^J3mTQJhc*~;|aZ#PbjH=wr6~`AO$95>LXF6oMv% zJmst=a<16osT}0^dLp)zmPW$R$19^j0%=t{HEdN(d>O>ci*cr3qOw#(GptU5hc>%j z78z^>F%9xa420;gKAT;vqc}q(da3HNj+OJd1P~TSPDRSlZOPGiicI=mMS)G|_*u4& z^#_%XqNmkZu@uoqS)r;Mk|=3K*ITT3rbv@s1Bl`~*y~5{6puf=%eDg+Q~}WRs1wQ=Z*@ve_iN$!_-YCIXwy-X@!5 z^Rh{H6UBD4gD^0o45jsL#<4SW6h|oPs8a?igB4M$6r{Ec6d9x)M@5Cg$T)zT%U$gt zBclA-{Ii?i{`Sc}&pe;~d;_90)1LVYuy4GIr(fRw;$dmwialQ=zgqjf=aV~M@ZPxP zX8Ks*33+Z_`P+}geK#GTHvIUr3%3e8ywCi7cJ4Vu9C`A?H~ng6_V%@&t6z3iBoq$f$73V4pA6GNJYWmbnaM?syFV4~`z z^0jVLA%QWhTL9T9ik-QVU30UMMPD2I-BJkG=vhR3t4w0 znXU1Z3CElm1C?3>FOha^{38rQ6{#ZYZ^Py zQ4zXXee-6py!(;B{5uhz^RIjvysDt*!@-|EoW300mA!4lHQ3>qdvczKX2DNp!5O}m zK|I6P8NS|OzD~@54}lHf;+ct4HkOie)o{xb` zz`Ut6G^?ekn&n%nYW1?^TUMtpqqTdQscN3dnRT8hSP|-GupXSd=HwUl@2{HGZdIvQ zhg#WfaV6_M)aprTbTT)p%uPnHxf%Ci=hotWY;Nt$&n6bmUa|AsTK`7O^V$^n?rDnN z^OlN^j})zjRuwG@L?B+$qO#YCw<}D!$43k^XTSud>+MR-NTo&hb!||?k=DTf>a|s^ zfz!NJi@zYldRFEo-bQ1aa>#Bmg`8_yHw%;+^$IT) z>?mB;c?{Wp*_}dAm&|yj)DT)KF7$a3vuW2`uJ4n`mh56KJ2+j>$SIC%G~qg5b=;Kk z_VsK^M!DH_Bq?NCAll(Vusjgz0?OK0(;w(UsP-AUSVA(fxEO;@yMbCU+cL$bL*`3l z%nY{-HrcDCdX+R40z@N_tO}y9(SG}S9@!cEKYAY78MvX3k!)Abkkf^3##EvXXAn43 zq?-P`B!=jUQ>g|9CK7$wYPm(DQa0kqI?cgBsNn>bfL($8rqNGw)ta@GBBdo^;6-t- zZcE{&f!9k!sH*=bHM1C++_2_LS8n_C)z?_xd2%oI!j`E`_Z@n6_7?6lPe1eZdk$^8 zJ#vhnoZou<&?8SDmD|22eEYV4MOxbZ?Trr{c>LX;yX>RI>~*Q{>7MaGH=py~t2gc* zZaT7O-S;nlNc{E28=iU8{PW4#R}Wrv=?{+Wde7v1|Iz#fcf3Bhc+0`U)ML%`g}>{Z zRXujc&fseo&j0ZbPd$G3+>UAR`Dt(#n4Fnhq5AeI08*W@*3mkn_qfv=T4nvD(*oWE4#ag`V@TZc}YW!B@cRGGY8JJm(-!%S){Vu6?bS1kYn=lG1 z+=G9C|KIcMX4_LZ0}8%vqQsRQqieN?}nrhMM6iMU~i3HVeR#HtbO*M;Ti#24KO7bwcoS>O;f*$>oiUFO0 z{AlH45>LS;5SiOw!zQ~rEy^7VVk+d3=%Q$`12*n0qhOQ>waLPwhUJop5D>h5D=)>Ex@4(5 zO@#+eUV&9;4dQGW>vZ!CMT?XI>8wxd$AyBXOQNKvZO5B;43VLn3J}G&h}Cyq^2j-t z-nO@P@29L^-hb7@M<1*_{^g^`ufJsl#yj`-zPRfn*S)ayrMPxt>g1CLPB7ha=Bd38 zuHUr%f#2l1lk=CZ7j|#>>z0Ebc)lLq{ms1xru?s*fA>9G|8$7?#Xo#--;ObcU=3LF EPkkmO6951J literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_7.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_7.block.json new file mode 100644 index 00000000..f18aeb56 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_7.block.json @@ -0,0 +1,173 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "O/YK/WFF7jc0xslQLEWuVpMhXjDWCLFX" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcxTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRTjUzSmJlRlQreEpxaERkdU05am5XakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN4CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVuUmpkb3R4UlI2bnMKRnJJNkFkeU5sTkVWdzBvMTN0QUFjdkRDWmJFVDVVVUhBeHFtRXBId3NuUW94OFhiOEhuN3BqR0x1a091aFBCNgo1bTNMaU5RL21xTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnTnRTbmFGeElqNTJEWkJvMVhSUTZDaHhoaTN5bkVRL1ZpZHBDRWJWOXhUZ0NJQXk2bXgzZgp3aEF2b2p2TElpa3NmTzhSZk55K0VKK2d3UjdvajJsYjU2aWcKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "signature": "MEUCIQCYO4B8XF5zrdywMPI/Bjy90eMPjEl+3+GfsdGAlTneTQIgf+bR0N/ZVHEv2i+6hJpSZqKrLsHF1QuDKidaVmBPs2c=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": { + "block_num": "5", + "tx_num": "0" + } + } + ], + "writes": [] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "\u0000􏿿initialized", + "version": { + "block_num": "6", + "tx_num": "0" + } + }, + { + "key": "a", + "version": { + "block_num": "6", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "6", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "31MW4//vG/NrprfYFB67vSZ9CohYas3TIvlqW8MiE18=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-04-22T06:21:10.936003800Z", + "tls_cert_hash": null, + "tx_id": "967428f03d5708a2016a1672e5df8a109d5ec19b58c3012042598fe06a21f85a", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "O/YK/WFF7jc0xslQLEWuVpMhXjDWCLFX" + } + } + }, + "signature": "MEUCIQCLDRFcLqJ6PNimBbQsx1HPLobh0m7t9A/9zR4ptt6XDgIgdtJYHKX/eR8/zVkG029QHeByBGnepZY0/h0g6+nd1a8=" + } + ] + }, + "header": { + "data_hash": "YfG4UbqJxUIhwIIikU6UK+H4DxrlRTXY3CSJzggPlQM=", + "number": "7", + "previous_hash": "HDCh/TJQ9oTz1lIiLaacOJtr5BJdlvIriD+LQ94z2lQ=" + }, + "metadata": { + "metadata": [ + "CgQKAggCEv4GCrIGCpUGCgpPcmRlcmVyTVNQEoYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KEhiqJtANKZOwa7t7c8y+QMnZw2jVmdnmfYwSRzBFAiEAqr91kJclYPJ/9Upl5wb03MXnRHRkU92wwxY8hMHUV3QCICkWTqIh8D/NGe5sN6KosMUGMfkYr7F/7NFEy/svQbqU", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block new file mode 100644 index 0000000000000000000000000000000000000000..054e41a3ec984ab0ceb800226ae89fe98190ddb2 GIT binary patch literal 4040 zcmeH~d#u~k8NhpQ+uQ7nttditz1zfvZd1#J#qo`u1X0AXee5`io!D`nQ&-uJ(;!e*WGkuRL)5QwMK;x3T0;$$R7gh>LAgrh65Fcwk6Se1;B2B8{pGN$W(c9_JXT12nuMD&vP1h)mZ8eSK} zgO4wOI~KsUOy9(XTsHXQg^Q;z3UR!+L?c<@S)PUpT8jdK=jqghreT#cq03Xya}$$feCPpXyZjiG?9Q*VQK|4FuTaU^tJcx?2SO@9$8z#Dmx-JSz(-j%$35@CaSGPEgSxr}%@We(8 z6fMdTB*&$tGEZdpM^fs$s^_5=~+adya~ z%D7x4EVU$B+5}|mg%VC?!G^lo)6lP=M}qT2%K2wR8+XI@AJT_tI*?dG) zll@kwM2jPlj*9pSS|%Hu7~x@qa)BboL~~5%lEhHrxj~ePx3e*&UFjARwMwSgL}|IJ zg{x-W+`AX7t$rjj|4l^j1Cvi}`AM#MP&>F>`swG!?_YiTk>aCI7(a>!@7oUU*$&?2 zYYoJA`FfYHcbKo|17H_8ADkDMJ8iSYAXsSFqfXNRb1InAzIQGx}N%H8YUr=k4dzbL$M}l9S16R!jNdWe@8Z|>7>n$U=8+;5b z*=pNxx~gtCp<2UeRh`h9Izu_5H#BVB2+jw#23fE!)V<(baQ3FZe_?gCVK)X1wbhsy zRX@d-tpB6@n{Cq@ZF;jfjV#W`u*HBMS=@}{*y85E{c{(bwQlFd&Ebz@!PgeRtusZ3 zr;5JuO%VdeW!X#i>P&Sg#4WpM!4zehy?WEiWF>#Qwy4QeYvApA zZ9{9|46juLN}qYHE=a!DZ6Qar42~V>oYzXX#gV2UU7$K^Ilgz5GLDAejT524x|o+y zASN)#%`nKnQmP*t`?1MX(;G1$a2=1Hz~oH)Wd*hhiXaOvn%R^`ZkH(+earg2fYxr+ z1-b09a82h4YgzPEher;#hWm11Fhrk;^knZ;Jx}cnHuS7U2k9(RDLNkAA7wg5vqew1tl0{w z{irGt;&@Dj2z@{=i{@!PPwfo+rjLdv zpNVjP!ZZ84op+hv+&B8=BDK$XG!mQ*bm(F7L%m)5_Z&#J;I406%Kqb;7rxR9UiI>c zSQj3C_0sRoFZKT1`pp%O?>u$;vA~D#KJ}e*U&Mb{e)gtL^RbuycHTqgNp|u2ZQ#0X zU<;TJ%&${@XaRssziRZ2{*>)&-;`}e@!8gL8*Iz|DrZ@lNl(bU9Svb_I^RrIJ>ft8 zifQ|;D(`gr%`z~z(SFnT>(;xhyX<=Jid@1fuX7Ln4gUYnv)|jE#u-rXt@C^)&R~sa z8FRTA&kXWppIN!3w|%DR*Kbdhzl8}LHSTdaArgls;s8yrzj09lVmzdHN@%1!8%q~E zg;shLD|uQe%=o9TLYh=#{cb_gt7g{Fdoi8q4nz>in2wqht!^B%Qf#J6XEQOPm`bIn zQKz2iEYnn{66Fjw83A^1lfy~^9EK-r$`_!kDQX6U|O=H3p5oSdnFY%pfgT#RjfZKwf%FawvsJ` zj8Rf78>TGDde-%pOP(b$lvf9m^d@cfjx9g9=4ZFXZomJ|)vaGX7I^Wx$M)=gaP-P> z9mb=(6?F8WQ%5d3DqZc}df&M_>n|BMENs8=>i*>yo;>IHC+3%!Z{71ze~UkI*)uOc hu;uPw9NYQe@lQH;t?oVlHYInZs{Ve4A=m^q{R{isB*y>% literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block.json new file mode 100644 index 00000000..e67bd556 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_8.block.json @@ -0,0 +1,173 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "enwEsFNrjWKNK1i1inkOv97RV9LZZa05" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDqfr/Jd0PqiUVndPHhWadG5ruVxYZmVQ+NBPJINl/nTgIgVRv3LTMNZFUXMp2FNEfkMk9deBnAZ5xddsYaQl1z0jQ=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": { + "block_num": "5", + "tx_num": "0" + } + } + ], + "writes": [] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "\u0000􏿿initialized", + "version": { + "block_num": "6", + "tx_num": "0" + } + }, + { + "key": "a", + "version": { + "block_num": "7", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "7", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "ad532JjVagLsqeBR+zp7e9j9cvU2on3pYWZ6xSAyayQ=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-04-22T06:21:13.573184800Z", + "tls_cert_hash": null, + "tx_id": "d0221f586a91c5c1096485165241738104a10d646e5ae968cc1f51607b4cfc57", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "enwEsFNrjWKNK1i1inkOv97RV9LZZa05" + } + } + }, + "signature": "MEUCIQCVzzYccSNfKXtKbEEjmzxG+IPpk3ESgPnqOHBBnfs8pQIgcehszn7XGf+22Agdwv+kFuwyrFniqG9r1vfzH81n9UY=" + } + ] + }, + "header": { + "data_hash": "vgvcf3uU3Y2p0S2QS0Cvjs8x3GcaPkQUnRQGBKCj4qI=", + "number": "8", + "previous_hash": "+9LltAXp3fopLIFyr/9taG7mX9RPX6IiqnUgn9f+Xcs=" + }, + "metadata": { + "metadata": [ + "CgQKAggCEv4GCrIGCpUGCgpPcmRlcmVyTVNQEoYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUpCRkZSREx6NlVuNy8wd0xVa0pkeE13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCSUJNaUt4bjBMV29WbEx2OFh4YlgxRDQ2ZVZMNmE4cnBWVGNkZ1BlY3E4Y0RwdE4KNE9nc2FKTmpwOTBqS0ZPcENQTzg1V0tLS0J2b2hPbytDQm9aOHBHalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJTWQ2M1M5UnZOdXkyWHZ0NkVjWW84dWtYajJVCjRXKzRGclZDSkMvY2dubU9NQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJQXNHeUdKK2RFNEY1NnE4WVVlMFdMSzYKTit2c1hSSERsUnNjTUNCN3l4WGFBaUFzeUpHZDBydFhtYWU5YjNQVi9ldkpOWWVnUlFSY1B3eCtYeGpRREJ4aApRUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KEhgXBKuDubQ4tsi7vwWS2Ajsh9YpKMx2+nUSRzBFAiEAoihURaLN/6AsolGBeLLHFhlo92WjBg+mgXJAKvUU5lsCIESexCV4cFqgPuD5yQTCw9gZzOZec8C/PSG0VFN/YWHb", + "CgIIAg==", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_9.block b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/businesschannel_9.block new file mode 100644 index 0000000000000000000000000000000000000000..1aab739da7cea15d16c9cf5387ce664937b3a2c3 GIT binary patch literal 29553 zcmeHw3$Pw%#wYj??dMN!?OQEw!Y?A!@1BdUi|Q zEpz!^L*$3|L=VNX+Ryl06F#M%59g2Q%_v_&%bu)4~MsY^uXFX z@BfA9eJMG9`ty(c_OBcw)=ue{AOF@j-;IqQJn!TeTHaq2Kh*w=@u8=G@c4<(T>S_C zdUNO?@}{pH1b4u{AN}e<@VO)4J5h5u8&^wgQZKXPmXCzCc10vpfJ56f>d%u{gTo62&LPKW7E}2G z+>?m6`G!n)x^gfvs7Rzkwb1QXu9~1e%)~=pr5{gi4a% zmgzkFJ#KN?s!a(cq96zaX@^^-T)3mqlm)7^(@Aytp)8^bW&518i268ak|s#_iB;gX z5!^QBTJ6O)j%qvj7+xqmQ-Gl*5$zO2F3Z{E^aw0z_lT0@^vd1%NbYtTT()FW=;Y`O zY5T>J6jHNVq9J$r9;gQRA(!>pv^_gLCp)Zmvz=Ob)R^~8{#zuWQ$A#jk zO40zwXJ2fRL47QWu^87(I+`yf>4i>e7%Mt*(NBaTN+A`g#Ef1+tk%?wQtij8M9<@v;+ck8bA4IpA}sFf| zC{l*$qcyZ#%8OL2UL_1?OyW5snU|X-mPrdt&G3~C(dc4{SSuy6V}Cj?7RI_Gwcx=G zIBG6o5bL$j+602RJUJaHRRdE=3KL*&aED&IgkeISfoEs~!X0X|J`oidFNWrAxDoS? z(cWYSLWpElL3M&gE#;?UfoQ6%c!GM?X|_g@tdc2<4IoEV$;z|sRD6UhrO=s!JCTLE z%%ZHy%Xrd}>0sZ}kw&a9rWBoAhcG#T5BiBU(%u zt*)H!cw<7bja7Sgam3iQI_kHHX0{7QjP0Sie(SCv!dtG-!Z$!v8OQKa%!7yONelBB zsWgWV{(XU{&?4d3J@vNF4~Xa%TAE>;BlA>SmO2B0KEv%&ZP?#R%*^rQs4xuz0E_|% z6n0HPMadG$v{|h~c}7}fRA8Fvb}MC!lJQzC&X7eZ=;z8~yb=rLl68i+y1Bex)IdTF z#kyXvke31yE>Y<|OVVV@u)0*d?rRCzc7*3S(zFS6($zE5t`5gSRY5t_rh)6k$f*;< zITW=aKwM0;FkG-%9o@12yWJn`)cIy=k_JokC3T8NF(s@=}RGgiWJNimkBz4%^p4jA^So zx-0Bra5%@H0py7LZ#a_p%&wToP8>^rj)^SF#Rp85F6oV7rWUHHc)ymXbNMr&Zp*~E zjpKBio<>px3<-TQ!%t#4;0AN^A^NOhIoh7Ya$wq(_aDmvH<+8oa)M2|y-pC4q-{;Y z%#AZ6D=<=;_)XN|vNhU)p({CX{U_MuKy67xMNF;ETsVtuxN{D}Y#v9^+)(6`R4^J3 zM?GYe8x}0UM~W%IfI-nHiotF)ih1I6i0LM4W77x;^;AVt{6W~;0dcbE_#%Ox#3u2RaZW4l3N;c!h4_RLa!zS_UCa1!}aLt6E67m#g z!w40Pxz{)c7{$T(5C(>Ja=L>w1_yfIT6$%}k1G7i3;^(DJ|! zJyMk|c$7hOXyfHRP6xxOUN$I~^K@}s7;A!m2(rDBk+VB7)2Htg5Uw3TYu%=1t_Q*S zlF_sj!$f`>dBxF#$Qp7KIRZZq9X+siF>=x7_-@fC1ZK^V>yT5>_KHnyjw2UuZgU*w zYa55kDixTUoyDQ9n>Aj$3LL|A%~UjVV2Y!jf*ePVfWxNV(dYYLI}I+tDps|TYmOD< zGUV9Nr_MWm%PqJ3)Jgcy;w;u)0WO+YiOsH}4=m(j)`zPjd4$VVl&&Y*=GKn7B;gDn{4KffM>ZUa&a8@uVwezP4gPj@zDJ2306&a)i> zG7=isJTo&Vs~o0JYydn#(H+*G-EjBx0bp3b^zXd zJRc|fG8+tz6F3WF7Kd)4Ls9lAeuBfop)`zc@HXnj(IDXsCR?^5L`>CA(v$pQFX;nx zhuh~5dr2Qa9n+FkszSh^UQQ*cX01~%sW{ImB_}ryF9&PtL{*+wI2HK>g#$(kWX{6&R7(S(W8qN7?R@JBshai#i z46?dk6udEtx8mWlOhv^slTeC%CTi~(KdpaYSCl2k5M?!b6UxZpFoR1f77Ww|B_lc( zhw%}4=C%EMLYet|qb$RrzA4HajxGftfhL80TsAfhJRp-nU}daK`+IU58$#}{I+_y; z3tnNHgky8Q(WHz7Hq6Svh{V+duX9R^Gt8XX&g)^!97G3lztHJeVk4YqVxF|mjFJ9) zJgO;GXP9gb+7+=~x4AOW2H6DN$osi?K9==q{hbqzP2tcY-vFBvj{N|}&7)ijZi1Kz zU|54F$4gxc4+{>(DAi0p#8(nVM=#?1kjJBZAV_*5O_~p}5HL1?**33^@LVE15LnuZ z67g;(CU(m`iK&;$xV%?{0a<(MM}$>E^P~Gt^KV=84SVPW zr3V;psA>Iz5GO|i50{WDz91KE8ANt|V(SUF$7z#!KiD)|hg{6aXMk& zis%XWsTl*dhM$(sM6^8?YqTBUWyOyDwR;d{qqwQ9slVL-R2H z#zar8R|Pm0%O@=lZ8AY`6eSE^kLvZb8imZDuIakHR)=eY8&&%v_5R=S-Th- zSi`E9XFTeltB;pN7!y|Vc@<$S(~?U)ZiAMbvyxzv=PeoTUH=5Q*`(Qi=ggpvWJ3To znKKh&HZc{aq)5Bmg1WDctO*XYk#$4S)qIXQJ_6-Ce_PuXo!#o)Ank7 zwMwhr+F;moA|u<1>xBW2*H^O!s(=Q+oq-h!X)WnP{mapFL9$YA{9(T zkWP6%dH(FiI}oXGns=()7Iw6A4TW5US9`aDqt%e9e(QPIwBQP(4%6 zSXjBOu#RN(bDm+9HA}vfoa$7_Y-{Uq4$uYi(8yTRdv+vhp=hjVu|7`rOExPdoQ5iC zeu?#$n_U&lcfvW9RSQg_C3mDc$mNwzsb14Uv0@Z65@Jl0%QO+BjgY1)W_K7A$(@k* zTzH>VPEnm;u`s+eCv`#K`OUP>wAKcTc zk&6(pvFEMr4sQLr*v*18dhe7p^1Gzb@3>NH6(d>^!u)82 zdBar;_weeO1mxY$fwo+%evGTsx2&Y@gr$@`Ey$c2`Sw|7+=av`D|6v7_6 zG)&~e<5)G?&y{dN2>I(?o=d1gG#?PkDLxp8YM}=1C&)oFKDP5wV2Ps+-!GNMMz_?F zM`pmI70a|8tSb}_smxtn)$=D8vcyaYZw{Zz~6!#OP7iVdZjnX3)+cG*G)McG@7v;#Z1s`5jwT(m3)RC`(!WSwiTu?^;dj+-^i&SU{Lo2XNW=UouSg@a0H@HoKWWxa+}%$`C#)@8srhd(^o(d|Fd;s@Z`>tx9cg%_88^N%vTs zA?Y+t%iPQ1=1+OnIhcys*tOZugICOZBdeKKMYEdl(bN`4-~GThfQu%5BxC43-Q51E z&YwmQykvf&lcTU&UElRIqu{0UMzgEq2VGe)_R?^EeT!=%DpqCJhVb!i1^3<_-_|}m z>1%wYtC+n?RoUpWyWZ9L@CGZ1_fq1!z7TV6TW-7l>aFU{E0GhhF87ix8#jt`*Tdk_ z)Es)7MW4Ggd!Fit7bEU<0Jyc*x?wd3U0B?WfaAGIneWEd#jSc3IPP}&rlz7DRfm=2 zjV^*9N5O36hK1er;PT0{bi2WxA5<%ByALPqM?1_<3**6G*D zItuXX+B||iuy*_m&vIaWu}A}QV127&fE!M3;}8z4!&-q^%mdBfmw9k~VC^f{AP-%$ z^%Vd58o0Q_j;DyMMEtNacGCh5%lh0G*#ZtrGOX>mfF;Ad5N|6H|4PKa$CVUUBL0n) zBlocI)k?&_67g>=L%J96tVI0Nb(a^*FS@IttVH|*yay{0|Jkpzy}Vq?QmnU~fN05Z zPud4}rId5Ds@GDiw+afkOc4D)UD>&qk=@_o4J#4;;pyQ#4aIom4&_dt7guA z@rM7eMEvKJ*P72xAn!UKtZ47adkW4f`dG=ASMufAdvB1FZx^n<=gl9CKLq~t^*7x0 z^w0kJ+wOW=I&#}nS0a>;ICQG=l2cC~f9d#rC*F436aV4-KmYC*e)w09U;i`etM2>M zm*02aKi>VH51l&khGXB$T=&vH_{aC(`=R>|g+KOZ2Y>(mk34Q3fA6pV&QsUl`mMj; z3epJ=zK^*nezhd&*}UfD+3I}HdTwg9BKl@Prv8R zYrozVj^PIOncJrz?Rma@?~i`#{a=axT;uEh0|#GoJJ)#NiHpAX+Iv5L`=^r6eBh4` zoqFZxe(ApN-g514z3;BK-};Hh-(9PI{C|Dol>bfNzvjz-bN>&&`agdOdH2eb&ffU5 z@}#Rmp#2mAAt#gSBc9_Qc=D6Z<>!ArTY2omH+Sziol;);6@>PYhpsws&s(nlUsBn?sRgtqpz;r^-1DgFQM12y7kgup{{x0qkrVTccg&YOA(j5&U%v6FL#Ogz{OldK=O2Ciw%`5Q zf47(iBmb67-g3?FW&hT?sPfq-*1z=jwYQ!Re)D_)->aBaLx9&ar zTlX$}-C_R6KfdGs_grw|&f8AC{+r^%){pLd__2SQVlj93_kZoli~s7XH+-RqV$fFORxa6+; UZ+z%i-*MBiw%#wYj??dMN!?OQEw!Y?A!@1BdUi|Q zEpz!^L*$3|L=VNX+Ryl06F#M%59g2Q%_v_&%bu)4~MsY^uXFX z@BfA9eJMG9`ty(c_OBcw)=ue{AOF@j-;IqQJn!TeTHaq2Kh*w=@u8=G@c4<(T>S_C zdUNO?@}{pH1b4u{AN}e<@VO)4J5h5u8&^wgQZKXPmXCzCc10vpfJ56f>d%u{gTo62&LPKW7E}2G z+>?m6`G!n)x^gfvs7Rzkwb1QXu9~1e%)~=pr5{gi4a% zmgzkFJ#KN?s!a(cq96zaX@^^-T)3mqlm)7^(@Aytp)8^bW&518i268ak|s#_iB;gX z5!^QBTJ6O)j%qvj7+xqmQ-Gl*5$zO2F3Z{E^aw0z_lT0@^vd1%NbYtTT()FW=;Y`O zY5T>J6jHNVq9J$r9;gQRA(!>pv^_gLCp)Zmvz=Ob)R^~8{#zuWQ$A#jk zO40zwXJ2fRL47QWu^87(I+`yf>4i>e7%Mt*(NBaTN+A`g#Ef1+tk%?wQtij8M9<@v;+ck8bA4IpA}sFf| zC{l*$qcyZ#%8OL2UL_1?OyW5snU|X-mPrdt&G3~C(dc4{SSuy6V}Cj?7RI_Gwcx=G zIBG6o5bL$j+602RJUJaHRRdE=3KL*&aED&IgkeISfoEs~!X0X|J`oidFNWrAxDoS? z(cWYSLWpElL3M&gE#;?UfoQ6%c!GM?X|_g@tdc2<4IoEV$;z|sRD6UhrO=s!JCTLE z%%ZHy%Xrd}>0sZ}kw&a9rWBoAhcG#T5BiBU(%u zt*)H!cw<7bja7Sgam3iQI_kHHX0{7QjP0Sie(SCv!dtG-!Z$!v8OQKa%!7yONelBB zsWgWV{(XU{&?4d3J@vNF4~Xa%TAE>;BlA>SmO2B0KEv%&ZP?#R%*^rQs4xuz0E_|% z6n0HPMadG$v{|h~c}7}fRA8Fvb}MC!lJQzC&X7eZ=;z8~yb=rLl68i+y1Bex)IdTF z#kyXvke31yE>Y<|OVVV@u)0*d?rRCzc7*3S(zFS6($zE5t`5gSRY5t_rh)6k$f*;< zITW=aKwM0;FkG-%9o@12yWJn`)cIy=k_JokC3T8NF(s@=}RGgiWJNimkBz4%^p4jA^So zx-0Bra5%@H0py7LZ#a_p%&wToP8>^rj)^SF#Rp85F6oV7rWUHHc)ymXbNMr&Zp*~E zjpKBio<>px3<-TQ!%t#4;0AN^A^NOhIoh7Ya$wq(_aDmvH<+8oa)M2|y-pC4q-{;Y z%#AZ6D=<=;_)XN|vNhU)p({CX{U_MuKy67xMNF;ETsVtuxN{D}Y#v9^+)(6`R4^J3 zM?GYe8x}0UM~W%IfI-nHiotF)ih1I6i0LM4W77x;^;AVt{6W~;0dcbE_#%Ox#3u2RaZW4l3N;c!h4_RLa!zS_UCa1!}aLt6E67m#g z!w40Pxz{)c7{$T(5C(>Ja=L>w1_yfIT6$%}k1G7i3;^(DJ|! zJyMk|c$7hOXyfHRP6xxOUN$I~^K@}s7;A!m2(rDBk+VB7)2Htg5Uw3TYu%=1t_Q*S zlF_sj!$f`>dBxF#$Qp7KIRZZq9X+siF>=x7_-@fC1ZK^V>yT5>_KHnyjw2UuZgU*w zYa55kDixTUoyDQ9n>Aj$3LL|A%~UjVV2Y!jf*ePVfWxNV(dYYLI}I+tDps|TYmOD< zGUV9Nr_MWm%PqJ3)Jgcy;w;u)0WO+YiOsH}4=m(j)`zPjd4$VVl&&Y*=GKn7B;gDn{4KffM>ZUa&a8@uVwezP4gPj@zDJ2306&a)i> zG7=isJTo&Vs~o0JYydn#(H+*G-EjBx0bp3b^zXd zJRc|fG8+tz6F3WF7Kd)4Ls9lAeuBfop)`zc@HXnj(IDXsCR?^5L`>CA(v$pQFX;nx zhuh~5dr2Qa9n+FkszSh^UQQ*cX01~%sW{ImB_}ryF9&PtL{*+wI2HK>g#$(kWX{6&R7(S(W8qN7?R@JBshai#i z46?dk6udEtx8mWlOhv^slTeC%CTi~(KdpaYSCl2k5M?!b6UxZpFoR1f77Ww|B_lc( zhw%}4=C%EMLYet|qb$RrzA4HajxGftfhL80TsAfhJRp-nU}daK`+IU58$#}{I+_y; z3tnNHgky8Q(WHz7Hq6Svh{V+duX9R^Gt8XX&g)^!97G3lztHJeVk4YqVxF|mjFJ9) zJgO;GXP9gb+7+=~x4AOW2H6DN$osi?K9==q{hbqzP2tcY-vFBvj{N|}&7)ijZi1Kz zU|54F$4gxc4+{>(DAi0p#8(nVM=#?1kjJBZAV_*5O_~p}5HL1?**33^@LVE15LnuZ z67g;(CU(m`iK&;$xV%?{0a<(MM}$>E^P~Gt^KV=84SVPW zr3V;psA>Iz5GO|i50{WDz91KE8ANt|V(SUF$7z#!KiD)|hg{6aXMk& zis%XWsTl*dhM$(sM6^8?YqTBUWyOyDwR;d{qqwQ9slVL-R2H z#zar8R|Pm0%O@=lZ8AY`6eSE^kLvZb8imZDuIakHR)=eY8&&%v_5R=S-Th- zSi`E9XFTeltB;pN7!y|Vc@<$S(~?U)ZiAMbvyxzv=PeoTUH=5Q*`(Qi=ggpvWJ3To znKKh&HZc{aq)5Bmg1WDctO*XYk#$4S)qIXQJ_6-Ce_PuXo!#o)Ank7 zwMwhr+F;moA|u<1>xBW2*H^O!s(=Q+oq-h!X)WnP{mapFL9$YA{9(T zkWP6%dH(FiI}oXGns=()7Iw6A4TW5US9`aDqt%e9e(QPIwBQP(4%6 zSXjBOu#RN(bDm+9HA}vfoa$7_Y-{Uq4$uYi(8yTRdv+vhp=hjVu|7`rOExPdoQ5iC zeu?#$n_U&lcfvW9RSQg_C3mDc$mNwzsb14Uv0@Z65@Jl0%QO+BjgY1)W_K7A$(@k* zTzH>VPEnm;u`s+eCv`#K`OUP>wAKcTc zk&6(pvFEMr4sQLr*v*18dhe7p^1Gzb@3>NH6(d>^!u)82 zdBar;_weeO1mxY$fwo+%evGTsx2&Y@gr$@`Ey$c2`Sw|7+=av`D|6v7_6 zG)&~e<5)G?&y{dN2>I(?o=d1gG#?PkDLxp8YM}=1C&)oFKDP5wV2Ps+-!GNMMz_?F zM`pmI70a|8tSb}_smxtn)$=D8vcyaYZw{Zz~6!#OP7iVdZjnX3)+cG*G)McG@7v;#Z1s`5jwT(m3)RC`(!WSwiTu?^;dj+-^i&SU{Lo2XNW=UouSg@a0H@HoKWWxa+}%$`C#)@8srhd(^o(d|Fd;s@Z`>tx9cg%_88^N%vTs zA?Y+t%iPQ1=1+OnIhcys*tOZugICOZBdeKKMYEdl(bN`4-~GThfQu%5BxC43-Q51E z&YwmQykvf&lcTU&UElRIqu{0UMzgEq2VGe)_R?^EeT!=%DpqCJhVb!i1^3<_-_|}m z>1%wYtC+n?RoUpWyWZ9L@CGZ1_fq1!z7TV6TW-7l>aFU{E0GhhF87ix8#jt`*Tdk_ z)Es)7MW4Ggd!Fit7bEU<0Jyc*x?wd3U0B?WfaAGIneWEd#jSc3IPP}&rlz7DRfm=2 zjV^*9N5O36hK1er;PT0{bi2WxA5<%ByALPqM?1_<3**6G*D zItuXX+B||iuy*_m&vIaWu}A}QV127&fE!M3;}8z4!&-q^%mdBfmw9k~VC^f{AP-%$ z^%Vd58o0Q_j;DyMMEtNacGCh5%lh0G*#ZtrGOX>mfF;Ad5N|6H|4PKa$CVUUBL0n) zBlocI)k?&_67g>=L%J96tVI0Nb(a^*FS@IttVH|*yay{0|Jkpzy}Vq?QmnU~fN05Z zPud4}rId5Ds@GDiw+afkOc4D)UD>&qk=@_o4J#4;;pyQ#4aIom4&_dt7guA z@rM7eMEvKJ*P72xAn!UKtZ47adkW4f`dG=ASMufAdvB1FZx^n<=gl9CKLq~t^*7x0 z^w0kJ+wOW=I&#}nS0a>;ICQG=l2cC~f9d#rC*F436aV4-KmYC*e)w09U;i`etM2>M zm*02aKi>VH51l&khGXB$T=&vH_{aC(`=R>|g+KOZ2Y>(mk34Q3fA6pV&QsUl`mMj; z3epJ=zK^*nezhd&*}UfD+3I}HdTwg9BKl@Prv8R zYrozVj^PIOncJrz?Rma@?~i`#{a=axT;uEh0|#GoJJ)#NiHpAX+Iv5L`=^r6eBh4` zoqFZxe(ApN-g514z3;BK-};Hh-(9PI{C|Dol>bfNzvjz-bN>&&`agdOdH2eb&ffU5 z@}#Rmp#2mAAt#gSBc9_Qc=D6Z<>!ArTY2omH+Sziol;);6@>PYhpsws&s(nlUsBn?sRgtqpz;r^-1DgFQM12y7kgup{{x0qkrVTccg&YOA(j5&U%v6FL#Ogz{OldK=O2Ciw%`5Q zf47(iBmb67-g3?FW&hT?sPfq-*1z=jwYQ!Re)D_)->aBaLx9&ar zTlX$}-C_R6KfdGs_grw|&f8AC{+r^%){pLd__2SQVlj93_kZoli~s7XH+-RqV$fFORxa6+; UZ+z%i-*MBiB@4fN^ zpL&~Blmx4lKN%)TFynrI#{KRLJcVgGi~Qj_S|r?W&MwcmXW*muGAt3Z!=0a+#oOl9 zC3phG){6V!>N)sW9Hv7rnnmjmz8_5!< z`ovRabFbXk3>}=wG3*`td`q%fUxXCk&*hC%^K;U4j{r!i+tsvzNtFN^-4oCj(B5a$>Bg zXt@MO7cd-gPrSC;$dHp zy&Mk+@{h(7VzBimWLKF5ioEufY}T6VThGEiL5qV9U=y_565hOB5wXFDf_ASIlL&Pf zVnq~h-zipML4yFnS|{9e+YR5WFBXO%^tT&HR;J^4I_fCV+Kp;CoW_$`M-wJDgm=t( zDwhL?I@?9RWg>8+gjU`$6|X(3XVW@6*>X~dO0j35C4s_znj?u~#8YE`_9%_vXnzW- z*~9x|1t<)cD8w={d0tmvz*=a8V40he zEXQf42z@)C4sw+^EjhbQXPix^d`#QxMO%y$t>%B#6D1Qu3c7|iflXuAqFJ)uT5!1V zdR1QxCdz2HY7Q2~N*{GQb1T(kZ=0hcjL=9~*8DPGv#v*}4@6Y!HP_e5N-gtMC@u9x zbun&-RpuRwgns!YI3R;{=}nAY{P7zpYg&x5k$6X$p)9u1qD%Y2X1(=!UA+!B^Fd;Gr`+k69zIZWNix;h=gfd!t9BLOtxdPd{5e) z3=oB8Vh$Tec3lh3Y>RXW#YgHiOjF5qvUI?3_U5w*>AF;g2O?EWixyjg5O$Ns#GC7> zU(&b4s8Q)?+`@Davq&@Z5+hUdqiZ5ah&+|2o-^ARESP||L=);*&_bbqyW<+V-+h7* z)kO%qb$h#_ohV*{+|~sj#FV!iZ=)SLn{AjaHvzr~Io}L);+8orV7LM1Z0lMYVd{~EcDM!6v z+;_&ks#m1-IWF^tZ7-=gviVA?y$crf33y_vu*6;L|5t7r|M*6D>_dtwo!~KCSLCbt zO7)yfNM(5($9Czpb>6~L+K2V;9G)>jg+p9t@HitS%fZ*j_Wunau&0Ws?t23S_5{5F zPT9B`s1zQ+=^Qf+3!tGgzdel+ zXc)#JZ;Rqefksb8l+pHj+OlBhKx3C2X|x!3EM*b#aK#w`DKsJ^N@}ZAh<1y-acy4< zoKz!Q1!CQlYAy{WDtto7Ggfp|rSYEC1Y zgica)wBjI|hp0EJn4uQhY9sb$&KQ`zVCIfTiBRiT(XwIHEN`GlWo0QOVX&HS%NBkY zd4s<_W7pY#U4X|+;p3(7@lyCLUkbSke-^PXzpH;f0{8e8_V^X{t$&4aPtqV*Ufot; zUKCHYn4fY#W_j<2+$DFxp68bzTs`Ahm4(%K_VttJXD1WkVaett_amnN{nzZCa^E}I zovixz)f>Wz%;HzvbMBMlFC7X<=a=VS{ly0p`0!!x`DtW)UkdsqS70Olocovq_ai^F eJA2qX4fC_Rn$)}NT5nXd?kipY_qx{Il>Q5_&Im04 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..e5251b96 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.json @@ -0,0 +1,344 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lRR292aW9Sd1g0dXR2Yy9OSCtndW1vekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUd3eEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE4d0RRWURWUVFMRXdaamJHbGxiblF4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6TXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVI5VnZzd1BpanIKelZONFZudDhyZEs4eTdOUGdEZkF4eThUdzUxOHJKdnlNRXRNSDdTRVRsV0dDSHBaZGlUU3czNWsvcGF5Ry9reQp1OElkUTZBR0I3T2VvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NDdk5JTVVXT25FYmhkVjdCWUZnYU9uWmJLNDkvR1NUK1BBNjJnNEtPY2p4ekFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCV2tYU2RXZlpramg2RXJIay9uTmNjR2cvZHV2cHg2eXd3Yk5uUUZ0U1o4d0lnZnRTUQpSMzJtYTlBd3JGaVVlZlhXZlU3YjF3OW1FMy9RVlZyd1NkVi81cEk9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/config_delta_env.pb new file mode 100644 index 0000000000000000000000000000000000000000..de8c456e2072b36cd61bcb4e758a68cee8da61f9 GIT binary patch literal 7849 zcmeHMZLHhW8ScHX+s>s>QqbU{j?&R}+Bh?8J!^Cy~Y!JC0)~aeSQ* zJC^pr01c23tHi`6m^7vewlcASgtj4d8iPOE*e0g22_{fs8tacjg~ULp8k&>bd)v$H z`T-OCx%WqGAHV0==iK*s-se0WmIt4g#Ia z1A!V2bA+tJShPNj4IO{ENb)dFTJ(Xhvopf-)+B`PX3kxb{bfiBxr1zu{o0tq~x)V<*7%HuY(o5S&Z<>BAyRhOM<{t zJ(tvj^~i^FKx9z}L=xy4;DI}yR-JMwh`J)d1K_6J3W)@PCL~0c>jJ$2t+YzlND8%- zOqw?8?M6i>1YWCn1wYQBY@DnZo!U}d1FK1eEN2y22u93{ToZ5(Sxr_teF76bn$^@? zF)q|nPPKS3rtIb7;gZJBLUvvP~d z zy~sMi{a_~a{TXB{u?*7`=*3f(=kWhS(30>a1`gtM!c6HEq|^IMP$0g>s2HqCEG zE+T4nO)=U=-_U}V-3T%V>K(%xpI?G(rL20_>1iF!>IV&1AeUu~hNh0xwzl@pR%CNt ztJO7U+%LG09iuoj?=vNHf2Q9PN&T;YP zB9F?2q)o>(*_DUga;5;0MMjtWT!B%t?WEUA2Gt{Gg^j4GNYLRye8MZ_lvl>}1==R4 zkC~n=6sd9PK%lNWP^V}Z&>t8VBew#fSY$y!lw?3c0S8G_vMRbk8$^9zPX-X<6sLat*K5LQOZ@?`8?p;&Ao-nKY{^bz4OUh!@lS1*XTw&;%eI zp_}M7vU&pgeAjZ%NKCsAofTziXoP7xY1=>w|Q#kW0;$ znazm-tDC{IgX)KT(DJuZ{g6}2-+86xN@gObPfeiFZrIC8Ak34Ln2x~#xC}{J? z)qJH5;ThK>e2|*zgNg*&C5g}TE;TK>9Oc?%MGlH_AQ_ZSyUFJ(E)6DCpQYT06igwm z=dDyz=?JzO6^6WsyX3TUhH|TBpk~^NC3>tsO-%^+pia{*MQ#toK(HWHe?3Xa5|E&- zF0VKTPp&=>p(_vohW|| zHN8`k3Ylb;F0g=vQ~&_ERW8)!Mm3;@Map4Ys3oW>qoeh~(DoKbuB!-^NcRg>+~xE} zzaS#{ShQ110@tC9qSh$OjbcKHxXBI`L&Z|baSQblirL(msyMtDxv;>3XlQQyi!G-9 zbyo0{CM7Dm3LddiA<%^1V-?wp+ce!U%~JG~c`kz|`mung!NaM(48SAT8P7-lH@BY~ zfRHh&c((F^0fdYZv<^V|mP?PRSrpTh2Lt`A`sQ`VTBdUN&!24@EK$= zvZ9NJ9XlW4_zV?mv{2Cyl4@KlguQkHjf7>nqXqbGs;HmV@Ho0y$}PD@cyYl-U1S04 zNN5>VmUzdEv-FToYL?L^*;=4z^_tMWaU-QId8&yY0T{Iv;vYBYu7Zvt)MYCobCIgi(P6QT6?9H7 zu_;q&%MGMZ)Y_Fs-HPMo1awjoE-6)pj4@8!(zRY^7?Y?oA+P%Cwm|H@F^6o3!gJVo zZivDSQTSm*VQ5Zm8^OMC{@4cK&dKT70Ne)PJ`~_Cv^C9{U-oBqM^>Ghy`h~!-Mcch zB{UZtXSZyc-xdlyn81b|`zPCHR=dR48ajJIR|WB(I;G#%&?i^>t@bLP^mh0V5%jnz zv^{k3^hpzYX*TeL-}l5dmlv$P8yLt_i)lA?(kQwi6b?qbK6FtCIXUv$elu$?SBJT7 zdAN_%*IIdK=!ct;leYK7ar*$aciQl>Z z=VeKK{I<8ZZZmKOeZL~_yJS!7)lm%z^e98rKL{#L)zZ8L_d=wt8&jHoME=B zwc3Qw;X`p3K)(V(q z%T|{thC2zhf(4sv8i|;AGTB6X=?+JgqQkf+;dy^iurDdoAKOeI`3~&S0BEi6nXxSuf=X<|M1Y=dtd2@+Xx5#>8>eA?S&T} zc<+u!UP^qa`ATHd%nf((%_omv^!8UC_{&|-rvLNk&t`XB{pXtxzWI&4cN{u!-!0EH z|GHQI&2!J}irn+go)>=q*t;+P^5*F{a$bKFyYu1#Z7*a#z3uuPZ+-pv%hZnart4n2 y>|0mwOguiji+^f4$hC@KN4LHiA-~~(uRGua8)V>Dj-I~v^zoge-}=sf{?oH3&nHftj3(wZoZ4@F ztyH$lX4xEL4X5hV>tl2@M)A67Rcg42mK$ijHfo?2ZjQ`GrBSb$HM~)>&3dD1Vx?LI zvyfxt)xUl9mmA;sw|m&p-Sp4j`QhKZjr=M4{U85<`D@7gHu%30^1mbG2d{wVI+5)} zPK12#734R+0Kn;gJCTe0_verQ>SgeZ*zY3WeHr=A%gDE1KI`8${@IG=C*?4}giC!Skl`r)PsAtHIdSdz-yVN(-TCjs345|I zAzGdrwtJ;nh7}XH%Y>*<9GaoiBn%UvVL@xSLCq6Nt)jtD#FRA0ZA}_aV{hmWa2bsj zqa|Bpo2#18A^5gn3MF4yh7~?e-FM%;1_R_>aJ$bF7;R|tQgh&?f7_Ax+U z(gm$+n}rcHGAr;WVoy)m{S)v^T2gea;`YKO^ofDA7-7;{?8zy!J$16&V$$Tk;9)6@ zDU$9klo1=TXLFle$C%YNeu4`DG}RPBA>Gkw2p7ona4wQ$Dp3T{Un^3JEyMhzUSR6t zdXNCAHf+lguB%y{gvThu3k|Nq2Q52~ql!Fko0?N9yG2}E)r%8(QS5|n)J(`?$zqL- z9%G=;>~7{5nwmM$*~bE$B*r)c!#G8lddhG2q=)(>x!Z#aK}CQeFovL#RhCR)bR_Uy zggONnD-z;%qO`T2phH4uFOU^BVwuLQMy$;&==w1+1uAdXR#cs+j5*d`Cp9L-%XAi1 zMPhyyWOq-4x&-t(lpxbS?~+QXDPgloHU~{O)W}1)L5?-a@_%ZGYy%n0v_Gi(|I=?DEPp^120n(GYlQS2eaa6I!dPVFh-6Jvmbv2yg-=?)0+CzWa`Ao=Meyo z!0iF{t0?l+nbqsyMGB5{!gv)c*}_5YA$P#-c<#^7Ouhm>N18D2?oV?Ec?Eg#=s%vh z_uhN&J^L#BcJ?yIUji@etdwcs%vT9=7r6~?Vew&>lefT2q(2|c2Btr?&F#bP=6VMC z+}Vbo*`9#s4jZ#wZ)bDbaM9-Qdpff@ZMa}___e%>+=bJC!>{Syt%J>BKap<>;Q8%N z%%fzw3S#7s1?2B|aIbF$3*R~KK>mV9e)Ptc6S$>qhX4IHj(_`P&j8*(LH_G?0Y_rZK&M-9N18(8Z;=1rvrS&I5Rxhln>LyO6zQHz@sNyj7-pDkRUHga-K z32YKti$YZy&X=s^V?aWexwS&^>QWw#iQ%}OWtG9a&qpPqc1>P%@~wv=td&EA+1v$$ zO*ft4ESZ~CyPP#4A6nHyCVlX|(w`!P#UC}ox*~z@5w;OI9fQe~Rz<}gzE3EiLP3)T zX>g^5H6zzB7aVO4g25Rpzk*0y~TQ^E-G%1 z7^cP|iSDQ^1H+VdU>A=XssPl3_A(Z2l;vt6)z{5_HOEKwWnZUcxl$SzC9&zsbrqA1 zwp7OIVP!&hQ8d}9+ZH8SFs*LZw2#LYJ-T_aN!Y4`LlcextObU@ZBY*0I$??BD0oxM>_Jo0b ztPBjfy>Oi9pr)LZ4hjqMCi1f|-o17~2zwEE{!ALVpn_Gv^Gs;Zqu2=`Xpx^sz6i&? za$(%_TZ!mYZ#i2CJ(q}XKH?x4-E72}H1t1vy$9RsJwJNm_?xGC&o@qxub&_v?Dd{q z=RZC)nO3(qRTuRhsgLKX!gxtInFgdH7(N%_moDHw5jHC9Wa}H~J(mnWYkJT0{wvA;&RYDN?(qD&XdEiZNCTI{AR?x9KaA&36S^`0>qwnnT;!wXug-D0PZh&ntY9uh9B5FqajFc#zi7TLueucVS&|ULx6`YY+KVB2i;a5vclXQ7E;oVGo-z zn%lrfWhUx0+K|F_B#!8#b~1|0^%^wWg;j4}Qsg4eN=c(?SZrPC@J(m96RcVUmC z`AE!q-K8{_EMxXckLtOyZe*7!>nEZ4TmsKks_G@fM?%@BulZz;qxnqPs7bDS7KmyM zw<*m<#}lKtAJ5czm5f*Qm9-rBexgjODvuXBXpA!@wNVe9(PrJ6u4bk(8>gZ{&p@xq zP1KUuQ1KobE`LJJ=WzgYS@RJh+GyxOLRIAr%R8g4T9M3VZOTa% z0RkokuyR6jGpgULu4I8r>U1OM;!0pFG=6M!v>DUxEv%C5PCkCkry2OVxHfPrO9i~G z&4-O*yKu=ld?K39C0uOyt2LiX#y0}dC#d;cia^XYn$IQUtHaf~=0mu4?$lF$*r%Xl zUrspHwl$BPHhrSsDRhTM8H$S08dGFB%l)#}V}>S9O##uT*rla=c}ylXiuz9^b8QmAI z?$dmTWTR_pKd2VCCOgM?aUF)sf!tuSRY7c8uw;;w`vZ-ndQkJ>>!hI$NU-Y9){feR zS}}+wd_sog|&D=65b4!V)d8TX+Hn3)qH+@2Rum(KO36QB>-J@5qQb)YNQ>+ zRd^BjBr*In6T>sz=Z8-K_gT?>F5&12;P!=B`=VU%IEm%OyTnhGi9MkG+*rujY9)^* z(T`$=ipq$Q#HJ%oA=Sw_st`RpwXDbNmb79&g5zY3LHZJBPJvlK?@s zPqwcWJ?!-H+u*fb1r}|>Olm)%pG2!svWj+PUq>Inub0lu9dPgTO$ghLoH&LxWHM3% vug&*=4uQVoY<9&_?~LZbSLbml^ZdRst@+nk=9Up(-km*dZ?D`gZD(O==K_U>HjeYpS*gl+dBH3z)sfd8{W27cw}>3dHf-#Plt@BGL2pE-FpapGh&F{k0we)FrP zvRyXI<``=@Ri|DbqoXm3*G;QZ!%ei@Kmz_ZjmjOS4@ zT?H}nhXV3s0VPDXTV1m2 zL4z6uT1vTw(3%g0+(Q{?n~rj(4Mbwb5haZwCnDAFiyI~<6w;OYa3qzQNfV3n1FPIz znL4v!Jwn^Jja0f1+omK3MghArFh4gie8Z{4U~e#28Lp8Hb7nOhOeWTVjEB9dXJP1u zrwMa!BdQE0O+Y*NiH0dZ8A+l#OC_4vh_t(b$5h{*^Jb}-3)Qo8K=;U8l;f0=4Z1JO z9FsQtTF$5wO ziaLFtGCY9_1R%*`!4o@+b$uuc#p*y=u`Q-o;Z~80R%NHst(y7DYCCJG8!XjGMLTA0 zQG!(;W=-BL8o(U(+XJPf>TPZ?5jYiVjjXtzd6r5>B2n31rcI{|Sxn{avnLlGVQ-%T z-_w}wV+Ew^Mx@KIq&%XD?LtWnl9V-`NSTyQ;lwJaO2~YXB(xNsBa1n)*bN|87{QfY zVAhj%mmcczhKkmmxij;roa?%N(TwV*T$QqnELKMeRgm0^E0I>*IM^5Zz?s& zQq<$gRVfY~T1+O5THKsS1}2gCY~lL!Fem4fz$T%!C{)$Ke92lq1|)QuTPqZ=F6F_P z7>w&#R_V`sd{iQ8U^?%I{%J)8vpGa;1eeBiC@38Ex7@zhda6)Z#R_ z<1`YHox#Ov@TYqkMaYN!jV9nSmR*9G)3F@eMF+S}%uy~*>PtPFwB$T#be2tC?N*60 z>n~*~&jt~nwdYbLl*rLK^msPYBd^j9Ap?(;E0MWOo(PsqP<4Yo{}M| zN-~+Hb<**s#lc2*dev~DhjU6pgZjv*5>t`|B@b^jCdIfF2uvSaS2ilHAwD2ZU(s$o^=L*1(cfsu*PhiNM?f+`6`Ont^sJ{i!xb^@*(rOlBleM2L+GH~s zM_s+pg%9(hi?Y2>#6{)%&5t?T-erXHc?SDUFMg*mUK(hRMUWRL1II zWkQu`W;Jc(sa6Mxn)%YwF!Crcd@GBwLO2+5X?g6h6c(7*x+-wyt8VJ50DtPM618hk z-n!c01Wa9x6KP)RU}@Qi9AcK|-KkWc4kBGBsGWy{CO8Me&R1<+6~7UNjX>_o@?a{8 zbu=r{*d}P(Rhp||VzrAc*yUs?ZZ;f433MgWH$w)H1Ea()+a8KiBH8iqwQk2fd#$Cz zgjfx%;-EIeu0Y=KZ=XMU8u`~d;7L&UBq)3m6n=z3A#!KrPn|G1{+B0Udy;`Y$-q9+ z3=FxwaGdD)4q*q=Fg_`P(|5=l$j?B3_bPIP+=0hiM^7C;k34&zMz&{7 z6gvR~E%Niom!SR2=lVU1eBsdV&E#u^$X94%8koz9LtI>my9^fWQrNCIFOh7}wFmqvk*Kk*3RHcz zD3sdPK*45=?l$mInTa}$HcVkV5=ZnZkHoCkT}pS!GG?!gsGh6qMs_)6{S2Y(ljnT0n{Yl;HfoY<#R5^S;WnkY z=y+lj_u`p0uafbqzOt5m-%r#@RpaqO2aR#2q&4cHGuo_M)78vWXX8{H(lekmxrtU1 z8yc>l;qn7=J~si(WzI*4=wZVM5~?b1Sl$_RwTfgmBY!@iq_srVC9KR8YEw?C2oNwS zP$gV)Gpg6Du4I8r>U1OM;%YEl==^xt(PvCsSy(08oqY71Pc!fhaXrMXEEVv!J|8rS z?ZTzaA^kWwpG)3n!#|qyxn%rUuIgjtd@gw)<_gZ|lJTS6)dS9laP8cwr~IHt!Hs=6 z;WXRUJ$BmkiC(AB9SqBmRE*Y`D$7~!mvx01m^d{BM2}*Zmf__wxf~OIu^VZoU+bo8pQva`Am_u^$)VOK!Kyb~J6bnFhZTzI z>Vy}y>`m;2wRk}i-VByoddsUgpMThLK0mqxo&<)U4$kKifF4x{ykz)jq@9tgun_np zF#IF~!vpX0gC~IdwD3NcaP$Ol4^`f85?G$EC4Qor*bTU!ElqM0?q}QY{c%4RdtA@` zobPeQ{TzQ4e36=%Vd(f&$#)PAxCF?*YV56Q@dg(g0z$q75Dts zn~!QZdF!k%avwQ@al&on7V^~l9|!sV%UgPE_npY!yo~(D7Xdi^2t`WBf4y}47ccGw zO5c4E`Ob^Tw_iN8ZwakGxt6o)(vY)qI%fr7xsR`BPBUSZUWLt8wuM!j4HyZvU~O+X znRy*pR-*}zTx<)b;HJW!vw|r&C+yKgQrOE5CSv=dHi^xN{+Tw34z@Mlz2X2IBnM<= zK&uSY9?7Yw5*1N}M|KX+ZS_cE)_HI)HC3j4rmg}vl~KPaGN&qT>uGJxtoW++aWv1KYiJ8UM@si&5HEf(@H5?4sC`P%E7#f<& z;^Pq=ZE}X{MJ>&m8Uo*uc^k&Kks1YL6ZhJxke51|+Rx{keVh-aX4mVGuBz>V$I&5e z%8}hJaZr-e9y*2cT-i*$tfn~Kp*jIp-PIFKn6(=jyc{uV(_< zb7NH-rmGo9&^7C>1ijcYIiu5C*fW_DAOmJPF-){4^+7xG0!#CYxICDVqeVK%_|zT~ zrIem30j6CM=byZHEr_Ts@oP~JKxF1PW#9#>GHxYgA!>I-YW3LyQ6CCGK3ouS9$}nf zTx2wMX6gP)<}QHg5z3-19dnQt84N!YLZ2;UVJ++P)6UFmM_H?3+YO!>=;e|)%qbJE z^jc$HN`jtNQbW*mD|k>W%9@Vpl+JdR0>d%wC<)lc81-ajR=b*I+Uhv$i_)U=%A%{* z|91I zH1-C5AD7W+F6RUK5YLW0BB#t&&nC+)CQUAiT}_d6cYYI!h?FxC(bj*0 zbK>4qR|%DLN2e}aARoAMkt9=zB8c8vm0D~WDy!=SrY^4g36N@owjAMxmeonPj555? z;3|C3vhz5q$m6!DJEgK)#PwCZIFT2{PUuF>ge;aUcDONO3>2E(%^X8hGbcLR`QT-o zB*r)c^;;BS8hb^dg8C%6n}c)ORsl+JV~?&v+g;?j^W6?#1v{Mu&X3*c5If%oUm#7W7i_fm$_~*cLl({gisXtAoPK>;S0B{6u_px6^VYGZ& zqCNgu@ZxFst-zlSMAOkWQjd|NgTd?I`K^fG3FB3)W(x6f0(8FjBxObXV5VjpTaSR`YjMTuZ^L^%lzU^#wKb3fUG!MQ~N2}UXQ?2`@jDO(e9|j literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.updated.block.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.updated.block.json new file mode 100644 index 00000000..4c63db64 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/orderer.genesis.updated.block.json @@ -0,0 +1,715 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 20, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:19:52Z", + "tls_cert_hash": null, + "tx_id": "13d3a3af29e5e77f0cf087ab468a039076c90b8aca94976a6891da795a21642b", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "0hgsOY3yEDIIDnfELuzQLRK9MOHun2F9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "Dz2T5sUEAms3hJYbKbg6ZSd5J6PKCAiuihiUBaYClXI=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.json new file mode 100644 index 00000000..f8ccede4 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.json @@ -0,0 +1,796 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNSRENDQWVxZ0F3SUJBZ0lSQU05dUhSR1lvaHZQZDRkZ0NxZFVHU1V3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTdlROS0YzNzk1NytFN012VnQKTjZYTFFyOFlVeTdCV05meTgrOUc0SG1LZHpzcjRRZkxhV2UxM2cvOFd1Ny9oUXAvT25nckp0Qi8xYkZaeFlzMgorSlB4bzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSUI0RnJGRTlrNkF2YXltUGxzQWkKVUhkNnVDN0E0ZkdGZHZ0NkVuODNEeXI1TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFEbEhnQlQxSk4ya2h5ZgptRkg4YlVvcFgzb3JESHhpUExNa1ZiTlR4QVp1MUFJZ2NJVitldTd2d0NacUNHMzVMcFIzYlpVR1h6VnpuUTF2ClJwWXJTd2w4czBvPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.2/solo/channel-artifacts/original_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..870320a0e85bac409339c434840ebabdfc1fe123 GIT binary patch literal 14169 zcmeHO%dhK5TA!Y7?wqN9U3`0{r_W3`)0gI<4&8B_H)sTY+ez%ii5_I{Z$C7;XOWzg zzpq>_*RQ^>e)X%fmyw?Y$iIxhtN3c=Ii{XCVSxN(boLVRmmh#{^dlP+Mg!!>ADq2( z{%4QD%f*jBeT@9!W8~-WKe_zR4?ZgX2%6=^@00XU<{6&EWqMx<1fC}qmn8AIW8*1L z;5I+R#ZfC)WZF%Fh2s-4KlRwCRZB@*JJ3Yo<(%;WdX~f$1|F4fAphYwcJWpIjJ(GR?NL zY0ht^lf}ZA5b<i3`y4f1zQ@Elg36m#IkMJAtxy@H*F-u+NG|BMG4^VN9&6)2->(SDH+#0wG;I_D&Fi zf-xJOo@Sa_clC+r8aX``2=l^uAxQA~1Hq|#7Rw|iyYqU!xHV+j6o_zd17HJX4Wl=| z*pPsg2`rJV*^y9d<2KEbZcG_iKLna~tuNBRl zQ7KK7Q>l3O#LC5I#arM;3SGQbK-hLf*fc{(CWRLRCDjN*QaC)NQ!0fWJ49t%;>rZB zq_B)A=lE)0fmEY;Te88N2)ZVtQ*=2ndR@kud2`JsMZwZ`qrAqIxf-Q8zP_$m_|1_> zjc_~#Ly2GD10k#sj6ax7xJ@FGb5-Wa=5kf4^o+?6ThglCZkbg&>bHBiL-a)!AEC3v zjP&gmbb6)DFs#T@xy6V{yFN9TrrhT`)@02!(;xf*>>)#o)NL3&{)>|+>*f$;GxiF~ z=s z+wO>=V7WpRkK&~g)`@u2+!*Vz=Oyx@u5hhVAB|gdMQJw!%iL|d&St60%XunHsU;Y8 z*o9IN+DdDP25V6i=s2b9Jvasz;E*7AEL_0TJ>uvK#E}9V-w;p~fGBbaQcC#{x1R+t z;BxNXBW4d6KBA^=%}>a>v|~8S94IwW??hfWA;qmoHbtyTml_T$)_4e*6v$#rv@>$l zsc$5nO`25OAGBnDx>C9Mw68Ad-f(49X7<9q6EMUZ;FS@FW5|Qzv)<_Z>?DB31%T#_ zCjjdBo+fOkEh9_$R!oEP^He;9Sql>K3oAf@$cgmOb%wb)l9j`h=ddSdci8Qnd&l5 z$HPbc(qJ;J#$7+!VzMM%xhCR>;s+} z!Voybc^gl5nyQTadWr2YA;t;YAXty3Hl1xsLdVe2Dj|)=DnSlulINPlR2dUsGg@vf zWe}m$8c7aR+>N@kUF-&pctzmu5{BQ=`i@XF{ioMq0{Nd0z>CE2MPm3OG5nkpL*#+! zIaZLI|Hli!y;zC8Sc!e^D>3Aim1RZe5Ad1q1o3$Tk|%+=2%`Zkjgj9%-UZ(U-!4qh zk3&eHd~EG>f8|*po1y>kPnrk6#}#l{L*WAB>6M2s9bIbR zRXUi3QEd4T@W^i<--Y&XU-5et`R38@=!JrB3@v?DH17T$YUCvM_xSMeC_lbnjVc9E z^ydX@^v9R1(T^S@|NB1j-xsXW{_;PbOve@Z25Z#avUpYGQCwgK^)<7dw8@FDTuXkw zDAtI+FKcwm@TrvYg8_|LVvYwP9?rvpA0ulmmbyFO=P2W$*K+NdcHAw z)>a(&YdMn9zMdN-Z#1V_hqKEX(5K_xWLS~a9y?j^tc-O{BOYfb)9^zU{@Gb0y_xg| z)KrakWVG#v*3u($c3^vDJ!IuCwb;mPx4BXVt9J!kU{#K&LmK>kDCwZUN_MyzDK*Pld2ApE24! z3u6>gu@ukB7O<_DCG8fWuGMVOmGY$BUw1fpP{*r`x0b{_n?zjJ3&mO>66Q8=IVMvh zx7G`!a!C}Yz-!f4SlwHf+T*p~{fvy!vw-C`W7P30l-u@u4iTWTC=prOBrMk{Pj;#` zss}4I2uTI?o2FKWj1dDWZmZp1l;MJ&r^nc~wv$`KykQDuvtBQA!yaWvD|aC#`tr=6!t6C`rx ziEB;EBVY53EXGQ~WXh)1xy6u}ub&K6&yO)mwRGcn4O#uB?DR849W0K7;FzZ#6u zEdV`jEAf`$(~)+dX5m)ii=^<&N(zr`(Z9U_+gF7xx`m+^V7s<&|13%6VHdL42l>)g zV4sdDsyvM;f&|WKI;P-Mj+D=RxTV73S-7QZH@X+Mbk*a)6rFznUL*CDZaAKkI980j zg#d5{UKwLQM3Ju@9_0MLU=dFCV&rFM$UmF`27K^C&zW0hW_nhc41M28$c63%W;nAb zYwiTFGN@pB4}7l-%Y(r3%2$+4<;!jaH2C!^^++2l%05jsmvq{V=IpBxb>E6tx_PBF z@l%^~sHYAdnXze>St}vK0P3U&FEp1Y-D&{2?j}c;b<*qi!Ml5}k>hVXJ+UtCShy;y z8T@^+f{(zf))w-Q<@>b~KHP;l<9Lu#v}X5nYk;@BqEC+Rh2A-Fa=I^@;9GmYqA!ml zLr?URkJSR-J~&d=$_ulCV;!w5^Q7k=fcFlbd=MvkkT|d(XUE&0ZuIYgcM8Jz$-~Ow z(fj1>KL)Suod;343gf50zr)~%FJyf=+V-!4$T&S-oV*R}*c)!*#y70!q~q=T$vd7p z=~e~5dbr=dFZf^{o^)!1w+~KoqzAEX7V`m-oxa~;%6a_w$!z;J^7`4!1*Lx3bysW- zg!gxlH=qePaQP3vezf_W>ty}A$RlX@=C#5r)^+e!?=Z1l<@isy!NwlA{bOS<3l0rA z%(%$EzFq7MzKSR=+Agh5!VE_>Cfm#mtlnuu=|C3>Bi4(h+lMPm3U`TBp*8`}s*F6S zO~4gpq#_Xfg=T9Z^lpkfnH(P<#GRC12xcziTHvVHB5D&#rlELKN(C9O2{QaZ^DdkBa zC&3zArBId|1))~m3Po$gJoQZ*dz95-tW zt-(}Y0HbNEiNY^??ToavTax0VFh(@U?#^JV>yoEtJUX&tS(&DrB}mXMV{dr1+|^mF zKU&R}63Ii!sBXnjnYL(7dXeiJidSw)lO%$YdJHb+m?YDJjlq~5BHx^qrU{EPo|9<8G3@5W&rE>N2m&GVdDy#qbArjsHT(yq9HmT|4Lv zE6WTkC-#62P`*6T1FM5ib$|vXwQc(im#=ioQ<{VUf=#KdqPSk?zj3~`~o;fAahF1CYNZDy0}nZk~)Q<}v- zut7a4;R7ahb5q%Mi{J zPr|uC5UEJw_-HGOU8dS>*PA7}DQw3H5F3-86ty%ZYZ7o6Wvx=1t#N*Lmd8;|n)h_o zs#NWAOWicf3u#sE2X@p+h;qeXraLXhK&dm>g&3OZIo>b&gOgeWK5x-b{7T}wb|J?e zq8>r)`{2sq03M!Yh@rAnQWzqI#~kq1RpB!u;6hPR+ATVDi1rCM+4Dq=i5R-QY~Wix z^9NpxJ3!%PjSbnvYjc*FZIcEaw5n7V)df5}o|f3R2DNcG>yW%ed7Mqim5zul7ug*6 z4A(N0a5brh5ykDCK~GqY4N>0V(@h2L5u5zDWNn(;l$@?fwp#D4hE-##u#^6THbq7-?Eym2+XyFvt1pQMz(jl2il&ab$= zfxLFr?RYEbbf75i?Q}>??@0yx8h8ZP0mYJjXvIn7>@)iqIXkrB{C)5`T+7B*5N~2R zTUp3MD6=_#54^Uwk{#a) zHwp3v@(TDm79VPP{2_RAzi=AsoR1>tZ^zHhG-PA2HjYsGQwPYXP}OziR5EVAMl z(kl|u0Plns**|)fX!_kIT1StUu5nQNOXqJNnUu>)%a_8ZkH9!Lvfjvs1 zjhSqseczw`9R9s|=(T&kFp(qoOk2_9bF7x(NC3YHc= Wf*@z$Qt*GUdtUup)N|j(*8c^f4$hC@KN4LHiA-~~(uRGua8)V>Dj-I~v^zoge-}=sf{?oH3&nHftj3(wZoZ4@F ztyH$lX4xEL4X5hV>tl2@M)A67Rcg42mK$ijHfo?2ZjQ`GrBSb$HM~)>&3dD1Vx?LI zvyfxt)xUl9mmA;sw|m&p-Sp4j`QhKZjr=M4{U85<`D@7gHu%30^1mbG2d{wVI+5)} zPK12#734R+0Kn;gJCTe0_verQ>SgeZ*zY3WeHr=A%gDE1KI`8${@IG=C*?4}giC!Skl`r)PsAtHIdSdz-yVN(-TCjs345|I zAzGdrwtJ;nh7}XH%Y>*<9GaoiBn%UvVL@xSLCq6Nt)jtD#FRA0ZA}_aV{hmWa2bsj zqa|Bpo2#18A^5gn3MF4yh7~?e-FM%;1_R_>aJ$bF7;R|tQgh&?f7_Ax+U z(gm$+n}rcHGAr;WVoy)m{S)v^T2gea;`YKO^ofDA7-7;{?8zy!J$16&V$$Tk;9)6@ zDU$9klo1=TXLFle$C%YNeu4`DG}RPBA>Gkw2p7ona4wQ$Dp3T{Un^3JEyMhzUSR6t zdXNCAHf+lguB%y{gvThu3k|Nq2Q52~ql!Fko0?N9yG2}E)r%8(QS5|n)J(`?$zqL- z9%G=;>~7{5nwmM$*~bE$B*r)c!#G8lddhG2q=)(>x!Z#aK}CQeFovL#RhCR)bR_Uy zggONnD-z;%qO`T2phH4uFOU^BVwuLQMy$;&==w1+1uAdXR#cs+j5*d`Cp9L-%XAi1 zMPhyyWOq-4x&-t(lpxbS?~+QXDPgloHU~{O)W}1)L5?-a@_%ZGYy%n0v_Gi(|I=?DEPp^120n(GYlQS2eaa6I!dPVFh-6Jvmbv2yg-=?)0+CzWa`Ao=Meyo z!0iF{t0?l+nbqsyMGB5{!gv)c*}_5YA$P#-c<#^7Ouhm>N18D2?oV?Ec?Eg#=s%vh z_uhN&J^L#BcJ?yIUji@etdwcs%vT9=7r6~?Vew&>lefT2q(2|c2Btr?&F#bP=6VMC z+}Vbo*`9#s4jZ#wZ)bDbaM9-Qdpff@ZMa}___e%>+=bJC!>{Syt%J>BKap<>;Q8%N z%%fzw3S#7s1?2B|aIbF$3*R~KK>mV9e)Ptc6S$>qhX4IHj(_`P&j8*(LH_G?0Y_rZK&M-9N18(8Z;=1rvrS&I5Rxhln>LyO6zQHz@sNyj7-pDkRUHga-K z32YKti$YZy&X=s^V?aWexwS&^>QWw#iQ%}OWtG9a&qpPqc1>P%@~wv=td&EA+1v$$ zO*ft4ESZ~CyPP#4A6nHyCVlX|(w`!P#UC}ox*~z@5w;OI9fQe~Rz<}gzE3EiLP3)T zX>g^5H6zzB7aVO4g25Rpzk*0y~TQ^E-G%1 z7^cP|iSDQ^1H+VdU>A=XssPl3_A(Z2l;vt6)z{5_HOEKwWnZUcxl$SzC9&zsbrqA1 zwp7OIVP!&hQ8d}9+ZH8SFs*LZw2#LYJ-T_aN!Y4`LlcextObU@ZBY*0I$??BD0oxM>_Jo0b ztPBjfy>Oi9pr)LZ4hjqMCi1f|-o17~2zwEE{!ALVpn_Gv^Gs;Zqu2=`Xpx^sz6i&? za$(%_TZ!mYZ#i2CJ(q}XKH?x4-E72}H1t1vy$9RsJwJNm_?xGC&o@qxub&_v?Dd{q z=RZC)nO3(qRTuRhsgLKX!gxtInFgdH7(N%_moDHw5jHC9Wa}H~J(mnWYkJT0{wvA;&RYDN?(qD&XdEiZNCTI{AR?x9KaA&36S^`0>qwnnT;!wXug-D0PZh&ntY9uh9B5FqajFc#zi7TLueucVS&|ULx6`YY+KVB2i;a5vclXQ7E;oVGo-z zn%lrfWhUx0+K|F_B#!8#b~1|0^%^wWg;j4}Qsg4eN=c(?SZrPC@J(m96RcVUmC z`AE!q-K8{_EMxXckLtOyZe*7!>nEZ4TmsKks_G@fM?%@BulZz;qxnqPs7bDS7KmyM zw<*m<#}lKtAJ5czm5f*Qm9-rBexgjODvuXBXpA!@wNVe9(PrJ6u4bk(8>gZ{&p@xq zP1KUuQ1KobE`LJJ=WzgYS@RJh+GyxOLRIAr%R8g4T9M3VZOTa% z0RkokuyR6jGpgULu4I8r>U1OM;!0pFG=6M!v>DUxEv%C5PCkCkry2OVxHfPrO9i~G z&4-O*yKu=ld?K39C0uOyt2LiX#y0}dC#d;cia^XYn$IQUtHaf~=0mu4?$lF$*r%Xl zUrspHwl$BPHhrSsDRhTM8H$S08dGFB%l)#}V}>S9O##uT*rla=c}ylXiuz9^b8QmAI z?$dmTWTR_pKd2VCCOgM?aUF)sf!tuSRY7c8uw;;w`vZ-ndQkJ>>!hI$NU-Y9){feR zS}}+wd_sog|&D=65b4!V)d8TX+Hn3)qH+@2Rum(KO36QB>-J@5qQb)YNQ>+ zRd^BjBr*In6T>sz=Z8-K_gT?>F5&12;P!=B`=VU%IEm%OyTnhGi9MkG+*rujY9)^* z(T`$=ipq$Q#HJ%oA=Sw_st`RpwXDbNmb79&g5zY3LHZJBPJvlK?@s zPqwcWJ?!-H+u*fb1r}|>Olm)%pG2!svWj+PUq>Inub0lu9dPgTO$ghLoH&LxWHM3% vug&*=4uQVoY<9&_?~LZbSLbml^ZdRst@+nk=9UpFMd2>FJs7 zp6Thal1Lt+38F*+6}1d#Ql+Jslu8K{<{|NcV3jFfL`6&)C<7`&j4>(9ndiN`m)(1J zvjSz^yS4Xm`uwL)pL726f8Tfh9zd<^LXKQjNm(DbJ5)16;jCHsH$?JvE_k7`eUxqnaWrpK4=Te|*{4_DnG!vFvI?);d}Z`MYIs^D+Qwv! zc|jmZC)_M$!)=A8Y*3|#?Uc?BDiW$tj&GQjP#*`YqzMxK#AI0J!m<(9Y%R(-sx`z% z@Ihfu0fv?&w4IkYk#orD9az%o5~aehTh`-lMQ=AavE)$b7zHqoVU& zPz~?{PV_mnGwa?^98`6&UDfk0hflk?-b<{^VH}OQJvz&U;;2f}0LN#4I3$DmSQKM1 zPD>6uzEr`;w^M^yaabw(iBLqzry_F9?B=CvP0c9PUaU%VZ61WuswF4*W;gC@CaH86 z&!l7FLNb}e21X-ocyP=p$GUV=lCTtqhQ>2iBODU*I>LA=8K4ph>)gr-cTpaLyH&7hd5wcn`V*OUJ8OVW9!4sm)Jf6V4Rkfq1In@dd ze0TMNkN^Cl+ohj{{`$)FE!r3EzZQAVJ9mMvyki&m+A_FsW!J*7&aLzNnMf9i7=zU?EoJ@w~zJ%K#^)?MI-It+u~ z*O7le1kRp?CgkBm$n~#SM5?r@BELAe`rrZZl5xDW&kp&JDrcrOm@wouiXUVb)N`-J!F7nOFh|F;qJ2h@_ zsdBN=s1z})oDDZC0pE}sq4{Z)<0L}o8!3Gn>A)h?VWA=+kztMy98N+*oCJST1}tM? z88?n*^Rh`0p2uKtxrX|$KS(|#8tl$E!{d zlB8o#7~Fc#NEwolN!&z-oLHlWkQI{sar^`u0;p4vPzh73vk=Z=>*1WkFo(xcG&_*^ zBo&Ot!%+_zLyVrRjVv=H)KhXn@ds6Jtk92o8$#Ec z?x<$M#=QOtRUVeC0PrL-LnGjGcoPCYlb&-EfsRD9L@?vn^7^zpWp+nhFb?Z#l$K(qgxCbCczA~Op0seE4(yB z%Y8qLNL4oPQTow=gO__a9SoVD*$jqq+iBwjPCAUIo8WT;?R$SaYHVfEDwX6GP# zH=1oUDwvvmN=8@A?znmhIDk({o(RPhQ>)sV(Xo(~dF!i}fxWogl`C3Xvo*y+4k7@o zfZh4PwLavmMXjS?9}ex5j@7p$x2qugk!7&kGTO$X%4OhXm<;8btTs}RL&(0BXI`@Z z&2N75OV5Yj79+5FG1xn)C26{1^ljuEWH(p}So2oa*1*~GhaI=^669rzf(>=%V}Cw! z4y*#^bFqJEQRfP9F4i`xt-RdUYV!D@Cw)3Wdy83F+;cWf^Y-TBiTqRqd(dvTtyQOu zeqV&M_}`a~(Z3oPWBDg9UA=j2iuK>VhWzmw@~flk7yoU`{Wv$qD0OXpKjyQsQBES8 zcBi4~n8cRbv>Dq3y`1XkOz+3Egchf}qal%W+%1pT$%eIIzZx2ek@CoLN|3zVg*bIu|_ z$*#j`$4ggamBWll9RNEhjW_4#uDCS`02mgqJiUm^50!3K&-guoK;N*6w2vs~#azwh z`8e6Du)*LcfwK^K3~3D=NEM&rCpat|N<)l-w@@#R1_^I4*>n^kVyRA&p0I%JkN_Ce zPRs(fLjph@>m;j`Oh9N}NhK+*)~=USoadC%Fgpq{UM578G+pk66!dsxK#V~Un4q8x zXZSHn&(w-c-{$dpL1OV}tLyQnDn&8SA`5CfRt=J7I-Y_cD9zJo)>pHuraTycM9R|_ z4ZkFKV-#=4!{rJUmC{T?DfXDCb5azv_K7XMEIEQ+R--p~895ka@Pdj31GRq1jEE`)uY7@NWes7DZ387tHNZl#3{pg3N2=kmZp z9XJ7P*vJ|*%1mGbu>#CUTutx>r!+a!%37_Q5yq^3v|s7v+ihEFgmX;HllECL(w~b* zJ4$spNNW9-EVb$mS0-9OOwf&-pNr>WqOa3CIc?YgY8I>kY@`jR<1k}3G}fpm9y4(m z)+EaDl5XQ+VMsAbHIobRa>8sIMVue-c$5zWNl!$h`49^o#sQEs^Qwzy6XCwV(sq=H z>zSCOm%9a~UQQQUWJ>H-{57?4inQUeEgdL7cA$D>-GLH%yTlF3v5M=kF(~dAQ;B=h`U>o$cQw&vg4)aZj zED1wZVa_E^HC%y(Xoae^krH*7Vit!Rd#^#~YPCX>(h_YnoAzXi<)D?+%|SpC1b5U9 z7DTcr$8ZgxS)A%sO3jgl_3CKbn=x}T-);^{HW3ogsc3bwa0Qrch*l>HSAdy`Ryx`d z)n3<@nOtOqHj{YGX+akv>aJH5^JY(K_W5qWh^89VW43fS2JAw#LhWIxkjv^}51pWl z0K*MBonBsulWyO`B`UHnhzZ$z0mDTSXPGEg&gC)C&$b3iE(3+T5RPXGXwyvAhE}r^ zvAP)AY(Wt&+dGM9RsO*~2p@mE40eFw4lvvShQDTDh%8szn$odXpV)D@9VWKJ#D48e z4B6dP6mzbjK+S9q*{K<(rRdNLk>5gKP6AYA)`hb@W3^`{q%5p_>zdj2E#?~1HZA;f z1qrzvISe~>!G=!lL-s5>wJzl?1feIV+K+#%{XBZ<>f2`8&vk3a&yONcPqm-P#YeUT z)wyxH(njqkIiS%X&-ze~%7lB=pcu!C`erTu`Oto*V)Zt(pG_5CY}(H(yJ~|re**1i zQ^jp*KVDChOLqs+vcP)7MX^sM$!v)3o2oA?D4|SP9`!3JWx!|jo@7eCv^=WdY$aND z6O8ID0lAz{6-B>PNYTXxOG|-dwPNMn=TZBSqjoAolnd4nHwS4$X|?eYol)Cf*^J6U zn0H;w8?M^8hgXjQ({n5h#wWm)K{n9T_&DY_vkcbvTOEbq>_$9dB^rDwz+rY>KvgUnS7TVA zS8y9iVPwbCy#ym=!f23c_XK|A7EQ)Y8GNY2W7R>Y$xv>=Y=%-D!Rz7qGHA!b-9WhA z^ThK#J^BCCeNM+&HtRkK-A^>*dP>7OK8Y7F*NI|EQ}Y&w1tlBqbPF8=&-wIdwG@WB z4+Z?qSUleFLR!v}`M@AFlw#s2QsunWaM;U;DMB^7%?5AhfBm`--*0sSjX~S)rm%!v zH!}rK2A=&NpHcgK=suhLV#u6W_t{i=TTb*m>OPyI4|x*ZXH(@9hpKhmhbRYyu*WG4 z64~%5R*m+uC0r0f{<@dv5~>i*1%z^n4+f&0Py_c9WM7MqoLm&xlH2BcrP9dMOYMql z1w5T%nRbG8g~9{6yk)35bGnZ$WlDH+5RTJqKZw|opd$e;oC$QPUZckihcwiEh>%$rmPvpW zOMa@CYWjRQhozgbL7`@4YlECqw$XmE;w?s6fs=%)^21}@=SRz62Nb?Ibe~NQbfN>n zO%+e)-U9tiG$!WRk@E;OIVcbx6TqWNs{p&e(Nrd>@_aKY(-%K2I1I0g3wV_>JN z_l)(CQ`38nx7b?mImTi;de7Kkv);4Ke5s$p6e<)?S;%86$ahvi2q0CfTJ_S34b!Ng z#3PxCf?NzP^3Ia8yc=?gytCXR5CiA6XI6yLZ5!@bHp_OE>Xw#aaG*D{oMb^^t~6wc zEzRQK(A-Qi<&Gs!vc)iW8>X)V7mT&O@$+b%s!>xUWAW>j_x(L^crrX$P4Bm5TUj5Y zTo)#9Z9P&Hxa``tR#&QSwXJw@L)SHXaeG3k!#4;gDPSiW@!9eLB)D`#J3?PE-BW31 zK5?%Gdz1m3EAM3Rw|sm!Thr>4)`n?*N^N^)5pZy_JQh79hni(u+qvC*mS>BDk*&s- zW^Vu&&sQVcv23|xYjA36i@R@q}C|a zVs12hI=-)06mvU<^XFSU6CvC3mWFWpj&<(sP2aI=cCyxZSy!yCTvgVW?3Sat*f-Bq z=42QgOwC)^34d(&&A-&_WF zFHa6j#=#RgjXb;^J@%B|(0i_I*Hg~J+tFi>&%=9x^jPG4&!IP^ZvDf;kI#Eo`*W?2TwsnR#PTd~AX0&qZJB{A)%Zzs=N+UW?v( zNZsB0f-c<>xbMM#e)j7K?IV|tp7qT`_a6D!p})U5_VHDLd^GsuFY0%GBlMlS{`8{a z(~qzp+hr^rLH1ppR=+X$qc^VH97R6$jvMbixYsJZ>dtq*?R{%NdF_KAn>F;_AF9jY z+xHL8d88@!9{8I6_)TX$@cGOa@45Z5<@{gW>1CFV6u))PFaPkhhn7Ei-#3qTufCB> z{l`@wK-n690V>Du|2uIK)k zt~WgRtvf#t#0Qv*KKsyx>{p}z`>szU3h#P9I&;PEK6A;w{-E}g`);D{|61u14SQC2 z)LFXnlOMYCz_aJww%@;W^f4$hC@KN4LHiA-~~(uRGua8)V>Dj-I~v^zoge-}=sf{?oH3&nHftj3(wZoZ4@F ztyH$lX4xEL4X5hV>tl2@M)A67Rcg42mK$ijHfo?2ZjQ`GrBSb$HM~)>&3dD1Vx?LI zvyfxt)xUl9mmA;sw|m&p-Sp4j`QhKZjr=M4{U85<`D@7gHu%30^1mbG2d{wVI+5)} zPK12#734R+0Kn;gJCTe0_verQ>SgeZ*zY3WeHr=A%gDE1KI`8${@IG=C*?4}giC!Skl`r)PsAtHIdSdz-yVN(-TCjs345|I zAzGdrwtJ;nh7}XH%Y>*<9GaoiBn%UvVL@xSLCq6Nt)jtD#FRA0ZA}_aV{hmWa2bsj zqa|Bpo2#18A^5gn3MF4yh7~?e-FM%;1_R_>aJ$bF7;R|tQgh&?f7_Ax+U z(gm$+n}rcHGAr;WVoy)m{S)v^T2gea;`YKO^ofDA7-7;{?8zy!J$16&V$$Tk;9)6@ zDU$9klo1=TXLFle$C%YNeu4`DG}RPBA>Gkw2p7ona4wQ$Dp3T{Un^3JEyMhzUSR6t zdXNCAHf+lguB%y{gvThu3k|Nq2Q52~ql!Fko0?N9yG2}E)r%8(QS5|n)J(`?$zqL- z9%G=;>~7{5nwmM$*~bE$B*r)c!#G8lddhG2q=)(>x!Z#aK}CQeFovL#RhCR)bR_Uy zggONnD-z;%qO`T2phH4uFOU^BVwuLQMy$;&==w1+1uAdXR#cs+j5*d`Cp9L-%XAi1 zMPhyyWOq-4x&-t(lpxbS?~+QXDPgloHU~{O)W}1)L5?-a@_%ZGYy%n0v_Gi(|I=?DEPp^120n(GYlQS2eaa6I!dPVFh-6Jvmbv2yg-=?)0+CzWa`Ao=Meyo z!0iF{t0?l+nbqsyMGB5{!gv)c*}_5YA$P#-c<#^7Ouhm>N18D2?oV?Ec?Eg#=s%vh z_uhN&J^L#BcJ?yIUji@etdwcs%vT9=7r6~?Vew&>lefT2q(2|c2Btr?&F#bP=6VMC z+}Vbo*`9#s4jZ#wZ)bDbaM9-Qdpff@ZMa}___e%>+=bJC!>{Syt%J>BKap<>;Q8%N z%%fzw3S#7s1?2B|aIbF$3*R~KK>mV9e)Ptc6S$>qhX4IHj(_`P&j8*(LH_G?0Y_rZK&M-9N18(8Z;=1rvrS&I5Rxhln>LyO6zQHz@sNyj7-pDkRUHga-K z32YKti$YZy&X=s^V?aWexwS&^>QWw#iQ%}OWtG9a&qpPqc1>P%@~wv=td&EA+1v$$ zO*ft4ESZ~CyPP#4A6nHyCVlX|(w`!P#UC}ox*~z@5w;OI9fQe~Rz<}gzE3EiLP3)T zX>g^5H6zzB7aVO4g25Rpzk*0y~TQ^E-G%1 z7^cP|iSDQ^1H+VdU>A=XssPl3_A(Z2l;vt6)z{5_HOEKwWnZUcxl$SzC9&zsbrqA1 zwp7OIVP!&hQ8d}9+ZH8SFs*LZw2#LYJ-T_aN!Y4`LlcextObU@ZBY*0I$??BD0oxM>_Jo0b ztPBjfy>Oi9pr)LZ4hjqMCi1f|-o17~2zwEE{!ALVpn_Gv^Gs;Zqu2=`Xpx^sz6i&? za$(%_TZ!mYZ#i2CJ(q}XKH?x4-E72}H1t1vy$9RsJwJNm_?xGC&o@qxub&_v?Dd{q z=RZC)nO3(qRTuRhsgLKX!gxtInFgdH7(N%_moDHw5jHC9Wa}H~J(mnWYkJT0{wvA;&RYDN?(qD&XdEiZNCTI{AR?x9KaA&36S^`0>qwnnT;!wXug-D0PZh&ntY9uh9B5FqajFc#zi7TLueucVS&|ULx6`YY+KVB2i;a5vclXQ7E;oVGo-z zn%lrfWhUx0+K|F_B#!8#b~1|0^%^wWg;j4}Qsg4eN=c(?SZrPC@J(m96RcVUmC z`AE!q-K8{_EMxXckLtOyZe*7!>nEZ4TmsKks_G@fM?%@BulZz;qxnqPs7bDS7KmyM zw<*m<#}lKtAJ5czm5f*Qm9-rBexgjODvuXBXpA!@wNVe9(PrJ6u4bk(8>gZ{&p@xq zP1KUuQ1KobE`LJJ=WzgYS@RJh+GyxOLRIAr%R8g4T9M3VZOTa% z0RkokuyR6jGpgULu4I8r>U1OM;!0pFG=6M!v>DUxEv%C5PCkCkry2OVxHfPrO9i~G z&4-O*yKu=ld?K39C0uOyt2LiX#y0}dC#d;cia^XYn$IQUtHaf~=0mu4?$lF$*r%Xl zUrspHwl$BPHhrSsDRhTM8H$S08dGFB%l)#}V}>S9O##uT*rla=c}ylXiuz9^b8QmAI z?$dmTWTR_pKd2VCCOgM?aUF)sf!tuSRY7c8uw;;w`vZ-ndQkJ>>!hI$NU-Y9){feR zS}}+wd_sog|&D=65b4!V)d8TX+Hn3)qH+@2Rum(KO36QB>-J@5qQb)YNQ>+ zRd^BjBr*In6T>sz=Z8-K_gT?>F5&12;P!=B`=VU%IEm%OyTnhGi9MkG+*rujY9)^* z(T`$=ipq$Q#HJ%oA=Sw_st`RpwXDbNmb79&g5zY3LHZJBPJvlK?@s zPqwcWJ?!-H+u*fb1r}|>Olm)%pG2!svWj+PUq>Inub0lu9dPgTO$ghLoH&LxWHM3% vug&*=4uQVoY<9&_?~LZbSLbml^ZdRst@+nk=9Up5D$p=R^ovNctGM2iAThHg@gnWMF=4z5JEztEa$dwbN1eIX6DSO+UH^C z#QFc_WqW<=U;nqh-w$6ZeDH@a6#h5?uVAZ{W9e#S`Cj3J_py=Gg;m=2~8O z_D4^^OL-%||D^CcPYOSO=e*f}dhnh6A5Jlx@GXKG$Q;cPm`v@C0-ocDp-m9j+%mD4 z!!eT^V1k5ZLz%K8Z(+H(%uO98Kx;8!PPmRg)C4FoG?~#8OyjjN@w6_C{5xgtoEa{x@AFNANcbXMpa~n@PpVCKWVcWNf@Q@MVf= zrPGYtOvj6bHpauLRJXNCDPc)W-P`aoRS_1T>wc(V%r10+mzS|XVhK;03H*$e{FuFr z`HZU{j{(KTGhPg1LY$BzQDmsNJsM_|%)@(@UmAh)9kD`(sxsZ`ZhbY8DTT+y{beV- z0EQKM!%@?8qSS45EZAB`O?h13J1=+k3;B)4BKRw^4m95W?yIvNaT zsUWndwZ>JeS)1TWHl8pRww1M#Q6_o3Uh4s@Oe`^kz^Wut?bxv)HbOJ*Ft#S+0gu)4 zZqCS;GIhBtOlk};7* zaBLXEV>pswt6c+Pjp9tv1asW$=(I{wh^KWsv^8_)6O#~lW0FW&jYZfRIk8-IT{Ez& zBaxIaECvISTVQ?OFXOb^pN-i~BoK2&=7{EURV;V4@u0G#6tjiuRVwJUx|oIc1O}5z zvq%rr?H07V#m&Gk%OZl(Le#2HHM%MH*tRiVv(5N>-vc|yPy%@!Mo<3iR+M!zh_V@T z0cF&7+b0wguU2N8NzlyXZ7Zd&UfVAc%EC_?Wqlqi?NOHS%%qa6rb@lU573z1LzyJ; zDL!S&D{YBy;Y_2aU3XNQDCJmVhH%ztMLfNP19ZY3<~0HnPjeiJ!J#ag7-i8x8{ZBz z5Hwn5Tkv_q=7UfQmqWjfhnwa`TaO$kk{9(MixzvO5T(k)R?{=|WZSVeOI2RZV}435 z!Jy47hGo7rLmUq5jiGmk}bE7%IN-NLIg?S@j@Yli15{p#|5AwhDM*C;C0%(*2 zXx=ynP}_AT{C0|JY0RNr#UHnjZt>dW5YOz-Bur)d2@=P6nf3-D&|$3lIH3yc;+KtA zo)ts@hq3AzL)DzeOAHJWLkfl}WyT~hTz~X%1>nTLi&t=QFw2Z)%#I}jPVDOiGn~y7 zo3`2xCiRN_@w6It++bUgMKR5ssxqL)DoR)YlL&gPP3$bh*K^E4`oT~Y9D6&7$eM^L zw}vZlj91SZt^j+8S1#ra%=Ic#*<%%Dmk>haJVgeBQLvWnjj*ct&F(_KG^N9P zz>xzO0tXmpVo@?thLT$^GHu$gu>98Z)+4b+rJEw(*3?oJ7p0Mc69bCi*d{(5j&QJ% zmRn=k4@%P-LG%^O4mz_Ww7o{S!ZCXZ!>_cyAyiHO@in;c{PzdoeqngOFuY$Fe##5O z!UNs03@N1=fmbMR<_DqSLf{sDt?+ed|K-941Ritg_5 z-tkiYe9szHbHeAx@1Fg^f&2O3N#XzADg5uA``P{Y3?ZJ&sNrNjT8wL}Soft)!ju9H zy|jdRUfd6VSMKMU;pdI}N$<-2Tr<22_k*E*b2I3*b*bh1Vy!mbZb+J0&h6!_&sfpK zLNjb>FPuJCTQqn?kytg!2mj3wM zPmoC@P1~!4sf|ZQtl$&IUR9KI)1N2HC1S_D$nO!h$Dx-O)A?HZocrmBX*W*1Xe(o? zuML|zVJw(g8g{0Bxjx1ReOF#_w6@LgGE8M>kkizw2r3t6D;*FxI_yM6CS}bhrhL}OerKBfgC7z_>9!bGZT!qI{cr43V z*5fh2GjT#>SbNXgPGrm($^3wisXa}@QSpkLD3HE^RIcVa3w|((X>7;FvQ%7_;U(0} zf!AJWuCRiM^p+RVnA|&esd#Ebmf6ufF=5ZMZpiG=OHFY$A|#T*G`l`YC^9DFrhd5N z9DaWHc^r=g0>cKa(Kd|xmK}g>B-BP;ga)$?nl^>LNzSn(Mdi3&MuYY?<*A5gn-V2E z3PZ4~>CBR)xLRK#D>Y@1WePSZHxnBegExDIUn<2?hV}LYD2iiql!8P7f!DB@%&+@I zmU1yhVvtxBMlf~dsWypOCP8ckjvp#LkJ1*iQ4^ogrrPtSTBp`R7)dVnu|~zLb$Ys; zTo_bfH>ym5#Ymij08o}=X{OAlaB65!0lP#zLDv}*nQgYKq>;w4CU_zpNmDfD%y}e< zU{I~NY72`4+8P@3u`(YvwQ}5YsVX9lMnNpiMo4|d-9(f=3-7bro~WF_BTgm+(#%3u zQrsuXjs$96v19)~k$#VzKjwrdvlYkRZ@{9liIjVSe^2`7NIfAYMXt0dwoR$~G z4wc|=UqjEXaia$!6+k1BN~R@^73_&r|8V0Qh*WT7Qn&7EQ0Dk9Rh=&p(GpsE&5%lo zGe^oLMR5&??}d(J9RsZ)jZuFcTct*Eg~Xs(cV%RZXlp*OYb?E`TZU&jB&)(r15*_u zp7}5$m2q?03OOO)*NLHq@m$V<}c%M zu#b|3UEzJk=X4BTARvMB{lcTd>wDq{l0P{C^x}yC%DECq03G?D-Pe~ce|_;p^ibf7 zN80AQg%WJ(+l5yP;JoF_epgyOZ{{w<)S+Jo+ULogiK*Q0*xwUr^piblRL)7GKe>a{ zsQfgk(FX^*=|@ir|NTzkKlgOguGxRMH4z@>iSR|KQD@6wRe>vEJl(Ia>Fu~hjNRd9 zLN`%&rJJr9e%|ON>8^CsHN(5CEO4Y~^S#x!ITbmiJ|1l74kgu?O<&CI${>Jdh0eT_v=`dcGjYhrQ?82yS`BK1YF;GHcO`p z%!|98h!h233LLb)s??ozu{Bz|osTIqdKR!;ml?I)GHJKmu7!IgSrG9wZsLY*A>%|b zq`J3KJf9er+@?OMLu!f!WgBg^76?>ttB!#$QnA2==D0n4!Wcntn7sljXr&u zk+4~MmBrSHR$aUu&4a#D>_g4iRWH`E6)*uZ<}IsSP`dPp;~ErwFOZosg2dj;$ag+ za_R`{$s`NhiKC@qrRa^POkABCGyy5lTSL_+Co_uV{)Di%^%lcb^&S^f=N-PuB@u^0*6Alsi0&gz4gmj!e?;)V?;MB z{On=j?;iphy!!*knj3nmI|f4du4_faLbW{IpBbbvw>)cC(DpX?1_FVPmNZ%?PS%gez6Q(3`OEwC)_+se{LQsOt!0M1=1_P6~H? zeR-=}4HPcB$$??q>h*o_&7GHIxf@4~jQtsN*Wqdgzu(%xcfc#g7Ru3(yY&)Y+}@nF z9H=leW_NRIfH$1{o}8Wwl~`eP`@L*}uk8HtdwCieYNXzJSt$7G(UCM(j-Td|J85O; zw|f3Ic>Czdd10h_kp=JL>~#9uJN;YWtz0U2ezCHD^1k)-?}Jx&&i%k&`Qg)_-*NE6 z2eLklw%wz^Q&tTZx1I*x*eh$k-lM{}-)vXGC`FOtFz2LmLf2&gqym@qz z1Jw&vJ)aNo^!D=|XT`I3!K;M2QZ>tgbBPfa-Y5V7XQ5H$2c^Onj#f|V;EnEaBDyHi z{AS_t!amFqD^P9P#6pBaTll|$Nh2Q-O0Ee%zIJodXZ=C(@<9&JW-#jk- z)#JinK0f`Pv-y90EA8GVA?Sc!Dj_eKBHg@NYG11dPQ`k7ZA{7(tlSl2UdC#?3_ocf9?PqF z`CNB)JQk}m)jifGgJ&&HKGr5f5f7Tsu&`#|Jzpj&SIP(ndQ2Z`4ym}Ft7I-!`vO=; zdutUh&S-48R;BuF7F%j;6D=!UXIPm>X#)jgItWXQhfOC#nMUV286+7+NI_?)Srd-! ziR=tk1O;;7;%(IK%3N0N4dqehC;O@>Sg3t_74IcQ%#|WuaF;6Hq#De+Wd^d$-KkNm z`h&!>)5gH)Pvr&Bnx+yBxn;MN62|0OJ^86BO3;W-qA}HV(NR*aB$=T+oW`3ah)P@9 z+;9rgQJG0kTFsUs!NGcA)d*o(;-We32DYmW9RwA}OI%;YuQ{9=J<1WPABSr9QcHaTFNr-ny?<`pnK zg)GlmMiYVkak+LS&OB{O0~>SGeSjcQfJNzkt+?$vIp8` z4RsMj94ZxsQ0U&8qZq0iL@wQ$muzvcY}`zi=M|8%t3|mNYjSTI|M~C-H;w;X$-Jw{ z?bxQ*9h8@81&Pc)<&`*Ota?Tpo2sDX6_u9hHf*lkL8cS|*>ZK>RfM?}+GA&giltzs zuW5vCZyH<=W4oNnl^t&F)z~oph-CTS-HM69F0ibRfn|X4tqnV1CjMgEpVek2v7QYX z=`uB$mk(&yFh z5fB>Vt{9+`VcNvuFiO#4i>a}0XO@LQO`LaC#VA)z1XVUoWFfAQo@WN_2uI2qJxwNI z1r*!;#IKZM^+N>Bm^#_l;txs=j_*X>7v2oP!53MCu&j8m$HaLI-HA010Hb+qr^Spr zd0-usdN`cyIlM*(G}T%*u&tW9eJ8{$Fl1+q4bjAEbB3O6qXy-nRWc3gJm#NXm66M< zv66|wS%=_6(qTBCB~gu-Pmy!Vu<9Vxa-v^7k1<>7tP5yUkL)bo%L%#%K4_*_$U0=g=r} sc*D?lz+1apOTxVV&@U+pHhQ!PcF*(S&*8r>pL%t-jP5z6X2)mn|C|NbIsgCw literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.2/solo/configtx.yaml b/hyperledger_fabric/v1.4.2/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.2/solo/logs/dev_all.log b/hyperledger_fabric/v1.4.2/solo/logs/dev_all.log new file mode 100644 index 00000000..a50be77c --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/logs/dev_all.log @@ -0,0 +1,882 @@ +Attaching to prometheus, peer0.org1.example.com, peer1.org2.example.com, peer0.org2.example.com, peer1.org1.example.com, fabric-cli, orderer0.example.com +prometheus | level=info ts=2019-04-22T06:20:06.4881626Z caller=main.go:243 msg="Starting Prometheus" version="(version=2.6.0, branch=HEAD, revision=dbd1d58c894775c0788470944b818cc724f550fb)" +prometheus | level=info ts=2019-04-22T06:20:06.4884758Z caller=main.go:244 build_context="(go=go1.11.3, user=root@bf5760470f13, date=20181217-15:14:46)" +prometheus | level=info ts=2019-04-22T06:20:06.4886141Z caller=main.go:245 host_details="(Linux 4.9.125-linuxkit #1 SMP Fri Sep 7 08:20:28 UTC 2018 x86_64 prometheus (none))" +prometheus | level=info ts=2019-04-22T06:20:06.4900294Z caller=main.go:246 fd_limits="(soft=1048576, hard=1048576)" +prometheus | level=info ts=2019-04-22T06:20:06.4901699Z caller=main.go:247 vm_limits="(soft=unlimited, hard=unlimited)" +prometheus | level=info ts=2019-04-22T06:20:06.4917652Z caller=main.go:561 msg="Starting TSDB ..." +prometheus | level=info ts=2019-04-22T06:20:06.4936325Z caller=web.go:429 component=web msg="Start listening for connections" address=0.0.0.0:9090 +peer0.org1.example.com | "2019-04-22 06:20:05.431 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org1.example.com | Version: 2.0.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.11.5 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:20:05.439 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:20:05.440 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org1.example.com | "2019-04-22 06:20:05.539 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org1.example.com | "2019-04-22 06:20:05.573 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org1.example.com | "2019-04-22 06:20:05.573 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-04-22 06:20:05.590 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:20:05.619 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.695 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.11.5 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-04-22 06:20:04.696 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.5:7051" +peer0.org2.example.com | "2019-04-22 06:20:04.696 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-04-22 06:20:04.728 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org2.example.com | "2019-04-22 06:20:04.728 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org2.example.com | "2019-04-22 06:20:04.829 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org2.example.com | "2019-04-22 06:20:04.906 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org2.example.com | "2019-04-22 06:20:04.906 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-04-22 06:20:04.944 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-04-22 06:20:04.962 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-04-22 06:20:04.962 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-04-22 06:20:04.978 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.991 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.004 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-04-22 06:20:05.005 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.009 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:20:05.010 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.012 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org2.example.com | "2019-04-22 06:20:05.012 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.015 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.015 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.048 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:07.047Z grpc.peer_address=192.168.224.6:45034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.5µs +peer0.org2.example.com | "2019-04-22 06:20:05.057 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:15.05Z grpc.peer_address=192.168.224.6:45034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.9517ms +peer0.org2.example.com | "2019-04-22 06:20:05.065 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:07.065Z grpc.peer_address=192.168.224.6:45036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199µs +peer0.org2.example.com | "2019-04-22 06:20:09.665 UTC [endorser] callChaincode -> INFO 021 [][0e6a537a] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:09.674 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:20:09.684 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org2.example.com | "2019-04-22 06:20:09.721 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 28ms (state_validation=1ms block_commit=19ms state_commit=5ms)" +prometheus | level=info ts=2019-04-22T06:20:06.5121071Z caller=main.go:571 msg="TSDB started" +prometheus | level=info ts=2019-04-22T06:20:06.5121936Z caller=main.go:631 msg="Loading configuration file" filename=prometheus.yml +prometheus | level=info ts=2019-04-22T06:20:06.5222142Z caller=main.go:657 msg="Completed loading of configuration file" filename=prometheus.yml +prometheus | level=info ts=2019-04-22T06:20:06.5223456Z caller=main.go:530 msg="Server is ready to receive web requests." +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 2.0.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.11.5 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.6:7051" +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-04-22 06:20:04.788 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-04-22 06:20:04.788 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org2.example.com | "2019-04-22 06:20:04.884 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org2.example.com | "2019-04-22 06:20:04.952 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org2.example.com | "2019-04-22 06:20:04.952 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-04-22 06:20:04.971 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-04-22 06:20:04.991 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-04-22 06:20:04.991 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.008 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.008 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.020 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:05.032 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:05.033 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-04-22 06:20:05.053 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.055 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:05.055 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.058 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org2.example.com | "2019-04-22 06:20:05.058 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.060 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.060 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org2.example.com | "2019-04-22 06:20:05.061 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-04-22 06:20:05.062 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org2.example.com | "2019-04-22 06:20:05.062 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:05.063 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:09.936 UTC [endorser] callChaincode -> INFO 01e [][b1499bdf] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:20:09.943 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:20:09.949 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org2.example.com | "2019-04-22 06:20:09.972 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 15ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:20:09.975 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:20:09.982 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:09.983 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:09.983 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:10.010 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-04-22 06:20:10.012 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.013 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:10.014 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.014 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org2.example.com | "2019-04-22 06:20:10.015 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.020 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.021 UTC [endorser] callChaincode -> INFO 02d [][b1499bdf] Exit chaincode: name:"cscc" (84ms)" +peer1.org2.example.com | "2019-04-22 06:20:10.021 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48510 grpc.code=OK grpc.call_duration=87.1282ms +peer1.org2.example.com | "2019-04-22 06:20:10.963 UTC [endorser] callChaincode -> INFO 02f [][fc1375b9] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:20:10.964 UTC [endorser] callChaincode -> INFO 030 [][fc1375b9] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:20:10.964 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48518 grpc.code=OK grpc.call_duration=2.0759ms +peer1.org2.example.com | "2019-04-22 06:20:11.895 UTC [endorser] callChaincode -> INFO 032 [][36da690a] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:20:11.898 UTC [endorser] callChaincode -> INFO 033 [][36da690a] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:20:11.898 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48526 grpc.code=OK grpc.call_duration=4.1396ms +peer1.org2.example.com | "2019-04-22 06:20:14.984 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-04-22 06:20:15.789 UTC [gossip.election] leaderElection -> INFO 036 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Some peer is already a leader" +peer1.org2.example.com | "2019-04-22 06:20:15.806 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:15.852 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:20:15.898 UTC [committer.txvalidator] Validate -> INFO 03c [businesschannel] Validated block [1] in 91ms" +peer1.org2.example.com | "2019-04-22 06:20:15.941 UTC [kvledger] CommitWithPvtData -> INFO 03d [businesschannel] Committed block [1] with 1 transaction(s) in 41ms (state_validation=13ms block_commit=16ms state_commit=6ms)" +peer1.org2.example.com | "2019-04-22 06:20:15.942 UTC [gossip.privdata] StoreBlock -> INFO 03e [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:15.969 UTC [gossip.gossip] JoinChan -> INFO 03f Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:15.969 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.970 UTC [gossip.gossip] learnAnchorPeers -> INFO 041 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.979 UTC [gossip.service] updateEndpoints -> WARN 042 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:20:16.000 UTC [committer.txvalidator] Validate -> INFO 043 [businesschannel] Validated block [2] in 57ms" +peer1.org2.example.com | "2019-04-22 06:20:16.008 UTC [gossip.comm] func1 -> WARN 044 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:20:16.008 UTC [gossip.discovery] expireDeadMembers -> WARN 045 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-04-22 06:20:16.009 UTC [gossip.discovery] expireDeadMembers -> WARN 046 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:16.009 UTC [gossip.discovery] expireDeadMembers -> WARN 047 Exiting" +peer1.org2.example.com | "2019-04-22 06:20:16.030 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [2] with 1 transaction(s) in 28ms (state_validation=3ms block_commit=19ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:20:17.023 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:19.023Z grpc.peer_address=192.168.224.5:47852 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.5µs +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.comm] func1 -> WARN 04a peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.discovery] expireDeadMembers -> WARN 04c Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:17.037 UTC [gossip.discovery] expireDeadMembers -> WARN 04d Exiting" +peer1.org2.example.com | "2019-04-22 06:20:17.253 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:19.253Z grpc.peer_address=192.168.224.7:48576 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=153.9µs +peer1.org2.example.com | "2019-04-22 06:20:19.876 UTC [endorser] callChaincode -> INFO 04f [][4c18f0e7] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-04-22 06:20:19.877 UTC [endorser] callChaincode -> INFO 050 [][4c18f0e7] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-04-22 06:20:19.878 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48592 grpc.code=OK grpc.call_duration=2.2757ms +peer1.org2.example.com | "2019-04-22 06:20:19.984 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-04-22 06:20:21.462 UTC [gossip.gossip] validateMsg -> WARN 053 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914009445220600 seq_num:1555914018670163900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-04-22 06:20:21.462 UTC [gossip.gossip] handleMessage -> WARN 054 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914009445220600 seq_num:1555914018670163900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes isn't valid" +peer1.org2.example.com | "2019-04-22 06:20:22.615 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:22.623 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [3] in 8ms" +peer1.org2.example.com | "2019-04-22 06:20:22.631 UTC [confighistory] HandleStateUpdates -> ERRO 057 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039d85c0)}" +peer1.org2.example.com | "2019-04-22 06:20:22.668 UTC [kvledger] CommitWithPvtData -> INFO 058 [businesschannel] Committed block [3] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=26ms state_commit=6ms)" +peer1.org2.example.com | "2019-04-22 06:20:25.096 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:25.101 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [4] in 4ms" +peer0.org2.example.com | "2019-04-22 06:20:09.726 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:20:09.742 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:09.743 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:09.743 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:09.770 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-04-22 06:20:09.773 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.774 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org2.example.com | "2019-04-22 06:20:09.774 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.775 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org2.example.com | "2019-04-22 06:20:09.775 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.776 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.777 UTC [endorser] callChaincode -> INFO 030 [][0e6a537a] Exit chaincode: name:"cscc" (111ms)" +peer0.org2.example.com | "2019-04-22 06:20:09.777 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34158 grpc.code=OK grpc.call_duration=114.2085ms +peer0.org2.example.com | "2019-04-22 06:20:10.809 UTC [endorser] callChaincode -> INFO 032 [][99660bfb] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:10.811 UTC [endorser] callChaincode -> INFO 033 [][99660bfb] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:10.811 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34166 grpc.code=OK grpc.call_duration=2.768ms +peer0.org2.example.com | "2019-04-22 06:20:11.709 UTC [endorser] callChaincode -> INFO 035 [][5a165a5c] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:20:11.711 UTC [endorser] callChaincode -> INFO 036 [][5a165a5c] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:20:11.712 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34174 grpc.code=OK grpc.call_duration=3.8837ms +peer0.org2.example.com | "2019-04-22 06:20:14.743 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org2.example.com:7051]] , current view: [[peer1.org2.example.com:7051]]" +peer0.org2.example.com | "2019-04-22 06:20:15.776 UTC [gossip.election] beLeader -> INFO 039 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-04-22 06:20:15.777 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-04-22 06:20:15.794 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.822 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [1] in 27ms" +peer0.org2.example.com | "2019-04-22 06:20:15.849 UTC [kvledger] CommitWithPvtData -> INFO 040 [businesschannel] Committed block [1] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=18ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:20:15.849 UTC [gossip.privdata] StoreBlock -> INFO 041 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] JoinChan -> INFO 042 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 043 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.924 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [2] in 73ms" +peer0.org2.example.com | "2019-04-22 06:20:15.955 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=3ms block_commit=20ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:20:15.973 UTC [comm.grpc.server] 1 -> INFO 048 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.973Z grpc.peer_address=192.168.224.7:60902 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=175µs +peer0.org2.example.com | "2019-04-22 06:20:15.986 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.985Z grpc.peer_address=192.168.224.6:45094 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=187.4µs +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.638 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-04-22 06:20:05.643 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-04-22 06:20:05.644 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-04-22 06:20:05.646 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.648 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:25.145 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (42ms)" +peer1.org2.example.com | "2019-04-22 06:20:25.151 UTC [confighistory] HandleStateUpdates -> ERRO 05c Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0003e19a0)}" +peer1.org2.example.com | "2019-04-22 06:20:25.188 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [4] with 1 transaction(s) in 41ms (state_validation=4ms block_commit=22ms state_commit=11ms)" +peer1.org2.example.com | "2019-04-22 06:20:28.653 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:28.656 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [5] in 3ms" +peer1.org2.example.com | "2019-04-22 06:20:28.659 UTC [lifecycle] update -> INFO 060 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-04-22 06:20:28.661 UTC [lifecycle] update -> INFO 061 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-04-22 06:20:28.661 UTC [cceventmgmt] HandleStateUpdates -> INFO 062 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-04-22 06:20:28.663 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 063 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-04-22 06:20:28.663 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 064 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-04-22 06:20:28.694 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [5] with 1 transaction(s) in 36ms (state_validation=9ms block_commit=15ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:20:29.951 UTC [gossip.channel] reportMembershipChanges -> INFO 066 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:21:07.531 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:07.533 UTC [committer.txvalidator] Validate -> INFO 068 [businesschannel] Validated block [6] in 1ms" +peer1.org2.example.com | "2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 069 [businesschannel] Committed block [6] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=21ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:21:12.978 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:12.981 UTC [committer.txvalidator] Validate -> INFO 06b [businesschannel] Validated block [7] in 2ms" +peer1.org2.example.com | "2019-04-22 06:21:13.016 UTC [kvledger] CommitWithPvtData -> INFO 06c [businesschannel] Committed block [7] with 1 transaction(s) in 35ms (state_validation=2ms block_commit=26ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:21:15.620 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:15.631 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [8] in 8ms" +peer1.org2.example.com | "2019-04-22 06:21:15.657 UTC [kvledger] CommitWithPvtData -> INFO 06f [businesschannel] Committed block [8] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=15ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:21:29.156 UTC [gossip.privdata] StoreBlock -> INFO 070 [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:29.159 UTC [cauthdsl] deduplicate -> WARN 071 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:21:29.159 UTC [cauthdsl] deduplicate -> WARN 072 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:21:29.177 UTC [gossip.gossip] JoinChan -> INFO 073 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-04-22 06:21:29.178 UTC [gossip.gossip] learnAnchorPeers -> INFO 074 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:21:29.178 UTC [gossip.gossip] learnAnchorPeers -> INFO 075 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:21:29.183 UTC [gossip.gossip] learnAnchorPeers -> INFO 076 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:21:29.184 UTC [gossip.service] updateEndpoints -> WARN 077 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:21:29.207 UTC [committer.txvalidator] Validate -> INFO 078 [businesschannel] Validated block [9] in 50ms" +peer1.org2.example.com | "2019-04-22 06:21:29.217 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47852 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m12.2932973s +peer1.org2.example.com | "2019-04-22 06:21:29.244 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:48576 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m12.0899635s +peer1.org2.example.com | "2019-04-22 06:21:29.258 UTC [kvledger] CommitWithPvtData -> INFO 07b [businesschannel] Committed block [9] with 1 transaction(s) in 50ms (state_validation=1ms block_commit=36ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:21:46.985 UTC [endorser] callChaincode -> INFO 07c [][72bce4b6] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:21:46.986 UTC [endorser] callChaincode -> INFO 07d [][72bce4b6] Exit chaincode: name:"cscc" (0ms)" +peer1.org2.example.com | "2019-04-22 06:21:46.986 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48864 grpc.code=OK grpc.call_duration=2.5522ms +peer1.org2.example.com | "2019-04-22 06:21:47.876 UTC [endorser] callChaincode -> INFO 07f [][fe24346a] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:21:47.878 UTC [endorser] callChaincode -> INFO 080 [][fe24346a] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:21:47.878 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48874 grpc.code=OK grpc.call_duration=3.1544ms +peer0.org2.example.com | "2019-04-22 06:20:16.004 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:45036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.9378109s +peer0.org2.example.com | "2019-04-22 06:20:16.005 UTC [comm.grpc.server] 1 -> INFO 04b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:26.003Z grpc.peer_address=192.168.224.6:45094 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.8677ms +peer0.org2.example.com | "2019-04-22 06:20:18.494 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.493Z grpc.peer_address=192.168.224.7:60930 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.9µs +peer0.org2.example.com | "2019-04-22 06:20:18.506 UTC [comm.grpc.server] 1 -> INFO 04d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:60902 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5303407s +peer0.org2.example.com | "2019-04-22 06:20:18.512 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.498Z grpc.peer_address=192.168.224.7:60930 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.259ms +peer0.org2.example.com | "2019-04-22 06:20:18.577 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.577Z grpc.peer_address=192.168.224.4:49264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.9µs +peer0.org2.example.com | "2019-04-22 06:20:18.594 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.579Z grpc.peer_address=192.168.224.4:49264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.2766ms +peer0.org2.example.com | "2019-04-22 06:20:18.632 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.631Z grpc.peer_address=192.168.224.4:49268 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.3µs +peer0.org2.example.com | "2019-04-22 06:20:19.226 UTC [endorser] callChaincode -> INFO 052 [][8837409f] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:19.227 UTC [endorser] callChaincode -> INFO 053 [][8837409f] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:19.228 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34236 grpc.code=OK grpc.call_duration=2.5456ms +peer0.org2.example.com | "2019-04-22 06:20:19.743 UTC [gossip.channel] reportMembershipChanges -> INFO 055 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:20:22.603 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:22.607 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [3] in 3ms" +peer0.org2.example.com | "2019-04-22 06:20:22.620 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00210c460)}" +peer0.org2.example.com | "2019-04-22 06:20:22.655 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [3] with 1 transaction(s) in 35ms (state_validation=9ms block_commit=16ms state_commit=6ms)" +peer0.org2.example.com | "2019-04-22 06:20:22.850 UTC [endorser] callChaincode -> INFO 05a [][3e79e4e9] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:22.851 UTC [endorser] callChaincode -> INFO 05b [][3e79e4e9] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:22.851 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34256 grpc.code=OK grpc.call_duration=2.6465ms +peer0.org2.example.com | "2019-04-22 06:20:23.060 UTC [endorser] callChaincode -> INFO 05d [][754a140f] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:23.062 UTC [endorser] callChaincode -> INFO 05e [][754a140f] Exit chaincode: name:"cscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:20:23.063 UTC [comm.grpc.server] 1 -> INFO 05f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34260 grpc.code=OK grpc.call_duration=3.872ms +peer0.org2.example.com | "2019-04-22 06:20:23.089 UTC [endorser] callChaincode -> INFO 060 [businesschannel][d2f85012] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:23.097 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 061 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:23.098 UTC [endorser] callChaincode -> INFO 062 [businesschannel][d2f85012] Exit chaincode: name:"_lifecycle" (9ms)" +peer0.org2.example.com | "2019-04-22 06:20:23.106 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34260 grpc.code=OK grpc.call_duration=18.6144ms +peer0.org2.example.com | "2019-04-22 06:20:24.711 UTC [gossip.channel] reportMembershipChanges -> INFO 064 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:20:25.088 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:25.092 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [4] in 3ms" +peer0.org2.example.com | "2019-04-22 06:20:25.094 UTC [confighistory] HandleStateUpdates -> ERRO 067 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003075420)}" +peer0.org2.example.com | "2019-04-22 06:20:25.132 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [4] with 1 transaction(s) in 39ms (state_validation=0ms block_commit=20ms state_commit=12ms)" +peer0.org2.example.com | "2019-04-22 06:20:25.153 UTC [comm.grpc.server] 1 -> INFO 069 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:53.108Z grpc.peer_address=192.168.224.3:34262 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.082359s +peer0.org2.example.com | "2019-04-22 06:20:25.942 UTC [endorser] callChaincode -> INFO 06a [businesschannel][f2d1ac65] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:25.946 UTC [lifecycle] QueryApprovalStatus -> INFO 06b successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:25.946 UTC [endorser] callChaincode -> INFO 06c [businesschannel][f2d1ac65] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:20:25.947 UTC [comm.grpc.server] 1 -> INFO 06d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34276 grpc.code=OK grpc.call_duration=5.821ms +peer0.org2.example.com | "2019-04-22 06:20:26.612 UTC [endorser] callChaincode -> INFO 06e [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:26.617 UTC [lifecycle] QueryApprovalStatus -> INFO 06f successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:26.619 UTC [lifecycle] CommitChaincodeDefinition -> INFO 070 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:26.620 UTC [endorser] callChaincode -> INFO 071 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (8ms)" +peer0.org2.example.com | "2019-04-22 06:20:26.621 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34288 grpc.code=OK grpc.call_duration=9.7708ms +peer0.org2.example.com | "2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 073 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:28.647 UTC [committer.txvalidator] Validate -> INFO 074 [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-04-22 06:20:28.649 UTC [lifecycle] update -> INFO 075 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [lifecycle] update -> INFO 076 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [cceventmgmt] HandleStateUpdates -> INFO 077 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 078 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 079 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org2.example.com | "2019-04-22 06:20:28.721 UTC [kvledger] CommitWithPvtData -> INFO 07a [businesschannel] Committed block [5] with 1 transaction(s) in 73ms (state_validation=43ms block_commit=17ms state_commit=7ms)" +peer0.org2.example.com | "2019-04-22 06:20:28.753 UTC [comm.grpc.server] 1 -> INFO 07b streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:34290 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1285832s +peer0.org2.example.com | "2019-04-22 06:20:29.385 UTC [endorser] callChaincode -> INFO 07c [businesschannel][e2d69a25] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:29.390 UTC [lifecycle] QueryChaincodeDefinition -> INFO 07d successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-04-22 06:20:29.390 UTC [endorser] callChaincode -> INFO 07e [businesschannel][e2d69a25] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org2.example.com | "2019-04-22 06:20:29.391 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34298 grpc.code=OK grpc.call_duration=6.738ms +peer0.org2.example.com | "2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 080 [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:07.536 UTC [committer.txvalidator] Validate -> INFO 081 [businesschannel] Validated block [6] in 8ms" +peer0.org2.example.com | "2019-04-22 06:21:07.576 UTC [kvledger] CommitWithPvtData -> INFO 082 [businesschannel] Committed block [6] with 1 transaction(s) in 38ms (state_validation=3ms block_commit=23ms state_commit=7ms)" +peer0.org2.example.com | "2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 083 [businesschannel] Received block [7] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:12.968 UTC [committer.txvalidator] Validate -> INFO 084 [businesschannel] Validated block [7] in 1ms" +peer0.org2.example.com | "2019-04-22 06:21:13.005 UTC [kvledger] CommitWithPvtData -> INFO 085 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +peer0.org2.example.com | "2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 086 [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:15.605 UTC [committer.txvalidator] Validate -> INFO 087 [businesschannel] Validated block [8] in 4ms" +peer0.org2.example.com | "2019-04-22 06:21:15.636 UTC [kvledger] CommitWithPvtData -> INFO 088 [businesschannel] Committed block [8] with 1 transaction(s) in 29ms (state_validation=4ms block_commit=20ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 089 [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:29.157 UTC [cauthdsl] deduplicate -> WARN 08a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:21:29.163 UTC [cauthdsl] deduplicate -> WARN 08b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:21:29.199 UTC [comm.grpc.server] 1 -> INFO 08c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.196Z grpc.peer_address=192.168.224.6:45332 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=219.7µs +peer0.org2.example.com | "2019-04-22 06:21:29.222 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.212Z grpc.peer_address=192.168.224.6:45332 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2039ms +peer0.org2.example.com | "2019-04-22 06:21:29.234 UTC [gossip.gossip] JoinChan -> INFO 08e Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-04-22 06:21:29.234 UTC [gossip.gossip] learnAnchorPeers -> INFO 08f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:21:29.235 UTC [gossip.gossip] learnAnchorPeers -> INFO 090 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:21:29.235 UTC [gossip.gossip] learnAnchorPeers -> INFO 091 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:21:29.250 UTC [gossip.gossip] learnAnchorPeers -> INFO 092 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:21:29.279 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.277Z grpc.peer_address=192.168.224.7:32912 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.9µs +peer0.org2.example.com | "2019-04-22 06:21:29.299 UTC [committer.txvalidator] Validate -> INFO 094 [businesschannel] Validated block [9] in 164ms" +peer0.org2.example.com | "2019-04-22 06:21:29.307 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.306Z grpc.peer_address=192.168.224.4:49482 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.5µs +peer0.org2.example.com | "2019-04-22 06:21:29.316 UTC [comm.grpc.server] 1 -> INFO 096 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.29Z grpc.peer_address=192.168.224.7:32912 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1056ms +peer0.org2.example.com | "2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 097 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:49268 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7703915s +peer0.org2.example.com | "2019-04-22 06:21:29.337 UTC [comm.grpc.server] 1 -> INFO 098 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.319Z grpc.peer_address=192.168.224.4:49482 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.7695ms +peer0.org2.example.com | "2019-04-22 06:21:29.340 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.339Z grpc.peer_address=192.168.224.7:32920 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.9µs +peer0.org2.example.com | "2019-04-22 06:21:29.355 UTC [kvledger] CommitWithPvtData -> INFO 09a [businesschannel] Committed block [9] with 1 transaction(s) in 53ms (state_validation=12ms block_commit=16ms state_commit=10ms)" +peer0.org2.example.com | "2019-04-22 06:21:29.381 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.38Z grpc.peer_address=192.168.224.6:45346 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.5µs +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [endorser] callChaincode -> INFO 09c [][627fba88] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [endorser] callChaincode -> INFO 09d [][627fba88] Exit chaincode: name:"cscc" (0ms)" +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34512 grpc.code=OK grpc.call_duration=1.4621ms +peer0.org2.example.com | "2019-04-22 06:21:47.716 UTC [endorser] callChaincode -> INFO 09f [][688e3212] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:21:47.718 UTC [endorser] callChaincode -> INFO 0a0 [][688e3212] Exit chaincode: name:"qscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:21:47.718 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34522 grpc.code=OK grpc.call_duration=2.9946ms +peer0.org1.example.com | "2019-04-22 06:20:05.648 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.650 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:20:05.651 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.652 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.652 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:20:05.654 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:20:06.572 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.571Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs +peer0.org1.example.com | "2019-04-22 06:20:06.583 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:16.575Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.5807ms +peer0.org1.example.com | "2019-04-22 06:20:06.588 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.587Z grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.3µs +peer0.org1.example.com | "2019-04-22 06:20:09.194 UTC [endorser] callChaincode -> INFO 021 [][d7a70671] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:09.201 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:20:09.205 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:20:09.228 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:20:09.231 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:09.264 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-04-22 06:20:09.266 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.266 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org1.example.com | "2019-04-22 06:20:09.267 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.267 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org1.example.com | "2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.269 UTC [endorser] callChaincode -> INFO 030 [][d7a70671] Exit chaincode: name:"cscc" (74ms)" +peer0.org1.example.com | "2019-04-22 06:20:09.269 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55716 grpc.code=OK grpc.call_duration=76.3852ms +peer0.org1.example.com | "2019-04-22 06:20:10.473 UTC [endorser] callChaincode -> INFO 032 [][f9f9eb73] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:10.475 UTC [endorser] callChaincode -> INFO 033 [][f9f9eb73] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:10.475 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55724 grpc.code=OK grpc.call_duration=3.4108ms +peer0.org1.example.com | "2019-04-22 06:20:11.426 UTC [endorser] callChaincode -> INFO 035 [][dabe5c8d] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:20:11.429 UTC [endorser] callChaincode -> INFO 036 [][dabe5c8d] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:20:11.429 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55732 grpc.code=OK grpc.call_duration=3.4583ms +peer0.org1.example.com | "2019-04-22 06:20:14.243 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:04.231 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.11.5 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-04-22 06:20:04.264 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.4:7051" +peer1.org1.example.com | "2019-04-22 06:20:04.265 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-04-22 06:20:04.280 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:20:15.268 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:20:15.268 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:20:15.826 UTC [comm.grpc.server] 1 -> INFO 03b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.826Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.2µs +peer0.org1.example.com | "2019-04-22 06:20:15.840 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.828Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2234ms +peer0.org1.example.com | "2019-04-22 06:20:15.845 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.845Z grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=158.7µs +peer0.org1.example.com | "2019-04-22 06:20:15.869 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.868Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.4µs +peer0.org1.example.com | "2019-04-22 06:20:15.883 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.871Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8279ms +peer0.org1.example.com | "2019-04-22 06:20:15.900 UTC [comm.grpc.server] 1 -> INFO 040 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.9Z grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.9369ms +peer0.org1.example.com | "2019-04-22 06:20:15.916 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.914Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=949.4µs +peer0.org1.example.com | "2019-04-22 06:20:15.957 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.2288ms +peer0.org1.example.com | "2019-04-22 06:20:15.958 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.933Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=20.5323ms +peer0.org1.example.com | "2019-04-22 06:20:15.995 UTC [comm.grpc.server] 1 -> INFO 044 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.994Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=188µs +peer0.org1.example.com | "2019-04-22 06:20:16.014 UTC [comm.grpc.server] 1 -> INFO 045 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.998Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9576ms +peer0.org1.example.com | "2019-04-22 06:20:16.015 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.144ms +peer0.org1.example.com | "2019-04-22 06:20:17.640 UTC [endorser] callChaincode -> INFO 047 [][b0c8eda3] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:17.641 UTC [endorser] callChaincode -> INFO 048 [][b0c8eda3] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:17.642 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55776 grpc.code=OK grpc.call_duration=2.8919ms +peer0.org1.example.com | "2019-04-22 06:20:18.273 UTC [ConnProducer] NewConnection -> ERRO 04a Failed connecting to orderer1.example.com:7050 , error: context deadline exceeded" +peer0.org1.example.com | "2019-04-22 06:20:18.308 UTC [gossip.privdata] StoreBlock -> INFO 04b [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:18.351 UTC [gossip.gossip] JoinChan -> INFO 04c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:18.352 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:18.366 UTC [committer.txvalidator] Validate -> INFO 050 [businesschannel] Validated block [1] in 58ms" +peer0.org1.example.com | "2019-04-22 06:20:18.401 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [1] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=24ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.402 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:18.432 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.431Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.7µs +peer0.org1.example.com | "2019-04-22 06:20:18.442 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.8527917s +peer0.org1.example.com | "2019-04-22 06:20:18.443 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.439Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.2399ms +peer0.org1.example.com | "2019-04-22 06:20:18.470 UTC [gossip.gossip] JoinChan -> INFO 056 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 057 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:04.280 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org1.example.com | "2019-04-22 06:20:04.372 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org1.example.com | "2019-04-22 06:20:04.442 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org1.example.com | "2019-04-22 06:20:04.442 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-04-22 06:20:04.459 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-04-22 06:20:04.487 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-04-22 06:20:04.487 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-04-22 06:20:04.501 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.522 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:04.526 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-04-22 06:20:04.528 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-04-22 06:20:04.533 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.535 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:20:04.535 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.541 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org1.example.com | "2019-04-22 06:20:04.541 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.544 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.544 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:04.546 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:09.395 UTC [endorser] callChaincode -> INFO 01e [][03240af4] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:20:09.401 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:20:09.405 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org1.example.com | "2019-04-22 06:20:09.433 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 19ms (state_validation=1ms block_commit=11ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:20:09.436 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:09.474 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-04-22 06:20:09.476 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.476 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:20:09.477 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.477 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:20:09.478 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.478 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.480 UTC [endorser] callChaincode -> INFO 02d [][03240af4] Exit chaincode: name:"cscc" (84ms)" +peer1.org1.example.com | "2019-04-22 06:20:09.480 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60416 grpc.code=OK grpc.call_duration=86.5435ms +peer1.org1.example.com | "2019-04-22 06:20:10.627 UTC [endorser] callChaincode -> INFO 02f [][78bc8b40] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:20:10.628 UTC [endorser] callChaincode -> INFO 030 [][78bc8b40] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 058 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 059 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:20:18.526 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [2] in 122ms" +peer0.org1.example.com | "2019-04-22 06:20:18.550 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [2] with 1 transaction(s) in 23ms (state_validation=1ms block_commit=14ms state_commit=5ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.622 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.621Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=488.1µs +peer0.org1.example.com | "2019-04-22 06:20:18.638 UTC [comm.grpc.server] 1 -> INFO 05d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.629Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3762ms +peer0.org1.example.com | "2019-04-22 06:20:18.649 UTC [gossip.comm] func1 -> WARN 05e peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 05f Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 060 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 061 Exiting" +peer0.org1.example.com | "2019-04-22 06:20:18.680 UTC [comm.grpc.server] 1 -> INFO 062 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.676Z grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.0373ms +peer0.org1.example.com | "2019-04-22 06:20:19.242 UTC [gossip.channel] reportMembershipChanges -> INFO 063 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-04-22 06:20:19.553 UTC [comm.grpc.server] 1 -> INFO 064 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:21.553Z grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.1µs +peer0.org1.example.com | "2019-04-22 06:20:20.374 UTC [endorser] callChaincode -> INFO 065 [][2457efbe] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:20.375 UTC [endorser] callChaincode -> INFO 066 [][2457efbe] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.376 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55808 grpc.code=OK grpc.call_duration=2.6513ms +peer0.org1.example.com | "2019-04-22 06:20:20.543 UTC [endorser] callChaincode -> INFO 068 [][1ba692c4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:20.546 UTC [endorser] callChaincode -> INFO 069 [][1ba692c4] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.546 UTC [comm.grpc.server] 1 -> INFO 06a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=3.7147ms +peer0.org1.example.com | "2019-04-22 06:20:20.568 UTC [endorser] callChaincode -> INFO 06b [businesschannel][8228dde0] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:20.571 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 06c successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:20.571 UTC [endorser] callChaincode -> INFO 06d [businesschannel][8228dde0] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.582 UTC [comm.grpc.server] 1 -> INFO 06e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=15.3831ms +peer0.org1.example.com | "2019-04-22 06:20:22.610 UTC [gossip.privdata] StoreBlock -> INFO 06f [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:22.658 UTC [committer.txvalidator] Validate -> INFO 070 [businesschannel] Validated block [3] in 47ms" +peer0.org1.example.com | "2019-04-22 06:20:22.672 UTC [confighistory] HandleStateUpdates -> ERRO 071 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0036bd060)}" +peer0.org1.example.com | "2019-04-22 06:20:22.687 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [3] with 1 transaction(s) in 19ms (state_validation=5ms block_commit=9ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:20:22.696 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:50.585Z grpc.peer_address=192.168.224.3:55814 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1106328s +peer0.org1.example.com | "2019-04-22 06:20:24.209 UTC [gossip.channel] reportMembershipChanges -> INFO 074 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-04-22 06:20:25.090 UTC [gossip.privdata] StoreBlock -> INFO 075 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:25.093 UTC [committer.txvalidator] Validate -> INFO 076 [businesschannel] Validated block [4] in 3ms" +peer0.org1.example.com | "2019-04-22 06:20:25.105 UTC [confighistory] HandleStateUpdates -> ERRO 077 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00380de60)}" +peer0.org1.example.com | "2019-04-22 06:20:25.130 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [4] with 1 transaction(s) in 35ms (state_validation=11ms block_commit=15ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:20:25.752 UTC [endorser] callChaincode -> INFO 079 [businesschannel][c7a707e5] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:25.761 UTC [lifecycle] QueryApprovalStatus -> INFO 07a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:25.761 UTC [endorser] callChaincode -> INFO 07b [businesschannel][c7a707e5] Exit chaincode: name:"_lifecycle" (9ms)" +peer1.org1.example.com | "2019-04-22 06:20:10.628 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60424 grpc.code=OK grpc.call_duration=2.613ms +peer1.org1.example.com | "2019-04-22 06:20:11.564 UTC [endorser] callChaincode -> INFO 032 [][b64bc82f] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:20:11.566 UTC [endorser] callChaincode -> INFO 033 [][b64bc82f] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-04-22 06:20:11.566 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60432 grpc.code=OK grpc.call_duration=3.6799ms +peer1.org1.example.com | "2019-04-22 06:20:14.445 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:15.285 UTC [gossip.election] leaderElection -> INFO 036 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:20:18.320 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:18.396 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:18.396 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:18.397 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.397 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:20:18.445 UTC [gossip.comm] func1 -> WARN 03c peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:20:18.446 UTC [endorser] callChaincode -> INFO 03d [][e6a7328c] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-04-22 06:20:18.447 UTC [gossip.discovery] expireDeadMembers -> WARN 03e Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:20:18.448 UTC [gossip.discovery] expireDeadMembers -> WARN 03f Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:20:18.448 UTC [gossip.discovery] expireDeadMembers -> WARN 040 Exiting" +peer1.org1.example.com | "2019-04-22 06:20:18.450 UTC [endorser] callChaincode -> INFO 041 [][e6a7328c] Exit chaincode: name:"_lifecycle" (4ms)" +peer1.org1.example.com | "2019-04-22 06:20:18.450 UTC [comm.grpc.server] 1 -> INFO 042 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60480 grpc.code=OK grpc.call_duration=4.8929ms +peer1.org1.example.com | "2019-04-22 06:20:18.475 UTC [committer.txvalidator] Validate -> INFO 043 [businesschannel] Validated block [1] in 155ms" +peer1.org1.example.com | "2019-04-22 06:20:18.540 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 61ms (state_validation=2ms block_commit=48ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:20:18.542 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:18.568 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:18.569 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.571 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.571 UTC [gossip.service] updateEndpoints -> WARN 049 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:20:18.609 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 66ms" +peer1.org1.example.com | "2019-04-22 06:20:18.669 UTC [kvledger] CommitWithPvtData -> INFO 04b [businesschannel] Committed block [2] with 1 transaction(s) in 58ms (state_validation=5ms block_commit=24ms state_commit=18ms)" +peer1.org1.example.com | "2019-04-22 06:20:19.445 UTC [gossip.channel] reportMembershipChanges -> INFO 04c Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: []" +peer1.org1.example.com | "2019-04-22 06:20:22.628 UTC [gossip.privdata] StoreBlock -> INFO 04d [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:22.632 UTC [committer.txvalidator] Validate -> INFO 04e [businesschannel] Validated block [3] in 3ms" +peer1.org1.example.com | "2019-04-22 06:20:22.644 UTC [gossip.privdata] StoreBlock -> INFO 04f [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (10ms)" +peer1.org1.example.com | "2019-04-22 06:20:22.645 UTC [confighistory] HandleStateUpdates -> ERRO 050 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002c42640)}" +peer1.org1.example.com | "2019-04-22 06:20:22.669 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [3] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=13ms state_commit=6ms)" +peer1.org1.example.com | "2019-04-22 06:20:24.412 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:24.530 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:26.53Z grpc.peer_address=192.168.224.6:58746 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=159µs +peer1.org1.example.com | "2019-04-22 06:20:25.107 UTC [gossip.privdata] StoreBlock -> INFO 054 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:25.117 UTC [committer.txvalidator] Validate -> INFO 055 [businesschannel] Validated block [4] in 9ms" +peer1.org1.example.com | "2019-04-22 06:20:25.120 UTC [confighistory] HandleStateUpdates -> ERRO 056 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0030a3800)}" +peer1.org1.example.com | "2019-04-22 06:20:25.159 UTC [kvledger] CommitWithPvtData -> INFO 057 [businesschannel] Committed block [4] with 1 transaction(s) in 38ms (state_validation=0ms block_commit=18ms state_commit=14ms)" +peer1.org1.example.com | "2019-04-22 06:20:25.268 UTC [gossip.election] leaderElection -> INFO 058 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:20:28.658 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:28.686 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [5] in 27ms" +peer1.org1.example.com | "2019-04-22 06:20:28.689 UTC [lifecycle] update -> INFO 05b Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:25.762 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55832 grpc.code=OK grpc.call_duration=10.6769ms +peer0.org1.example.com | "2019-04-22 06:20:26.400 UTC [endorser] callChaincode -> INFO 07d [][968d211d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:26.401 UTC [endorser] callChaincode -> INFO 07e [][968d211d] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:26.401 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55842 grpc.code=OK grpc.call_duration=2.1624ms +peer0.org1.example.com | "2019-04-22 06:20:26.600 UTC [endorser] callChaincode -> INFO 080 [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:26.604 UTC [lifecycle] QueryApprovalStatus -> INFO 081 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:26.606 UTC [lifecycle] CommitChaincodeDefinition -> INFO 082 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:26.607 UTC [endorser] callChaincode -> INFO 083 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (7ms)" +peer0.org1.example.com | "2019-04-22 06:20:26.608 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55846 grpc.code=OK grpc.call_duration=9.3629ms +peer0.org1.example.com | "2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:28.648 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-04-22 06:20:28.650 UTC [lifecycle] update -> INFO 087 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:28.651 UTC [lifecycle] update -> INFO 088 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-04-22 06:20:28.651 UTC [cceventmgmt] HandleStateUpdates -> INFO 089 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-04-22 06:20:28.652 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 08a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-04-22 06:20:28.652 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 08b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-04-22 06:20:28.682 UTC [kvledger] CommitWithPvtData -> INFO 08c [businesschannel] Committed block [5] with 1 transaction(s) in 32ms (state_validation=8ms block_commit=12ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:20:28.740 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:55848 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1146288s +peer0.org1.example.com | "2019-04-22 06:20:29.215 UTC [endorser] callChaincode -> INFO 08e [businesschannel][d82eabee] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:29.230 UTC [lifecycle] QueryChaincodeDefinition -> INFO 08f successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-04-22 06:20:29.233 UTC [endorser] callChaincode -> INFO 090 [businesschannel][d82eabee] Exit chaincode: name:"_lifecycle" (18ms)" +peer0.org1.example.com | "2019-04-22 06:20:29.235 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55856 grpc.code=OK grpc.call_duration=27.47ms +peer0.org1.example.com | "2019-04-22 06:20:29.934 UTC [endorser] callChaincode -> INFO 092 [businesschannel][32169d80] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:20:29.954 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 093 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-04-22 06:21:05.510 UTC [endorser] callChaincode -> INFO 094 [businesschannel][32169d80] Exit chaincode: name:"exp02" (35610ms)" +peer0.org1.example.com | "2019-04-22 06:21:05.510 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55864 grpc.code=OK grpc.call_duration=35.6134186s +peer0.org1.example.com | "2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 096 [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:07.537 UTC [committer.txvalidator] Validate -> INFO 097 [businesschannel] Validated block [6] in 9ms" +peer0.org1.example.com | "2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 098 [businesschannel] Committed block [6] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=20ms state_commit=8ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.723 UTC [endorser] callChaincode -> INFO 099 [businesschannel][99e7611d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:10.727 UTC [endorser] callChaincode -> INFO 09a [businesschannel][99e7611d] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.729 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55900 grpc.code=OK grpc.call_duration=7.6767ms +peer0.org1.example.com | "2019-04-22 06:21:10.941 UTC [endorser] callChaincode -> INFO 09c [businesschannel][967428f0] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:10.948 UTC [endorser] callChaincode -> INFO 09d [businesschannel][967428f0] Exit chaincode: name:"exp02" (7ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.950 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55906 grpc.code=OK grpc.call_duration=11.4845ms +peer0.org1.example.com | "2019-04-22 06:21:11.190 UTC [endorser] callChaincode -> INFO 09f [businesschannel][f6ea81bf] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:11.193 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][f6ea81bf] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:11.194 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55912 grpc.code=OK grpc.call_duration=5.1112ms +peer0.org1.example.com | "2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 0a2 [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:12.973 UTC [committer.txvalidator] Validate -> INFO 0a3 [businesschannel] Validated block [7] in 5ms" +peer0.org1.example.com | "2019-04-22 06:21:13.010 UTC [kvledger] CommitWithPvtData -> INFO 0a4 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=24ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.373 UTC [endorser] callChaincode -> INFO 0a5 [businesschannel][2026f240] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.375 UTC [endorser] callChaincode -> INFO 0a6 [businesschannel][2026f240] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.376 UTC [comm.grpc.server] 1 -> INFO 0a7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55916 grpc.code=OK grpc.call_duration=4.7757ms +peer0.org1.example.com | "2019-04-22 06:21:13.575 UTC [endorser] callChaincode -> INFO 0a8 [businesschannel][d0221f58] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.582 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][d0221f58] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.583 UTC [comm.grpc.server] 1 -> INFO 0aa unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55920 grpc.code=OK grpc.call_duration=9.5525ms +peer0.org1.example.com | "2019-04-22 06:21:13.813 UTC [endorser] callChaincode -> INFO 0ab [businesschannel][96c67ee2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.817 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][96c67ee2] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.818 UTC [comm.grpc.server] 1 -> INFO 0ad unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55926 grpc.code=OK grpc.call_duration=8.3056ms +peer0.org1.example.com | "2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 0ae [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:15.603 UTC [committer.txvalidator] Validate -> INFO 0af [businesschannel] Validated block [8] in 2ms" +peer0.org1.example.com | "2019-04-22 06:21:15.632 UTC [kvledger] CommitWithPvtData -> INFO 0b0 [businesschannel] Committed block [8] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.002 UTC [endorser] callChaincode -> INFO 0b1 [businesschannel][e59a9b97] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:16.005 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][e59a9b97] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.006 UTC [comm.grpc.server] 1 -> INFO 0b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55930 grpc.code=OK grpc.call_duration=5.1462ms +peer0.org1.example.com | "2019-04-22 06:21:16.534 UTC [endorser] callChaincode -> INFO 0b4 [businesschannel][96bad1cb] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:16.536 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][96bad1cb] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.536 UTC [comm.grpc.server] 1 -> INFO 0b6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55936 grpc.code=OK grpc.call_duration=2.768ms +peer0.org1.example.com | "2019-04-22 06:21:16.725 UTC [endorser] callChaincode -> INFO 0b7 [businesschannel][7962c131] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:16.727 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][7962c131] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.727 UTC [comm.grpc.server] 1 -> INFO 0b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55940 grpc.code=OK grpc.call_duration=2.8224ms +peer0.org1.example.com | "2019-04-22 06:21:17.295 UTC [endorser] callChaincode -> INFO 0ba [businesschannel][4598da40] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.297 UTC [endorser] callChaincode -> INFO 0bb [businesschannel][4598da40] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.298 UTC [comm.grpc.server] 1 -> INFO 0bc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55948 grpc.code=OK grpc.call_duration=4.0243ms +peer0.org1.example.com | "2019-04-22 06:21:17.547 UTC [endorser] callChaincode -> INFO 0bd [businesschannel][0384b6f2] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.548 UTC [endorser] callChaincode -> INFO 0be [businesschannel][0384b6f2] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.549 UTC [comm.grpc.server] 1 -> INFO 0bf unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55952 grpc.code=OK grpc.call_duration=2.6047ms +peer0.org1.example.com | "2019-04-22 06:21:17.767 UTC [endorser] callChaincode -> INFO 0c0 [businesschannel][1f6e9f29] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.777 UTC [endorser] callChaincode -> INFO 0c1 [businesschannel][1f6e9f29] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.778 UTC [comm.grpc.server] 1 -> INFO 0c2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55956 grpc.code=OK grpc.call_duration=13.7744ms +peer0.org1.example.com | "2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 0c3 [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:29.136 UTC [cauthdsl] deduplicate -> WARN 0c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:21:29.138 UTC [cauthdsl] deduplicate -> WARN 0c5 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] JoinChan -> INFO 0c6 Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c7 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c8 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c9 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0ca No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:21:29.200 UTC [committer.txvalidator] Validate -> INFO 0cb [businesschannel] Validated block [9] in 66ms" +peer0.org1.example.com | "2019-04-22 06:21:29.220 UTC [comm.grpc.server] 1 -> INFO 0cc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.22Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.7µs +peer0.org1.example.com | "2019-04-22 06:21:29.240 UTC [comm.grpc.server] 1 -> INFO 0cd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.224Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.5775ms +peer0.org1.example.com | "2019-04-22 06:21:29.256 UTC [comm.grpc.server] 1 -> INFO 0ce unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.256Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.4µs +orderer0.example.com | 2019-04-22 06:20:01.935 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-04-22 06:20:02.024 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-04-22 06:20:02.135 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer0.example.com | "2019-04-22 06:20:02.148 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.commmon.multichannel] Initialize -> INFO 005 Starting system channel 'testchainid' with genesis block hash 5b624c739d1fc11be2f3412f11dda2aaba79612fe76f53357b77f21f65013cda and orderer type solo" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 006 Starting orderer: +orderer0.example.com | Version: 2.0.0 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.11.5 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 007 Beginning to serve requests" +orderer0.example.com | "2019-04-22 06:20:08.706 UTC [comm.grpc.server] 1 -> INFO 008 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33838 grpc.code=OK grpc.call_duration=37.7747ms +orderer0.example.com | "2019-04-22 06:20:08.714 UTC [fsblkstorage] newBlockfileMgr -> INFO 009 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:20:08.725 UTC [orderer.commmon.multichannel] newChain -> INFO 00a Created and starting new chain businesschannel" +orderer0.example.com | "2019-04-22 06:20:08.735 UTC [common.deliver] Handle -> WARN 00b Error reading from 192.168.224.3:33836: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:08.736 UTC [comm.grpc.server] 1 -> INFO 00c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.6362ms +orderer0.example.com | "2019-04-22 06:20:12.419 UTC [common.deliver] Handle -> WARN 00d Error reading from 192.168.224.3:33864: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:12.420 UTC [comm.grpc.server] 1 -> INFO 00e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33864 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.9713ms +orderer0.example.com | "2019-04-22 06:20:12.423 UTC [orderer.common.broadcast] Handle -> WARN 00f Error reading from 192.168.224.3:33866: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:12.424 UTC [comm.grpc.server] 1 -> INFO 010 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33866 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.119ms +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [lifecycle] update -> INFO 05c Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [cceventmgmt] HandleStateUpdates -> INFO 05d Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05e Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05f Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-04-22 06:20:28.728 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [5] with 1 transaction(s) in 40ms (state_validation=6ms block_commit=18ms state_commit=7ms)" +peer1.org1.example.com | "2019-04-22 06:20:29.413 UTC [gossip.channel] reportMembershipChanges -> INFO 061 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:21:07.531 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:07.534 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [6] in 1ms" +peer1.org1.example.com | "2019-04-22 06:21:07.570 UTC [kvledger] CommitWithPvtData -> INFO 064 [businesschannel] Committed block [6] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=20ms state_commit=7ms)" +peer1.org1.example.com | "2019-04-22 06:21:13.014 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:13.018 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [7] in 3ms" +peer1.org1.example.com | "2019-04-22 06:21:13.053 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [7] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=28ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:21:15.652 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:15.656 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [8] in 2ms" +peer1.org1.example.com | "2019-04-22 06:21:15.675 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [8] with 1 transaction(s) in 17ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:21:29.139 UTC [gossip.privdata] StoreBlock -> INFO 06b [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:29.153 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:21:29.172 UTC [cauthdsl] deduplicate -> WARN 06d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:21:29.256 UTC [gossip.gossip] JoinChan -> INFO 06e Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-04-22 06:21:29.257 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:21:29.259 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:21:29.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:21:29.260 UTC [gossip.service] updateEndpoints -> WARN 072 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:21:29.287 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [9] in 147ms" +peer1.org1.example.com | "2019-04-22 06:21:29.329 UTC [kvledger] CommitWithPvtData -> INFO 074 [businesschannel] Committed block [9] with 1 transaction(s) in 40ms (state_validation=15ms block_commit=17ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:21:29.346 UTC [gossip.comm] func1 -> WARN 075 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:21:29.346 UTC [gossip.comm] func1 -> WARN 076 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 077 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 078 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Exiting" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-04-22 06:21:29.348 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-04-22 06:21:29.348 UTC [gossip.discovery] expireDeadMembers -> WARN 07c Exiting" +peer1.org1.example.com | "2019-04-22 06:21:29.404 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.404Z grpc.peer_address=192.168.224.5:46366 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.5µs +peer1.org1.example.com | "2019-04-22 06:21:29.412 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.411Z grpc.peer_address=192.168.224.7:40212 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=330.7µs +peer1.org1.example.com | "2019-04-22 06:21:46.690 UTC [endorser] callChaincode -> INFO 07f [][c7e2491b] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:21:46.692 UTC [endorser] callChaincode -> INFO 080 [][c7e2491b] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:21:46.692 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60768 grpc.code=OK grpc.call_duration=2.2381ms +peer1.org1.example.com | "2019-04-22 06:21:47.581 UTC [endorser] callChaincode -> INFO 082 [][a06bf6dc] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:21:47.583 UTC [endorser] callChaincode -> INFO 083 [][a06bf6dc] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-04-22 06:21:47.584 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60780 grpc.code=OK grpc.call_duration=3.2818ms +peer0.org1.example.com | "2019-04-22 06:21:29.295 UTC [kvledger] CommitWithPvtData -> INFO 0cf [businesschannel] Committed block [9] with 1 transaction(s) in 94ms (state_validation=9ms block_commit=63ms state_commit=17ms)" +peer0.org1.example.com | "2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m9.8442242s +peer0.org1.example.com | "2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.272Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.8871ms +peer0.org1.example.com | "2019-04-22 06:21:29.306 UTC [comm.grpc.server] 1 -> INFO 0d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.305Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.4µs +peer0.org1.example.com | "2019-04-22 06:21:29.335 UTC [comm.grpc.server] 1 -> INFO 0d3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7535276s +peer0.org1.example.com | "2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 0d4 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.311Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.8218ms +peer0.org1.example.com | "2019-04-22 06:21:29.374 UTC [comm.grpc.server] 1 -> INFO 0d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.373Z grpc.peer_address=192.168.224.6:51284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=501.6µs +peer0.org1.example.com | "2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d6 [][264d8e67] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d7 [][264d8e67] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:46.520 UTC [comm.grpc.server] 1 -> INFO 0d8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56068 grpc.code=OK grpc.call_duration=1.7062ms +peer0.org1.example.com | "2019-04-22 06:21:47.446 UTC [endorser] callChaincode -> INFO 0d9 [][19533012] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:47.448 UTC [endorser] callChaincode -> INFO 0da [][19533012] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:47.448 UTC [comm.grpc.server] 1 -> INFO 0db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56080 grpc.code=OK grpc.call_duration=3.1853ms +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [orderer.common.broadcast] Handle -> WARN 011 Error reading from 192.168.224.3:33870: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [common.deliver] Handle -> WARN 013 Error reading from 192.168.224.3:33868: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 014 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33868 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9877ms +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 012 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33870 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1068ms +orderer0.example.com | "2019-04-22 06:20:22.692 UTC [orderer.common.broadcast] Handle -> WARN 015 Error reading from 192.168.224.3:33940: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:22.692 UTC [comm.grpc.server] 1 -> INFO 016 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33940 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.125477s +orderer0.example.com | "2019-04-22 06:20:25.140 UTC [orderer.common.broadcast] Handle -> WARN 017 Error reading from 192.168.224.3:33950: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:25.140 UTC [comm.grpc.server] 1 -> INFO 018 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.0871074s +orderer0.example.com | "2019-04-22 06:20:28.738 UTC [orderer.common.broadcast] Handle -> WARN 019 Error reading from 192.168.224.3:33978: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:28.738 UTC [comm.grpc.server] 1 -> INFO 01a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1404733s +orderer0.example.com | "2019-04-22 06:21:05.524 UTC [orderer.common.broadcast] Handle -> WARN 01b Error reading from 192.168.224.3:33992: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:05.525 UTC [comm.grpc.server] 1 -> INFO 01c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.6297675s +orderer0.example.com | "2019-04-22 06:21:10.961 UTC [orderer.common.broadcast] Handle -> WARN 01d Error reading from 192.168.224.3:34034: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:10.961 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34034 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0365ms +orderer0.example.com | "2019-04-22 06:21:13.590 UTC [orderer.common.broadcast] Handle -> WARN 01f Error reading from 192.168.224.3:34048: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:13.591 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34048 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.775ms +orderer0.example.com | "2019-04-22 06:21:18.233 UTC [common.deliver] Handle -> WARN 021 Error reading from 192.168.224.3:34084: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.233 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.831ms +orderer0.example.com | "2019-04-22 06:21:18.487 UTC [common.deliver] Handle -> WARN 023 Error reading from 192.168.224.3:34086: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.487 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6038ms +orderer0.example.com | "2019-04-22 06:21:18.662 UTC [common.deliver] Handle -> WARN 025 Error reading from 192.168.224.3:34088: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.662 UTC [comm.grpc.server] 1 -> INFO 026 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9215ms +orderer0.example.com | "2019-04-22 06:21:18.842 UTC [common.deliver] Handle -> WARN 027 Error reading from 192.168.224.3:34090: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.844 UTC [comm.grpc.server] 1 -> INFO 028 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34090 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0676ms +orderer0.example.com | "2019-04-22 06:21:19.024 UTC [common.deliver] Handle -> WARN 029 Error reading from 192.168.224.3:34092: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.024 UTC [comm.grpc.server] 1 -> INFO 02a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34092 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6537ms +orderer0.example.com | "2019-04-22 06:21:19.214 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.3:34094: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.214 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34094 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3594ms +orderer0.example.com | "2019-04-22 06:21:19.412 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.3:34096: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.412 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34096 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3394ms +orderer0.example.com | "2019-04-22 06:21:19.621 UTC [common.deliver] Handle -> WARN 02f Error reading from 192.168.224.3:34098: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.621 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34098 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.243ms +orderer0.example.com | "2019-04-22 06:21:19.815 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.3:34100: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.816 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34100 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0868ms +orderer0.example.com | "2019-04-22 06:21:20.032 UTC [common.deliver] Handle -> WARN 033 Error reading from 192.168.224.3:34102: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.037 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34102 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8613ms +orderer0.example.com | "2019-04-22 06:21:20.227 UTC [common.deliver] Handle -> WARN 035 Error reading from 192.168.224.3:34104: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.227 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34104 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3969ms +orderer0.example.com | "2019-04-22 06:21:20.413 UTC [common.deliver] Handle -> WARN 037 Error reading from 192.168.224.3:34106: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.414 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34106 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.4072ms +orderer0.example.com | "2019-04-22 06:21:20.619 UTC [common.deliver] Handle -> WARN 039 Error reading from 192.168.224.3:34108: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.619 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34108 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.493ms +orderer0.example.com | "2019-04-22 06:21:20.786 UTC [common.deliver] Handle -> WARN 03b Error reading from 192.168.224.3:34110: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.787 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34110 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.553ms +orderer0.example.com | "2019-04-22 06:21:20.964 UTC [common.deliver] Handle -> WARN 03d Error reading from 192.168.224.3:34112: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.969 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3481ms +orderer0.example.com | "2019-04-22 06:21:29.079 UTC [cauthdsl] deduplicate -> WARN 03f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.081 UTC [cauthdsl] deduplicate -> WARN 040 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.105 UTC [cauthdsl] deduplicate -> WARN 041 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.107 UTC [cauthdsl] deduplicate -> WARN 042 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.108 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.3:34118: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:29.108 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4341ms +orderer0.example.com | "2019-04-22 06:21:29.110 UTC [orderer.common.broadcast] Handle -> WARN 045 Error reading from 192.168.224.3:34120: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:29.110 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9849ms +orderer0.example.com | "2019-04-22 06:21:31.255 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.3:34146: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.256 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.6908ms +orderer0.example.com | "2019-04-22 06:21:31.428 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.3:34148: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.429 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0852ms +orderer0.example.com | "2019-04-22 06:21:31.977 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.3:34152: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.978 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34152 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3668ms +orderer0.example.com | "2019-04-22 06:21:32.170 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.3:34156: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.170 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34156 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.3639ms +orderer0.example.com | "2019-04-22 06:21:32.348 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.3:34158: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.348 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2183ms +orderer0.example.com | "2019-04-22 06:21:32.542 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.3:34160: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.542 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34160 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.006ms +orderer0.example.com | "2019-04-22 06:21:32.763 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.3:34162: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.763 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34162 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.7006ms +orderer0.example.com | "2019-04-22 06:21:32.983 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.3:34164: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.983 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34164 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3717ms +orderer0.example.com | "2019-04-22 06:21:33.188 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.3:34166: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34166 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6536ms +orderer0.example.com | "2019-04-22 06:21:33.395 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.3:34168: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.395 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34168 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.7137ms +orderer0.example.com | "2019-04-22 06:21:33.579 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.3:34170: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.579 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34170 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2506ms +orderer0.example.com | "2019-04-22 06:21:33.793 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.3:34172: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.793 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.1524ms +orderer0.example.com | "2019-04-22 06:21:33.990 UTC [common.deliver] Handle -> WARN 05f Error reading from 192.168.224.3:34174: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.990 UTC [comm.grpc.server] 1 -> INFO 060 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34174 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.721ms +orderer0.example.com | "2019-04-22 06:21:34.184 UTC [common.deliver] Handle -> WARN 061 Error reading from 192.168.224.3:34176: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.184 UTC [comm.grpc.server] 1 -> INFO 062 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0644ms +orderer0.example.com | "2019-04-22 06:21:34.379 UTC [common.deliver] Handle -> WARN 063 Error reading from 192.168.224.3:34178: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.379 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5151ms +orderer0.example.com | "2019-04-22 06:21:34.611 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.3:34180: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.612 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5181ms +orderer0.example.com | "2019-04-22 06:21:34.768 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.3:34182: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.768 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.3984ms +orderer0.example.com | "2019-04-22 06:21:34.960 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.3:34184: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.961 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2266ms diff --git a/hyperledger_fabric/v1.4.2/solo/logs/dev_orderer.log b/hyperledger_fabric/v1.4.2/solo/logs/dev_orderer.log new file mode 100644 index 00000000..17ee0c28 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/logs/dev_orderer.log @@ -0,0 +1,197 @@ +2019-04-22 06:20:01.935 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +"2019-04-22 06:20:02.024 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-04-22 06:20:02.135 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +"2019-04-22 06:20:02.148 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +"2019-04-22 06:20:02.234 UTC [orderer.commmon.multichannel] Initialize -> INFO 005 Starting system channel 'testchainid' with genesis block hash 5b624c739d1fc11be2f3412f11dda2aaba79612fe76f53357b77f21f65013cda and orderer type solo" +"2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 006 Starting orderer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64" +"2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 007 Beginning to serve requests" +"2019-04-22 06:20:08.706 UTC [comm.grpc.server] 1 -> INFO 008 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33838 grpc.code=OK grpc.call_duration=37.7747ms +"2019-04-22 06:20:08.714 UTC [fsblkstorage] newBlockfileMgr -> INFO 009 Getting block information from block storage" +"2019-04-22 06:20:08.725 UTC [orderer.commmon.multichannel] newChain -> INFO 00a Created and starting new chain businesschannel" +"2019-04-22 06:20:08.735 UTC [common.deliver] Handle -> WARN 00b Error reading from 192.168.224.3:33836: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:08.736 UTC [comm.grpc.server] 1 -> INFO 00c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.6362ms +"2019-04-22 06:20:12.419 UTC [common.deliver] Handle -> WARN 00d Error reading from 192.168.224.3:33864: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:12.420 UTC [comm.grpc.server] 1 -> INFO 00e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33864 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.9713ms +"2019-04-22 06:20:12.423 UTC [orderer.common.broadcast] Handle -> WARN 00f Error reading from 192.168.224.3:33866: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:12.424 UTC [comm.grpc.server] 1 -> INFO 010 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33866 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.119ms +"2019-04-22 06:20:14.591 UTC [orderer.common.broadcast] Handle -> WARN 011 Error reading from 192.168.224.3:33870: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:14.591 UTC [common.deliver] Handle -> WARN 013 Error reading from 192.168.224.3:33868: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 014 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33868 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9877ms +"2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 012 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33870 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1068ms +"2019-04-22 06:20:22.692 UTC [orderer.common.broadcast] Handle -> WARN 015 Error reading from 192.168.224.3:33940: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:22.692 UTC [comm.grpc.server] 1 -> INFO 016 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33940 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.125477s +"2019-04-22 06:20:25.140 UTC [orderer.common.broadcast] Handle -> WARN 017 Error reading from 192.168.224.3:33950: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:25.140 UTC [comm.grpc.server] 1 -> INFO 018 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.0871074s +"2019-04-22 06:20:28.738 UTC [orderer.common.broadcast] Handle -> WARN 019 Error reading from 192.168.224.3:33978: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:28.738 UTC [comm.grpc.server] 1 -> INFO 01a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1404733s +"2019-04-22 06:21:05.524 UTC [orderer.common.broadcast] Handle -> WARN 01b Error reading from 192.168.224.3:33992: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:05.525 UTC [comm.grpc.server] 1 -> INFO 01c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.6297675s +"2019-04-22 06:21:10.961 UTC [orderer.common.broadcast] Handle -> WARN 01d Error reading from 192.168.224.3:34034: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:10.961 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34034 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0365ms +"2019-04-22 06:21:13.590 UTC [orderer.common.broadcast] Handle -> WARN 01f Error reading from 192.168.224.3:34048: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:13.591 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34048 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.775ms +"2019-04-22 06:21:18.233 UTC [common.deliver] Handle -> WARN 021 Error reading from 192.168.224.3:34084: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.233 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.831ms +"2019-04-22 06:21:18.487 UTC [common.deliver] Handle -> WARN 023 Error reading from 192.168.224.3:34086: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.487 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6038ms +"2019-04-22 06:21:18.662 UTC [common.deliver] Handle -> WARN 025 Error reading from 192.168.224.3:34088: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.662 UTC [comm.grpc.server] 1 -> INFO 026 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9215ms +"2019-04-22 06:21:18.842 UTC [common.deliver] Handle -> WARN 027 Error reading from 192.168.224.3:34090: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.844 UTC [comm.grpc.server] 1 -> INFO 028 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34090 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0676ms +"2019-04-22 06:21:19.024 UTC [common.deliver] Handle -> WARN 029 Error reading from 192.168.224.3:34092: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.024 UTC [comm.grpc.server] 1 -> INFO 02a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34092 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6537ms +"2019-04-22 06:21:19.214 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.3:34094: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.214 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34094 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3594ms +"2019-04-22 06:21:19.412 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.3:34096: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.412 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34096 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3394ms +"2019-04-22 06:21:19.621 UTC [common.deliver] Handle -> WARN 02f Error reading from 192.168.224.3:34098: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.621 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34098 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.243ms +"2019-04-22 06:21:19.815 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.3:34100: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.816 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34100 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0868ms +"2019-04-22 06:21:20.032 UTC [common.deliver] Handle -> WARN 033 Error reading from 192.168.224.3:34102: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.037 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34102 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8613ms +"2019-04-22 06:21:20.227 UTC [common.deliver] Handle -> WARN 035 Error reading from 192.168.224.3:34104: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.227 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34104 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3969ms +"2019-04-22 06:21:20.413 UTC [common.deliver] Handle -> WARN 037 Error reading from 192.168.224.3:34106: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.414 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34106 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.4072ms +"2019-04-22 06:21:20.619 UTC [common.deliver] Handle -> WARN 039 Error reading from 192.168.224.3:34108: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.619 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34108 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.493ms +"2019-04-22 06:21:20.786 UTC [common.deliver] Handle -> WARN 03b Error reading from 192.168.224.3:34110: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.787 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34110 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.553ms +"2019-04-22 06:21:20.964 UTC [common.deliver] Handle -> WARN 03d Error reading from 192.168.224.3:34112: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.969 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3481ms +"2019-04-22 06:21:29.079 UTC [cauthdsl] deduplicate -> WARN 03f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.081 UTC [cauthdsl] deduplicate -> WARN 040 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.105 UTC [cauthdsl] deduplicate -> WARN 041 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.107 UTC [cauthdsl] deduplicate -> WARN 042 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.108 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.3:34118: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:29.108 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4341ms +"2019-04-22 06:21:29.110 UTC [orderer.common.broadcast] Handle -> WARN 045 Error reading from 192.168.224.3:34120: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:29.110 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9849ms +"2019-04-22 06:21:31.255 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.3:34146: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.256 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.6908ms +"2019-04-22 06:21:31.428 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.3:34148: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.429 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0852ms +"2019-04-22 06:21:31.977 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.3:34152: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.978 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34152 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3668ms +"2019-04-22 06:21:32.170 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.3:34156: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.170 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34156 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.3639ms +"2019-04-22 06:21:32.348 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.3:34158: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.348 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2183ms +"2019-04-22 06:21:32.542 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.3:34160: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.542 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34160 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.006ms +"2019-04-22 06:21:32.763 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.3:34162: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.763 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34162 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.7006ms +"2019-04-22 06:21:32.983 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.3:34164: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.983 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34164 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3717ms +"2019-04-22 06:21:33.188 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.3:34166: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34166 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6536ms +"2019-04-22 06:21:33.395 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.3:34168: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.395 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34168 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.7137ms +"2019-04-22 06:21:33.579 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.3:34170: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.579 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34170 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2506ms +"2019-04-22 06:21:33.793 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.3:34172: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.793 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.1524ms +"2019-04-22 06:21:33.990 UTC [common.deliver] Handle -> WARN 05f Error reading from 192.168.224.3:34174: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.990 UTC [comm.grpc.server] 1 -> INFO 060 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34174 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.721ms +"2019-04-22 06:21:34.184 UTC [common.deliver] Handle -> WARN 061 Error reading from 192.168.224.3:34176: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.184 UTC [comm.grpc.server] 1 -> INFO 062 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0644ms +"2019-04-22 06:21:34.379 UTC [common.deliver] Handle -> WARN 063 Error reading from 192.168.224.3:34178: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.379 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5151ms +"2019-04-22 06:21:34.611 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.3:34180: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.612 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5181ms +"2019-04-22 06:21:34.768 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.3:34182: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.768 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.3984ms +"2019-04-22 06:21:34.960 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.3:34184: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.961 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2266ms diff --git a/hyperledger_fabric/v1.4.2/solo/logs/dev_peer.log b/hyperledger_fabric/v1.4.2/solo/logs/dev_peer.log new file mode 100644 index 00000000..ebea8ab8 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/logs/dev_peer.log @@ -0,0 +1,2305 @@ +[001 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer: + Version: 1.0.4 + Go version: go1.9.2 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.3.2 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger + +[002 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize -> INFO Initializing ledger mgmt +[003 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> INFO Initializing ledger provider +[004 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[005 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[006 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[007 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[008 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[009 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[00a 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> DEBU Constructing leveldb VersionedDBProvider +[00b 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[00c 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[00d 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[00e 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[00f 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[010 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[011 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[012 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[013 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> INFO ledger provider Initialized +[014 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.recoverUnderConstructionLedger -> DEBU Recovering under construction ledger +[015 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.recoverUnderConstructionLedger -> DEBU No under construction ledger found. Quitting recovery +[016 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize -> INFO ledger mgmt initialized +[017 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer with TLS enabled +[018 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering BLOCK +[019 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering CHAINCODE +[01a 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering REJECTION +[01b 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering REGISTER +[01c 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] -> INFO Event processor started +[01d 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport -> DEBU Chaincode startup timeout value set to 5m0s +[01e 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> INFO Chaincode support using peerAddress: peer0.org1.example.com:7052 +[01f 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> DEBU Turn off keepalive(value 0) +[020 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> DEBU Setting execute timeout value to 30s +[021 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport.getLogLevelFromViper -> DEBU CORE_CHAINCODE_LEVEL set to level info +[022 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport.getLogLevelFromViper -> DEBU CORE_CHAINCODE_SHIM set to level warning +[023 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[024 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[025 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode escc(github.com/hyperledger/fabric/core/scc/escc) registered +[026 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode vscc(github.com/hyperledger/fabric/core/scc/vscc) registered +[027 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/chaincode/qscc) registered +[028 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> DEBU Running peer +[029 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.NewEndorserServer.GetLocalMSP -> DEBU Returning existing local MSP +[02a 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.GetLocalSigningIdentityOrPanic.GetLocalMSP -> DEBU Returning existing local MSP +[02b 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.GetLocalSigningIdentityOrPanic.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[02c 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/gossip/service] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1 -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[02d 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[02e 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity -> INFO Obtaining identity +[02f 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[030 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.GetLocalMSPIdentifier.GetLocalMSP -> DEBU Returning existing local MSP +[031 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.Validate.Validate -> DEBU MSP Org1MSP validating identity +[032 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[033 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.DeserializeIdentity -> INFO Obtaining identity +[034 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[035 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/discovery] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.NewDiscoveryService -> INFO Started {peer0.org1.example.com:7051 [] [87 254 40 172 224 130 233 118 32 0 101 135 155 98 10 13 107 42 197 18 142 226 92 151 20 251 18 179 182 138 173 181] peer0.org1.example.com:7051} incTime is 1512458980556593600 +[036 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/gossip] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [87 254 40 172 224 130 233 118 32 0 101 135 155 98 10 13 107 42 197 18 142 226 92 151 20 251 18 179 182 138 173 181] peer0.org1.example.com:7051} +[037 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[038 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity -> INFO Obtaining identity +[039 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[03a 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.GetLocalMSPIdentifier.GetLocalMSP -> DEBU Returning existing local MSP +[03b 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.Validate.Validate -> DEBU MSP Org1MSP validating identity +[03c 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[03d 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[03e 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/discovery] -> DEBU Sleeping 5s +[03f 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.Sign -> DEBU Sign: plaintext: 1801AA01B1060A2057FE28ACE082E976...0A2D2D2D2D2D454E44202D2D2D2D2D0A +[040 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.Sign -> DEBU Sign: digest: FAB80B0E7011C864E8AD9AED2F6711087CF755E09B33858AA16743A6B6442CDF +[041 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=cscc,version=1.0.4,txid=ebf1e200-7fdf-49de-8d99-8efdac6862f1,syscc=true,proposal=0x0,canname=cscc:1.0.4 +[042 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode cscc:1.0.4 is being launched +[043 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[044 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[045 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: cscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[046 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[047 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=cscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[048 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(cscc-1.0.4) lock +[049 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (cscc-1.0.4) lock +[04a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for cscc-1.0.4 +[04b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(cscc-1.0.4) +[04c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/gossip] -> INFO Gossip instance peer0.org1.example.com:7051 started +[04d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/discovery] Connect -> DEBU Skipping connecting to myself +[04e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for cscc-1.0.4 +[04f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[050 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[051 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/gossip] -> DEBU Entering discovery sync with interval 4s +[052 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[053 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[054 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.Sign -> DEBU Sign: plaintext: 18012ADE060A3F0A1B70656572302E6F...0A2D2D2D2D2D454E44202D2D2D2D2D0A +[055 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.Sign -> DEBU Sign: digest: 8732BB4A5DD65C55142FBAE459418DF480931486636FB5A8FFC9613084545D9B +[056 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[057 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[058 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.Sign -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[059 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.Sign -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[05a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for cscc-1.0.4 +[05b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[05c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=cscc:1.0.4 +[05d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[05e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[05f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[060 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[061 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode cscc:1.0.4 +[062 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.0.4" , sending back REGISTERED +[063 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[064 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[065 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[066 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[067 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode cscc:1.0.4 launch seq completed +[068 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[069 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[06a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Move state message READY +[06b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: READY in state established +[06c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [ebf1e200]Entered state ready +[06d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:ebf1e200-7fdf-49de-8d99-8efdac6862f1 +[06e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]sending state message READY +[06f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Received message READY from shim +[070 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: READY(state:established) +[071 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[072 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[073 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[074 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[075 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [ebf1e200]Inside sendExecuteMessage. Message INIT +[076 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[077 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [ebf1e200]sendExecuteMsg trigger event INIT +[078 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Move state message INIT +[079 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[07a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[07b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]sending state message INIT +[07c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Received message INIT from shim +[07d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: INIT(state:ready) +[07e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[07f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [ebf1e200]Received INIT, initializing chaincode +[080 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Init -> INFO Init CSCC +[081 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetLocalMSP -> DEBU Returning existing local MSP +[082 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Init get response status: 200 +[083 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Init succeeded. Sending COMPLETED +[084 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Move state message COMPLETED +[085 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[086 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]send state message COMPLETED +[087 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Received message COMPLETED from shim +[088 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[089 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200-7fdf-49de-8d99-8efdac6862f1]HandleMessage- COMPLETED. Notify +[08a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ebf1e200-7fdf-49de-8d99-8efdac6862f1 +[08b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[08c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[08d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=lscc,version=1.0.4,txid=0019f517-2706-4f93-afef-03f480d65ff0,syscc=true,proposal=0x0,canname=lscc:1.0.4 +[08e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode lscc:1.0.4 is being launched +[08f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[090 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[091 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: lscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[092 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[093 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=lscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[095 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(lscc-1.0.4) lock +[096 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (lscc-1.0.4) lock +[097 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for lscc-1.0.4 +[098 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(lscc-1.0.4) +[099 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for lscc-1.0.4 +[09a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[09b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[09c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for lscc-1.0.4 +[094 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/discovery] -> DEBU Sleeping 25s +[09d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[09e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=lscc:1.0.4 +[09f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[0a0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[0a1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[0a2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[0a3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode lscc:1.0.4 +[0a4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.0.4" , sending back REGISTERED +[0a5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[0a6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[0a7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[0a8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[0a9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode lscc:1.0.4 launch seq completed +[0aa 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[0ab 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0ac 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Move state message READY +[0ad 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: READY in state established +[0ae 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [0019f517]Entered state ready +[0af 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:0019f517-2706-4f93-afef-03f480d65ff0 +[0b0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]sending state message READY +[0b1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Received message READY from shim +[0b2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: READY(state:established) +[0b3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[0b4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[0b5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[0b6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[0b7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [0019f517]Inside sendExecuteMessage. Message INIT +[0b8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0b9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [0019f517]sendExecuteMsg trigger event INIT +[0ba 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Move state message INIT +[0bb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[0bc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[0bd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]sending state message INIT +[0be 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Received message INIT from shim +[0bf 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: INIT(state:ready) +[0c0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[0c1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [0019f517]Received INIT, initializing chaincode +[0c2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetPolicyChecker.GetPolicyChecker.NewPolicyChecker.GetLocalMSP -> DEBU Returning existing local MSP +[0c3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Init get response status: 200 +[0c4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Init succeeded. Sending COMPLETED +[0c5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Move state message COMPLETED +[0c6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[0c7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]send state message COMPLETED +[0c8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Received message COMPLETED from shim +[0c9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[0ca 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517-2706-4f93-afef-03f480d65ff0]HandleMessage- COMPLETED. Notify +[0cb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0019f517-2706-4f93-afef-03f480d65ff0 +[0cc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[0cd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0ce 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=escc,version=1.0.4,txid=8bbc4b00-7043-45a4-a6a5-09d6a09935a7,syscc=true,proposal=0x0,canname=escc:1.0.4 +[0cf 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode escc:1.0.4 is being launched +[0d0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[0d1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[0d2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: escc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[0d3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0d4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=escc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[0d5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(escc-1.0.4) lock +[0d6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (escc-1.0.4) lock +[0d7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for escc-1.0.4 +[0d8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(escc-1.0.4) +[0d9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for escc-1.0.4 +[0da 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[0db 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[0dc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for escc-1.0.4 +[0dd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[0de 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=escc:1.0.4 +[0df 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[0e0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[0e1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[0e2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[0e3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode escc:1.0.4 +[0e4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"escc:1.0.4" , sending back REGISTERED +[0e5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[0e6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[0e7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[0e8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[0e9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode escc:1.0.4 launch seq completed +[0ea 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[0eb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0ec 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Move state message READY +[0ed 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: READY in state established +[0ee 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [8bbc4b00]Entered state ready +[0ef 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:8bbc4b00-7043-45a4-a6a5-09d6a09935a7 +[0f0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]sending state message READY +[0f1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Received message READY from shim +[0f2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: READY(state:established) +[0f3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[0f4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[0f5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[0f6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[0f7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8bbc4b00]Inside sendExecuteMessage. Message INIT +[0f8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0f9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8bbc4b00]sendExecuteMsg trigger event INIT +[0fa 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Move state message INIT +[0fb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[0fc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[0fd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]sending state message INIT +[0fe 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Received message INIT from shim +[0ff 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: INIT(state:ready) +[100 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[101 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [8bbc4b00]Received INIT, initializing chaincode +[102 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc/escc] Init -> INFO Successfully initialized ESCC +[103 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Init get response status: 200 +[104 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Init succeeded. Sending COMPLETED +[105 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Move state message COMPLETED +[106 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[107 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]send state message COMPLETED +[108 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Received message COMPLETED from shim +[109 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[10a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00-7043-45a4-a6a5-09d6a09935a7]HandleMessage- COMPLETED. Notify +[10b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:8bbc4b00-7043-45a4-a6a5-09d6a09935a7 +[10c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[10d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode escc/(github.com/hyperledger/fabric/core/scc/escc) deployed +[10e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=vscc,version=1.0.4,txid=8a2131e4-69be-414f-8030-ed18225f882d,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[10f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode vscc:1.0.4 is being launched +[110 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[111 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[112 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: vscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[113 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[114 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=vscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[115 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(vscc-1.0.4) lock +[116 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (vscc-1.0.4) lock +[117 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for vscc-1.0.4 +[118 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(vscc-1.0.4) +[119 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for vscc-1.0.4 +[11a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[11b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[11c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for vscc-1.0.4 +[11d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[11e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=vscc:1.0.4 +[11f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[120 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[121 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[122 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[123 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode vscc:1.0.4 +[124 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"vscc:1.0.4" , sending back REGISTERED +[125 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[126 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode vscc:1.0.4 launch seq completed +[127 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[128 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[129 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Move state message READY +[12a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: READY in state established +[12b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [8a2131e4]Entered state ready +[12c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:8a2131e4-69be-414f-8030-ed18225f882d +[12d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]sending state message READY +[12e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[12f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[130 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[131 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[132 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8a2131e4]Inside sendExecuteMessage. Message INIT +[133 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[134 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8a2131e4]sendExecuteMsg trigger event INIT +[135 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[136 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[137 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[138 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Received message READY from shim +[139 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: READY(state:established) +[13a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Move state message INIT +[13b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[13c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[13d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]sending state message INIT +[13e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Received message INIT from shim +[13f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: INIT(state:ready) +[140 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[141 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [8a2131e4]Received INIT, initializing chaincode +[142 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Init get response status: 200 +[143 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Init succeeded. Sending COMPLETED +[144 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Move state message COMPLETED +[145 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[146 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]send state message COMPLETED +[147 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Received message COMPLETED from shim +[148 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[149 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4-69be-414f-8030-ed18225f882d]HandleMessage- COMPLETED. Notify +[14a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:8a2131e4-69be-414f-8030-ed18225f882d +[14b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[14c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode vscc/(github.com/hyperledger/fabric/core/scc/vscc) deployed +[14d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=3bb78f79-7308-4fc2-a4e3-a20f4f893f69,syscc=true,proposal=0x0,canname=qscc:1.0.4 +[14e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode qscc:1.0.4 is being launched +[14f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[150 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[151 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: qscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[152 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[153 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=qscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[154 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(qscc-1.0.4) lock +[155 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (qscc-1.0.4) lock +[156 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for qscc-1.0.4 +[157 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(qscc-1.0.4) +[158 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for qscc-1.0.4 +[159 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[15a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[15b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for qscc-1.0.4 +[15c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[15d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=qscc:1.0.4 +[15e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[15f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[160 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[161 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[162 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode qscc:1.0.4 +[163 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.0.4" , sending back REGISTERED +[164 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[165 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[166 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[167 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[168 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode qscc:1.0.4 launch seq completed +[169 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[16a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[16b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Move state message READY +[16c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: READY in state established +[16d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [3bb78f79]Entered state ready +[16e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:3bb78f79-7308-4fc2-a4e3-a20f4f893f69 +[16f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]sending state message READY +[170 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Received message READY from shim +[171 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: READY(state:established) +[172 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[173 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[174 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[175 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[176 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [3bb78f79]Inside sendExecuteMessage. Message INIT +[177 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[178 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [3bb78f79]sendExecuteMsg trigger event INIT +[179 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Move state message INIT +[17a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[17b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[17c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]sending state message INIT +[17d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Received message INIT from shim +[17e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: INIT(state:ready) +[17f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[180 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [3bb78f79]Received INIT, initializing chaincode +[181 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Init -> INFO Init QSCC +[182 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetLocalMSP -> DEBU Returning existing local MSP +[183 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Init get response status: 200 +[184 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Init succeeded. Sending COMPLETED +[185 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Move state message COMPLETED +[186 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[187 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]send state message COMPLETED +[188 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Received message COMPLETED from shim +[189 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[18a 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79-7308-4fc2-a4e3-a20f4f893f69]HandleMessage- COMPLETED. Notify +[18b 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:3bb78f79-7308-4fc2-a4e3-a20f4f893f69 +[18c 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[18d 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/chaincode/qscc) deployed +[18e 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve.initSysCCs -> INFO Deployed system chaincodess +[18f 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[190 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[191 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'msp/identity' logger enabled for log level 'WARNING' +[192 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'configvalues/msp' logger enabled for log level 'WARNING' +[193 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'msp' logger enabled for log level 'WARNING' +[194 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/discovery' logger enabled for log level 'WARNING' +[195 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/comm' logger enabled for log level 'WARNING' +[196 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/pull' logger enabled for log level 'WARNING' +[197 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/gossip' logger enabled for log level 'WARNING' +[198 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/service' logger enabled for log level 'WARNING' +[199 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/state' logger enabled for log level 'WARNING' +[19a 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'peer/gossip/sa' logger enabled for log level 'WARNING' +[19b 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'peer/gossip/mcs' logger enabled for log level 'WARNING' +[19c 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/election' logger enabled for log level 'WARNING' +[19d 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'kvledger' logger enabled for log level 'INFO' +[19e 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'ledgermgmt' logger enabled for log level 'INFO' +[19f 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'kvledger.util' logger enabled for log level 'INFO' +[1a0 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'cauthdsl' logger enabled for log level 'WARNING' +[1a1 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'policies' logger enabled for log level 'WARNING' +[1a2 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'grpc' logger enabled for log level 'ERROR' +[1a3 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[1a4 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc4216238f0 +[1a5 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 1 +[1a6 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[1a7 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[1a8 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[1a9 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[1aa 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc4215bfe50, header 0xc421623980 +[1ab 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[1ac 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 +[1ad 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 channel id: +[1ae 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 channel id: version: 1.0.4 +[1af 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=cscc,version=1.0.4,txid=ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1,syscc=true,proposal=0xc4215bfe50,canname=cscc:1.0.4 +[1b0 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : cscc:1.0.4 +[1b1 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[1b2 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[1b3 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ccd54f80]Inside sendExecuteMessage. Message TRANSACTION +[1b4 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[1b5 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[1b6 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ccd54f80]sendExecuteMsg trigger event TRANSACTION +[1b7 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]Move state message TRANSACTION +[1b8 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[1b9 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[1ba 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]sending state message TRANSACTION +[1bb 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Received message TRANSACTION from shim +[1bc 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ccd54f80]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[1bd 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ccd54f80]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[1be 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Invoke -> DEBU Invoke function: JoinChain +[1bf 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] Invoke.joinChain.CreateChainFromBlock.CreateLedger -> INFO Creating ledger [businesschannel] with genesis block +[1c0 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[1c1 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> INFO No info about blocks file found in the db. + This could happen if this is the first time the ledger is constructed or the index is dropped. + Scanning blocks dir for the latest info +[1c2 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> DEBU Retrieving checkpoint info from block files +[1c3 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles.retrieveLastFileSuffix -> DEBU retrieveLastFileSuffix() +[1c4 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles.retrieveLastFileSuffix -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[1c5 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> DEBU Last file number found = -1 +[1c6 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> INFO No block file found +[1c7 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> INFO Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc4216fcb20)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[1c8 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.newBlockIndex -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[1c9 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO No block indexed, Last block present in block files=[0] +[1ca 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO Start building index from block [0] +[1cb 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.newBlockStream.newBlockfileStream -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[0] +[1cc 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.nextBlockBytesAndPlacementInfo.nextBlockBytesAndPlacementInfo -> DEBU Finished reading file number [0] +[1cd 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.nextBlockBytesAndPlacementInfo -> DEBU blockbytes [0] read from file [0] +[1ce 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO Finished building index. Last block indexed [0] +[1cf 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[1d0 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc421587900), Data:(*common.BlockData)(0xc4216ac8c0), Metadata:(*common.BlockMetadata)(0xc4216ac900)}, doMVCCValidation=true +[1d1 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[1d2 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Skipping mvcc validation for Block [0] Transaction index [0] because, the transaction type is [CONFIG] +[1d3 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xf0, 0xbf, 0x75, 0xab, 0xa3, 0xf5, 0x13, 0xfa, 0xa, 0x7b, 0xfc, 0x92, 0x5, 0x7c, 0x72, 0x12, 0x4, 0x8e, 0x2b, 0x4e, 0x50, 0x71, 0x5e, 0x78, 0xb3, 0xc7, 0xe9, 0x7e, 0x1f, 0xb9, 0x4, 0x91} txOffsets= +txId= locPointer=offset=38, bytesLength=11901 +] +[1d4 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=38, bytesLength=11901] for tx ID: [] to index +[1d5 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=38, bytesLength=11901] for tx number:[0] ID: [] to blockNumTranNum index +[1d6 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[11945], isChainEmpty=[false], lastBlockNumber=[0] +[1d7 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit -> INFO Channel [businesschannel]: Created block [0] with 1 transaction(s) +[1d8 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Committing updates to state database +[1d9 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[1da 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Updates committed to state database +[1db 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[1dc 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[1dd 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[1de 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] Invoke.joinChain.CreateChainFromBlock.CreateLedger -> INFO Created ledger [businesschannel] with genesis block +[1df 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues -> DEBU Initializing protos for *config.ChannelProtos +[1e0 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: HashingAlgorithm +[1e1 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BlockDataHashingStructure +[1e2 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: OrdererAddresses +[1e3 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: Consortium +[1e4 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel +[1e5 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application +[1e6 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application/Org1MSP +[1e7 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Application/Org1MSP/MSP +[1e8 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[1e9 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[1ea 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[1eb 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application/Org2MSP +[1ec 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Application/Org2MSP/MSP +[1ed 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[1ee 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[1ef 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[1f0 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[1f1 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[1f2 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[1f3 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Orderer +[1f4 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Orderer/OrdererOrg +[1f5 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/OrdererOrg/MSP +[1f6 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[1f7 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[1f8 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[1f9 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/BatchTimeout +[1fa 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/ChannelRestrictions +[1fb 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/ConsensusType +[1fc 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/BatchSize +[1fd 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[1fe 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[1ff 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[200 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[201 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Consortium +[202 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/HashingAlgorithm +[203 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/OrdererAddresses +[204 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/BlockDataHashingStructure +[205 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Readers +[206 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Writers +[207 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Admins +[208 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig -> DEBU Beginning new config for channel businesschannel +[209 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues -> DEBU Initializing protos for *config.ChannelProtos +[20a 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: HashingAlgorithm +[20b 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BlockDataHashingStructure +[20c 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: OrdererAddresses +[20d 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: Consortium +[20e 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationConfig.NewStandardValues -> DEBU Initializing protos for *struct {} +[20f 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[210 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[211 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.ApplicationOrgProtos +[212 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: AnchorPeers +[213 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[214 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[215 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[216 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[217 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.ApplicationOrgProtos +[218 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: AnchorPeers +[219 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[21a 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[21b 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues -> DEBU Initializing protos for *config.OrdererProtos +[21c 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: ConsensusType +[21d 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BatchSize +[21e 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BatchTimeout +[21f 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: KafkaBrokers +[220 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: ChannelRestrictions +[221 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[222 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[223 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate -> DEBU Anchor peers for org Org2MSP are +[224 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.Validate.validateMSP -> DEBU Setting up MSP for org Org2MSP +[225 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate -> DEBU Anchor peers for org Org1MSP are +[226 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.Validate.validateMSP -> DEBU Setting up MSP for org Org1MSP +[227 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.validateMSP -> DEBU Setting up MSP for org OrdererOrg +[228 12-05 07:29:43.60 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots -> DEBU Updating trusted root authorities for channel businesschannel +[229 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU updating root CAs for channel [businesschannel] +[22a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[22b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding app root CAs for MSP [Org2MSP] +[22c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding app root CAs for MSP [Org1MSP] +[22d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.InitChain -> DEBU Init chain businesschannel +[22e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/peer/node] Invoke.joinChain.InitChain.func2 -> DEBU Deploying system CC, for chain +[22f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[230 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [c65c0d86-1416-42c9-be44-491e0e2f9dbf] +[231 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=cscc,version=1.0.4,txid=93d426d7-f9f8-47c3-9e24-8083f670b21b,syscc=true,proposal=0x0,canname=cscc:1.0.4 +[232 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : cscc:1.0.4 +[233 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[234 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[235 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [93d426d7]Inside sendExecuteMessage. Message INIT +[236 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[237 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [93d426d7]sendExecuteMsg trigger event INIT +[238 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]Move state message INIT +[239 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[23a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[23b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]sending state message INIT +[23c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Received message INIT from shim +[23d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [93d426d7]Handling ChaincodeMessage of type: INIT(state:ready) +[23e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[23f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [93d426d7]Received INIT, initializing chaincode +[240 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Init -> INFO Init CSCC +[241 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Init get response status: 200 +[242 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Init succeeded. Sending COMPLETED +[243 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Move state message COMPLETED +[244 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [93d426d7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[245 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]send state message COMPLETED +[246 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]Received message COMPLETED from shim +[247 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[248 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7-f9f8-47c3-9e24-8083f670b21b]HandleMessage- COMPLETED. Notify +[249 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:93d426d7-f9f8-47c3-9e24-8083f670b21b +[24a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[24b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[24c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [c65c0d86-1416-42c9-be44-491e0e2f9dbf] +[24d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[24e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [9fd5ddf6-32f1-4612-a1e7-7736bc16e667] +[24f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b,syscc=true,proposal=0x0,canname=lscc:1.0.4 +[250 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[251 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[252 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[253 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f4f96a0b]Inside sendExecuteMessage. Message INIT +[254 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[255 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f4f96a0b]sendExecuteMsg trigger event INIT +[256 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]Move state message INIT +[257 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[258 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[259 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]sending state message INIT +[25a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Received message INIT from shim +[25b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f4f96a0b]Handling ChaincodeMessage of type: INIT(state:ready) +[25c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[25d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [f4f96a0b]Received INIT, initializing chaincode +[25e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Init get response status: 200 +[25f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Init succeeded. Sending COMPLETED +[260 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Move state message COMPLETED +[261 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f4f96a0b]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[262 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]send state message COMPLETED +[263 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]Received message COMPLETED from shim +[264 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[265 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b]HandleMessage- COMPLETED. Notify +[266 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b +[267 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[268 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[269 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [9fd5ddf6-32f1-4612-a1e7-7736bc16e667] +[26a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[26b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [e66fafd6-1db0-40d6-a5ea-ddf912a3787d] +[26c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=f3ed19c0-7dd4-44a5-b3bf-fb90755acff7,syscc=true,proposal=0x0,canname=escc:1.0.4 +[26d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[26e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[26f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[270 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f3ed19c0]Inside sendExecuteMessage. Message INIT +[271 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[272 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f3ed19c0]sendExecuteMsg trigger event INIT +[273 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]Move state message INIT +[274 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[275 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[276 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]sending state message INIT +[277 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Received message INIT from shim +[278 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f3ed19c0]Handling ChaincodeMessage of type: INIT(state:ready) +[279 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[27a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [f3ed19c0]Received INIT, initializing chaincode +[27b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Init -> INFO Successfully initialized ESCC +[27c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Init get response status: 200 +[27d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Init succeeded. Sending COMPLETED +[27e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Move state message COMPLETED +[27f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f3ed19c0]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[280 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]send state message COMPLETED +[281 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]Received message COMPLETED from shim +[282 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[283 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0-7dd4-44a5-b3bf-fb90755acff7]HandleMessage- COMPLETED. Notify +[284 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:f3ed19c0-7dd4-44a5-b3bf-fb90755acff7 +[285 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[286 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode escc/businesschannel(github.com/hyperledger/fabric/core/scc/escc) deployed +[287 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [e66fafd6-1db0-40d6-a5ea-ddf912a3787d] +[288 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[289 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [edd9919e-0f8b-4d7e-a3f9-3c4a3366fa02] +[28a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=a5d7d2da-65a8-42bf-acbf-8c762232a10d,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[28b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[28c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[28d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[28e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [a5d7d2da]Inside sendExecuteMessage. Message INIT +[28f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[290 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [a5d7d2da]sendExecuteMsg trigger event INIT +[291 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]Move state message INIT +[292 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[293 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[294 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]sending state message INIT +[295 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Received message INIT from shim +[296 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a5d7d2da]Handling ChaincodeMessage of type: INIT(state:ready) +[297 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[298 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [a5d7d2da]Received INIT, initializing chaincode +[299 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Init get response status: 200 +[29a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Init succeeded. Sending COMPLETED +[29b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Move state message COMPLETED +[29c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a5d7d2da]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[29d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]send state message COMPLETED +[29e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]Received message COMPLETED from shim +[29f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2a0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da-65a8-42bf-acbf-8c762232a10d]HandleMessage- COMPLETED. Notify +[2a1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:a5d7d2da-65a8-42bf-acbf-8c762232a10d +[2a2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[2a3 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode vscc/businesschannel(github.com/hyperledger/fabric/core/scc/vscc) deployed +[2a4 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [edd9919e-0f8b-4d7e-a3f9-3c4a3366fa02] +[2a5 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[2a6 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [d9c06935-ee2d-40cf-8aa0-142e7d7dadf8] +[2a7 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=qscc,version=1.0.4,txid=e5f39d3f-65ed-488c-8050-20c023726e73,syscc=true,proposal=0x0,canname=qscc:1.0.4 +[2a8 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[2a9 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[2aa 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[2ab 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [e5f39d3f]Inside sendExecuteMessage. Message INIT +[2ac 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[2ad 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [e5f39d3f]sendExecuteMsg trigger event INIT +[2ae 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]Move state message INIT +[2af 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[2b0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[2b1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]sending state message INIT +[2b2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Received message INIT from shim +[2b3 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [e5f39d3f]Handling ChaincodeMessage of type: INIT(state:ready) +[2b4 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[2b5 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [e5f39d3f]Received INIT, initializing chaincode +[2b6 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Init -> INFO Init QSCC +[2b7 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Init get response status: 200 +[2b8 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Init succeeded. Sending COMPLETED +[2b9 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Move state message COMPLETED +[2ba 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [e5f39d3f]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2bb 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]send state message COMPLETED +[2bc 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]Received message COMPLETED from shim +[2bd 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2be 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f-65ed-488c-8050-20c023726e73]HandleMessage- COMPLETED. Notify +[2bf 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:e5f39d3f-65ed-488c-8050-20c023726e73 +[2c0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[2c1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/chaincode/qscc) deployed +[2c2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [d9c06935-ee2d-40cf-8aa0-142e7d7dadf8] +[2c3 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> DEBU Entry +[2c4 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [0] +[2c5 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Entry +[2c6 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[2c7 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[2c8 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Exit +[2c9 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> DEBU Exit +[2ca 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Transaction completed. Sending COMPLETED +[2cb 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Move state message COMPLETED +[2cc 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ccd54f80]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2cd 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]send state message COMPLETED +[2ce 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]Received message COMPLETED from shim +[2cf 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2d0 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1]HandleMessage- COMPLETED. Notify +[2d1 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 +[2d2 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[2d3 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[2d4 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[2d5 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[2d6 12-05 07:29:45.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[2d7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421a6bec0 +[2d8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[2d9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[2da 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[2db 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[2dc 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[2dd 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421a77e00, header 0xc421a6bef0 +[2de 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2df 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 +[2e0 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 channel id: +[2e1 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 channel id: version: 1.0.4 +[2e2 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=lscc,version=1.0.4,txid=be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693,syscc=true,proposal=0xc421a77e00,canname=lscc:1.0.4 +[2e3 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[2e4 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[2e5 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[2e6 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [be3e0ef9]Inside sendExecuteMessage. Message TRANSACTION +[2e7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[2e8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[2e9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [be3e0ef9]sendExecuteMsg trigger event TRANSACTION +[2ea 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]Move state message TRANSACTION +[2eb 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef9]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[2ec 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[2ed 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]sending state message TRANSACTION +[2ee 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Received message TRANSACTION from shim +[2ef 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [be3e0ef9]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[2f0 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [be3e0ef9]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[2f1 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Transaction completed. Sending COMPLETED +[2f2 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Move state message COMPLETED +[2f3 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [be3e0ef9]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2f4 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]send state message COMPLETED +[2f5 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]Received message COMPLETED from shim +[2f6 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef9]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2f7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693]HandleMessage- COMPLETED. Notify +[2f8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 +[2f9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[2fa 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[2fb 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[2fc 12-05 07:29:45.12 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[2fd 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[2fe 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421bcae10 +[2ff 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[300 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[301 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[302 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[303 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[304 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421bb9090, header 0xc421bcae40 +[305 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[306 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[307 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] +[308 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[309 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [8167ca4f-2917-497f-bf3d-de91e667f803] +[30a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel +[30b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel version: 1.0.4 +[30c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=true,proposal=0xc421bb9090,canname=lscc:1.0.4 +[30d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[30e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[30f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[310 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message TRANSACTION +[311 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[312 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[313 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event TRANSACTION +[314 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message TRANSACTION +[315 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[316 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[317 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message TRANSACTION +[318 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message TRANSACTION from shim +[319 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[31a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bb4adfec]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[31b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.getCCInstance.GetState.handleGetState -> DEBU [bb4adfec]Sending GET_STATE +[31c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message GET_STATE from shim +[31d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[31e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [bb4adfec]Received GET_STATE, invoking get state from ledger +[320 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec] getting state for chaincode lscc, key mycc, channel businesschannel +[321 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[322 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]No state associated with key: mycc. Sending RESPONSE with an empty payload +[323 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]handleGetState serial send RESPONSE +[324 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message RESPONSE from shim +[325 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[326 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]before send +[327 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]after send +[328 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [bb4adfec]Received RESPONSE, communicated (state:ready) +[329 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.getCCInstance.GetState.handleGetState -> DEBU [bb4adfec]GetState received payload RESPONSE +[32a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Inside putstate +[31f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[32b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Sending PUT_STATE +[32c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[32d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[32e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[32f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[330 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[331 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[332 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[333 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[334 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[335 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[336 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message RESPONSE from shim +[337 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[338 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]before send +[339 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]after send +[33a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [bb4adfec]Received RESPONSE, communicated (state:ready) +[33b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Received RESPONSE. Successfully updated state +[33c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Transaction completed. Sending COMPLETED +[33d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Move state message COMPLETED +[33e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[33f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]send state message COMPLETED +[340 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[341 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[342 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[343 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[344 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[345 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=false,proposal=0xc421bb9090,canname=mycc:1.0 +[346 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU launchAndWaitForRegister fetched 1818 bytes from file system +[347 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode mycc:1.0 is being launched +[348 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[349 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[34a 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container: mycc:1.0(networkid:dev,peerid:peer0.org1.example.com) +[34b 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[34c 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=mycc:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[34d 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(dev-peer0.org1.example.com-mycc-1.0) lock +[34e 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (dev-peer0.org1.example.com-mycc-1.0) lock +[34f 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Cleanup container dev-peer0.org1.example.com-mycc-1.0 +[350 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Stop container dev-peer0.org1.example.com-mycc-1.0(No such container: dev-peer0.org1.example.com-mycc-1.0) +[351 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Kill container dev-peer0.org1.example.com-mycc-1.0 (No such container: dev-peer0.org1.example.com-mycc-1.0) +[352 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Remove container dev-peer0.org1.example.com-mycc-1.0 (No such container: dev-peer0.org1.example.com-mycc-1.0) +[353 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Start container dev-peer0.org1.example.com-mycc-1.0 +[354 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer.getDockerHostConfig -> DEBU docker container hostconfig NetworkMode: 104_default +[355 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Create container: dev-peer0.org1.example.com-mycc-1.0 +[356 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU start-could not find image (container id ), because of ...attempt to recreate image +[357 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/chaincode/platforms] do.do.Start.func1.GenerateDockerBuild.generateDockerfile -> DEBU +FROM hyperledger/fabric-baseos:x86_64-0.3.2 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="mycc" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.0.4" \ + org.hyperledger.fabric.base.version="0.3.2" +ENV CORE_CHAINCODE_BUILDLEVEL=1.0.4 +ENV CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +COPY peer.crt /etc/hyperledger/fabric/peer.crt +[358 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/chaincode/platforms/util] generateDockerBuild.GenerateDockerBuild.DockerBuild -> DEBU Attempting build with image hyperledger/fabric-ccenv:x86_64-1.0.4 +[359 12-05 07:29:49.61 UTC] [github.com/hyperledger/fabric/core/deliverservice] leaderElection.beLeader.func1.StartDeliverForChannel -> DEBU This peer will pass blocks from orderer service to other peers for channel businesschannel +[35a 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect -> DEBU Connected to orderer.example.com:7050 +[35b 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect -> DEBU Establishing gRPC stream with orderer.example.com:7050 ... +[35c 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect -> DEBU Entering +[35d 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect.func1.RequestBlocks -> DEBU Starting deliver with block [1] for channel businesschannel +[35e 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect -> DEBU Exiting +[35f 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.deployImage -> DEBU Created image: dev-peer0.org1.example.com-mycc-1.0-384f11f484b9302df90b453200cfb25174305fce8f53f4e94d45ee3b6cab0ce9 +[360 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU start-recreated image successfully +[361 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Create container: dev-peer0.org1.example.com-mycc-1.0 +[362 12-05 07:30:05.09 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Created container: dev-peer0.org1.example.com-mycc-1.0-384f11f484b9302df90b453200cfb25174305fce8f53f4e94d45ee3b6cab0ce9 +[363 12-05 07:30:05.48 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Started container dev-peer0.org1.example.com-mycc-1.0 +[364 12-05 07:30:05.48 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(dev-peer0.org1.example.com-mycc-1.0) +[365 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[366 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[367 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[368 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[369 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode mycc:1.0 +[36a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"mycc:1.0" , sending back REGISTERED +[36b 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[36c 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode mycc:1.0 launch seq completed +[36d 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready -> DEBU sending READY +[36e 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[36f 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[370 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message READY +[371 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: READY in state established +[372 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [bb4adfec]Entered state ready +[373 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[374 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message READY +[375 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU sending init completed +[376 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU LaunchChaincode complete +[377 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU Entry +[378 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[379 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message INIT +[37a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[37b 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[37c 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event INIT +[37d 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message INIT +[37e 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[37f 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[380 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message INIT +[381 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[382 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[383 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[384 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[385 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[386 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[387 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[388 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[389 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[38a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[38b 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[38c 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[38d 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[38e 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[38f 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[390 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[391 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[392 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[393 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[394 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[395 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[396 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[397 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[398 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[399 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU Exit +[39a 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[39b 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[39c 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [8167ca4f-2917-497f-bf3d-de91e667f803] +[39d 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[39e 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel chaincode id: name:"lscc" +[39f 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[3a0 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel version: 1.0.4 +[3a1 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=true,proposal=0xc421bb9090,canname=escc:1.0.4 +[3a2 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[3a3 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[3a4 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[3a5 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message TRANSACTION +[3a6 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[3a7 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[3a8 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event TRANSACTION +[3a9 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message TRANSACTION +[3aa 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[3ab 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[3ac 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message TRANSACTION +[3ad 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message TRANSACTION from shim +[3ae 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[3af 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bb4adfec]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[3b0 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[3b1 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[3b2 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Transaction completed. Sending COMPLETED +[3b3 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Move state message COMPLETED +[3b4 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[3b5 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]send state message COMPLETED +[3b6 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[3b7 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[3b8 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[3b9 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[3ba 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[3bb 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[3bc 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[3bd 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [8167ca4f-2917-497f-bf3d-de91e667f803] +[3be 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[3bf 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [1], peers number [1] +[3c0 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [1], peers number [1] +[3c1 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[3c2 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[3c3 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[3c4 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc421623710 +[3c5 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\352\225\231\321\005\020\254\227\263\210\002\"\017businesschannel*@bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----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\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030\304\0254\214\263\227?\006\tC\313k.\361\207\000\215\t\024\220K\257\315Z" +[3c6 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[3c7 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[3c8 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[3c9 12-05 07:30:07.58 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[3ca 12-05 07:30:07.59 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[3cb 12-05 07:30:07.59 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc42165ea80, header channel_header:"\010\003\032\014\010\352\225\231\321\005\020\254\227\263\210\002\"\017businesschannel*@bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----\nMIICGTCCAcCgAwIBAgIRAJ2fVqGC32XC5QpgYsmvYxEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTcxMjAxMTM1NzE5WhcNMjcxMTI5MTM1NzE5\nWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZ\nMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGUuRHqQywQQQiwBw/px51OzDqFxOPs5\nTnZn/BmMlSxx0TY08lymYLrbgJTnZnQEm2FBjKIhXnYfiKyISkhGfA+jTTBLMA4G\nA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIHo42ePp018h\nd8YtbSiNwy/FcpR/rz5BBTi5oEUuoav4MAoGCCqGSM49BAMCA0cAMEQCIAKwtEBA\nfiVJNh1LZ9FQvBXAkaIfhZRcnm92VIPDg7cYAiAU7xMJG90eDj2BSIib/R7QNkFx\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030\304\0254\214\263\227?\006\tC\313k.\361\207\000\215\t\024\220K\257\315Z" +[3cc 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[3cd 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[3ce 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[3cf 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[3d0 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] +[3d1 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[3d2 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[3d3 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [a8072a34-1069-4f19-80ad-4721ff18c010] +[3d4 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=a833999c-9788-44be-aa79-6d58d2e0d3c2,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[3d5 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb chaindID businesschannel +[3d6 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[3d7 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[3d8 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[3d9 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [a833999c]Inside sendExecuteMessage. Message TRANSACTION +[3da 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[3db 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [a833999c]sendExecuteMsg trigger event TRANSACTION +[3dc 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]Move state message TRANSACTION +[3dd 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[3de 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[3df 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]sending state message TRANSACTION +[3e0 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Received message TRANSACTION from shim +[3e1 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a833999c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[3e2 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [a833999c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[3e3 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[3e4 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[3e5 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC info: doing special validation for LSCC +[3e6 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[3e7 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[3e8 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Namespace lscc +[3e9 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetQueryExecutorForLedger.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [b8ec976a-233a-48a5-b071-9a1f82b95726] +[3ea 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[3eb 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.Done -> DEBU Done with transaction simulation / query execution [b8ec976a-233a-48a5-b071-9a1f82b95726] +[3ec 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Validating deploy for cc mycc version 1.0 +[3ed 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation.checkInstantiationPolicy -> DEBU VSCC info: checkInstantiationPolicy starts, policy is &cauthdsl.policy{evaluator:(func([]*common.SignedData, []bool) bool)(0x954570)} +[3ee 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[3ef 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Transaction completed. Sending COMPLETED +[3f0 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Move state message COMPLETED +[3f1 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a833999c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[3f2 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]send state message COMPLETED +[3f3 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]Received message COMPLETED from shim +[3f4 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[3f5 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c-9788-44be-aa79-6d58d2e0d3c2]HandleMessage- COMPLETED. Notify +[3f6 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:a833999c-9788-44be-aa79-6d58d2e0d3c2 +[3f7 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[3f8 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [a8072a34-1069-4f19-80ad-4721ff18c010] +[3f9 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[3fa 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[3fb 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc421586280), Data:(*common.BlockData)(0xc421a96a40), Metadata:(*common.BlockMetadata)(0xc421a96a80)}, doMVCCValidation=true +[3fc 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[3fd 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[3fe 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [1] Transaction index [0] TxId [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] marked as valid by state validator +[3ff 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xf4, 0x6f, 0x6e, 0xab, 0xc2, 0x16, 0xcc, 0x19, 0xce, 0x35, 0xf2, 0xd1, 0x24, 0x18, 0x27, 0xf2, 0xf2, 0x3a, 0x7f, 0x1b, 0x75, 0x2, 0x65, 0x19, 0x46, 0x4e, 0x41, 0x5f, 0xaa, 0xec, 0x69, 0xe2} txOffsets= +txId=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb locPointer=offset=70, bytesLength=3389 +] +[400 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=12015, bytesLength=3389] for tx ID: [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] to index +[401 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=12015, bytesLength=3389] for tx number:[0] ID: [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] to blockNumTranNum index +[402 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[17162], isChainEmpty=[false], lastBlockNumber=[1] +[403 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [1] with 1 transaction(s) +[404 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[405 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[406 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x6d, 0x79, 0x63, 0x63}] +[407 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[408 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[409 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[40a 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[40b 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[40c 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[40d 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [1] contains transaction id: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[40e 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [1] +[40f 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[410 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[411 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[412 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[413 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[414 12-05 07:30:23.86 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [2], peers number [1] +[416 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[415 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [2], peers number [1] +[417 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[418 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[419 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc4224e6000 +[41a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\375\225\231\321\005\020\214\274\276\305\002\"\017businesschannel*@74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\246\362\213'\253\030~\332\264n\307'_\362\231\r\225\324\245\240\032\247N\240" +[41b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[41c 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[41d 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org2MSP 4e712ad34f75c75845d706cd650231032af5f4450097cd3cdb64dfe19731dcbe} +[41e 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[41f 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[420 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc42024aa80, header channel_header:"\010\003\032\014\010\375\225\231\321\005\020\214\274\276\305\002\"\017businesschannel*@74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----\nMIICGTCCAb+gAwIBAgIQH+2gkHQVSYGwHNmdjVW1rjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MjBaFw0yNzExMjkxMzU3MjBa\nMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmcyLmV4YW1wbGUuY29tMFkw\nEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET/+qXCi/uacyRNUXz+LFWiWkzfYbic4W\nymEpJzPNA+mwjJOFuDF7uqVkTf+zGBgb6Ih8L1kEe5La3B+Kun2HsqNNMEswDgYD\nVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgTF1STg1Ne6+W\nG94Eyv+QtAEu1mY6RxelTc3xwanTyvwwCgYIKoZIzj0EAwIDSAAwRQIhANVALHka\nBTD5RPSYY6ZFBlmnRvO6KyjuKqY5Dfg7TgdNAiA5RfzGkLcrXN/06xg4uHAvgSdb\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\246\362\213'\253\030~\332\264n\307'_\362\231\r\225\324\245\240\032\247N\240" +[421 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[422 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[423 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[424 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[425 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] +[426 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[427 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[428 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [9e5f2d6c-0530-444e-bc7b-e1dd5089ecbb] +[429 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=124797f0-c7b3-4575-b011-470e185a7de7,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[42a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 chaindID businesschannel +[42b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[42c 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[42d 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[42e 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [124797f0]Inside sendExecuteMessage. Message TRANSACTION +[42f 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[430 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [124797f0]sendExecuteMsg trigger event TRANSACTION +[431 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]Move state message TRANSACTION +[432 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[433 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[434 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]sending state message TRANSACTION +[435 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Received message TRANSACTION from shim +[436 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [124797f0]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[437 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [124797f0]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[438 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[439 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[43a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC info: doing special validation for LSCC +[43b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[43c 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[43d 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Namespace lscc +[43e 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetQueryExecutorForLedger.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [fb53e3af-c795-4e0b-8061-32461d647b31] +[43f 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[440 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.Done -> DEBU Done with transaction simulation / query execution [fb53e3af-c795-4e0b-8061-32461d647b31] +[441 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Validating deploy for cc mycc version 1.0 +[442 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation.checkInstantiationPolicy -> DEBU VSCC info: checkInstantiationPolicy starts, policy is &cauthdsl.policy{evaluator:(func([]*common.SignedData, []bool) bool)(0x954570)} +[443 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> ERRO VSCC error: ValidateLSCCInvocation failed, err Chaincode mycc is already instantiated +[444 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Transaction completed. Sending COMPLETED +[445 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Move state message COMPLETED +[446 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [124797f0]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[447 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]send state message COMPLETED +[448 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]Received message COMPLETED from shim +[449 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[44a 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0-c7b3-4575-b011-470e185a7de7]HandleMessage- COMPLETED. Notify +[44b 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:124797f0-c7b3-4575-b011-470e185a7de7 +[44c 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[44d 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> ERRO VSCC check failed for transaction txid=74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4, error Chaincode mycc is already instantiated +[44e 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [9e5f2d6c-0530-444e-bc7b-e1dd5089ecbb] +[44f 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> ERRO VSCCValidateTx for transaction txId = 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 returned error Chaincode mycc is already instantiated +[450 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[451 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[452 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc42237ae00), Data:(*common.BlockData)(0xc4224e2000), Metadata:(*common.BlockMetadata)(0xc4224e2040)}, doMVCCValidation=true +[453 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[454 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> WARN Block [2] Transaction index [0] marked as invalid by committer. Reason code [10] +[455 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xb3, 0xd6, 0xd5, 0x31, 0x73, 0xa, 0x8b, 0x30, 0x6e, 0x34, 0x46, 0xd2, 0xa6, 0x50, 0xbb, 0xb1, 0xd8, 0xc9, 0x3a, 0xbe, 0x77, 0xd6, 0x28, 0x7c, 0xed, 0x47, 0x66, 0x4, 0x54, 0xbc, 0xa4, 0x1b} txOffsets= +txId=74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 locPointer=offset=70, bytesLength=3387 +] +[456 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=17232, bytesLength=3387] for tx ID: [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] to index +[457 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=17232, bytesLength=3387] for tx number:[0] ID: [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] to blockNumTranNum index +[458 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22375], isChainEmpty=[false], lastBlockNumber=[2] +[459 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [2] with 1 transaction(s) +[45a 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[45b 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[45c 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[45d 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[45e 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Skipping history write for invalid transaction number 0 +[45f 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[460 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[461 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [2] contains transaction id: 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 +[462 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [2] +[463 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[464 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[465 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[466 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[467 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[468 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[469 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424a77e30 +[46a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[46b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[46c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[46d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[46e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[46f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a7d5e0, header 0xc424a77e60 +[470 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[471 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[472 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] +[473 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[474 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [711daa80-1389-4030-8ece-df6ae5d1c629] +[475 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel +[476 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=true,proposal=0xc424a7d5e0,canname=lscc:1.0.4 +[477 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[478 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[479 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[47a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[47b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[47c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[47d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[47e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[47f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[480 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[481 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[482 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message TRANSACTION from shim +[483 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[484 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [b108583e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[485 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [b108583e]Sending GET_STATE +[486 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[487 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[488 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[489 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[48a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode lscc, key mycc, channel businesschannel +[48b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[48c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[48d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[48e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message RESPONSE from shim +[48f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[490 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [b108583e]before send +[491 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [b108583e]after send +[492 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [b108583e]Received RESPONSE, communicated (state:ready) +[493 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [b108583e]GetState received payload RESPONSE +[494 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Transaction completed. Sending COMPLETED +[495 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Move state message COMPLETED +[496 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[497 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]send state message COMPLETED +[498 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[499 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[49a 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[49b 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[49c 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[49d 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[49e 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel version: 1.0 +[49f 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=false,proposal=0xc424a7d5e0,canname=mycc:1.0 +[4a0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[4a1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[4a2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[4a3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[4a4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[4a5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[4a6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[4a7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[4a8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[4a9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4aa 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[4ab 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[4ac 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[4ad 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[4af 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode mycc, key a, channel businesschannel +[4b0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[4b1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[4b2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[4ae 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4b3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[4b4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[4b5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[4b6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4b7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode mycc, key b, channel businesschannel +[4b8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=b +[4b9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[4ba 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[4bb 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message PUT_STATE from shim +[4bc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[4bd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4be 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]state is ready +[4bf 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Completed PUT_STATE. Sending RESPONSE +[4c0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]enterBusyState trigger event RESPONSE +[4c1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message RESPONSE +[4c2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[4c3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4c4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message RESPONSE +[4c5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message PUT_STATE from shim +[4c6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[4c7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4c8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]state is ready +[4c9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Completed PUT_STATE. Sending RESPONSE +[4ca 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]enterBusyState trigger event RESPONSE +[4cb 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message RESPONSE +[4cc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[4cd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4ce 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message RESPONSE +[4cf 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[4d0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[4d1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[4d2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[4d3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[4d4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[4d5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[4d6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [711daa80-1389-4030-8ece-df6ae5d1c629] +[4d7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[4d8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel chaincode id: name:"mycc" +[4d9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[4da 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel version: 1.0.4 +[4db 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=true,proposal=0xc424a7d5e0,canname=escc:1.0.4 +[4dc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[4dd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[4de 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[4df 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[4e0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[4e1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[4e2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[4e3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[4e4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[4e5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4e6 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[4e7 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message TRANSACTION from shim +[4e8 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[4e9 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [b108583e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[4ea 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[4eb 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[4ec 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Transaction completed. Sending COMPLETED +[4ed 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Move state message COMPLETED +[4ee 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[4ef 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]send state message COMPLETED +[4f0 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[4f1 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[4f2 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[4f3 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[4f4 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[4f5 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[4f6 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[4f7 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [711daa80-1389-4030-8ece-df6ae5d1c629] +[4f8 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[4f9 12-05 07:30:44.85 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [3], peers number [1] +[4fa 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [3], peers number [1] +[4fb 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[4fc 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[4fd 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[4fe 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc424d5ced0 +[4ff 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\242\226\231\321\005\020\310\266\206\375\002\"\017businesschannel*@b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----\nMIICGTCCAcCgAwIBAgIRAJ2fVqGC32XC5QpgYsmvYxEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTcxMjAxMTM1NzE5WhcNMjcxMTI5MTM1NzE5\nWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZ\nMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGUuRHqQywQQQiwBw/px51OzDqFxOPs5\nTnZn/BmMlSxx0TY08lymYLrbgJTnZnQEm2FBjKIhXnYfiKyISkhGfA+jTTBLMA4G\nA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIHo42ePp018h\nd8YtbSiNwy/FcpR/rz5BBTi5oEUuoav4MAoGCCqGSM49BAMCA0cAMEQCIAKwtEBA\nfiVJNh1LZ9FQvBXAkaIfhZRcnm92VIPDg7cYAiAU7xMJG90eDj2BSIib/R7QNkFx\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030C\177D:@\244\305z\336\2571%\320\223\3406H\2049\345\253\367\251\311" +[500 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[501 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[502 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[503 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[504 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[505 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc424b6d000, header channel_header:"\010\003\032\014\010\242\226\231\321\005\020\310\266\206\375\002\"\017businesschannel*@b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----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\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030C\177D:@\244\305z\336\2571%\320\223\3406H\2049\345\253\367\251\311" +[506 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[507 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[508 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[509 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[50a 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] +[50b 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[50c 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [c9f2e5d0-6685-48d6-9f24-1026b15224bc] +[50d 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[50e 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.Done -> DEBU Done with transaction simulation / query execution [c9f2e5d0-6685-48d6-9f24-1026b15224bc] +[50f 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[510 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [6eea44f0-ea6c-419b-952d-29a92c96e276] +[511 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=bfb08cca-0245-4a76-ae44-c81abcb03f45,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[512 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 chaindID businesschannel +[513 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[514 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[515 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[516 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bfb08cca]Inside sendExecuteMessage. Message TRANSACTION +[517 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[518 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bfb08cca]sendExecuteMsg trigger event TRANSACTION +[519 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]Move state message TRANSACTION +[51a 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[51b 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[51c 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]sending state message TRANSACTION +[51d 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Received message TRANSACTION from shim +[51e 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bfb08cca]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[51f 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bfb08cca]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[520 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[521 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[522 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[523 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Transaction completed. Sending COMPLETED +[524 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Move state message COMPLETED +[525 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bfb08cca]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[526 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]send state message COMPLETED +[527 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]Received message COMPLETED from shim +[528 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[529 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca-0245-4a76-ae44-c81abcb03f45]HandleMessage- COMPLETED. Notify +[52a 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bfb08cca-0245-4a76-ae44-c81abcb03f45 +[52b 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[52c 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [6eea44f0-ea6c-419b-952d-29a92c96e276] +[52d 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[52e 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[52f 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc424d62280), Data:(*common.BlockData)(0xc424d82020), Metadata:(*common.BlockMetadata)(0xc424d82060)}, doMVCCValidation=true +[530 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[531 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[532 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=a +[533 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=b +[534 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [3] Transaction index [0] TxId [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] marked as valid by state validator +[535 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xae, 0xfc, 0x62, 0xed, 0x8f, 0x6e, 0x9d, 0x4c, 0x39, 0xc9, 0x3b, 0xa2, 0x34, 0x61, 0x77, 0x99, 0x41, 0x4e, 0x6c, 0xcc, 0xa1, 0xe5, 0xff, 0x96, 0x8a, 0x7c, 0x97, 0xdf, 0x86, 0x47, 0x62, 0x27} txOffsets= +txId=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 locPointer=offset=70, bytesLength=2849 +] +[536 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=22445, bytesLength=2849] for tx ID: [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] to index +[537 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=22445, bytesLength=2849] for tx number:[0] ID: [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] to blockNumTranNum index +[538 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[27051], isChainEmpty=[false], lastBlockNumber=[3] +[539 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [3] with 1 transaction(s) +[53a 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[53b 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[53c 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[53d 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[53e 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[53f 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[540 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[541 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[542 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [3] contains transaction id: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[543 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [3] +[544 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[545 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[546 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[547 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[548 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[549 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[54a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421b83800 +[54b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[54c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[54d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[54e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[54f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[550 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421b796d0, header 0xc421b83830 +[551 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[552 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[553 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd] +[554 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[555 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [fa67ca22-37f4-4d44-b15e-83723c98808d] +[556 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel +[557 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=true,proposal=0xc421b796d0,canname=lscc:1.0.4 +[558 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[559 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[55a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[55b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[55c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[55d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[55e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[55f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[560 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[561 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[562 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[563 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message TRANSACTION from shim +[564 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[565 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c8cc8373]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[566 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [c8cc8373]Sending GET_STATE +[567 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message GET_STATE from shim +[568 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[569 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [c8cc8373]Received GET_STATE, invoking get state from ledger +[56a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[56b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373] getting state for chaincode lscc, key mycc, channel businesschannel +[56c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[56d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373]Got state. Sending RESPONSE +[56e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c8cc8373]handleGetState serial send RESPONSE +[56f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message RESPONSE from shim +[570 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[571 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c8cc8373]before send +[572 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c8cc8373]after send +[573 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c8cc8373]Received RESPONSE, communicated (state:ready) +[574 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [c8cc8373]GetState received payload RESPONSE +[575 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Transaction completed. Sending COMPLETED +[576 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Move state message COMPLETED +[577 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[578 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]send state message COMPLETED +[579 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[57a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[57b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[57c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[57d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[57e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[57f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel version: 1.0 +[580 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=false,proposal=0xc421b796d0,canname=mycc:1.0 +[581 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[582 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[583 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[584 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[585 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[586 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[587 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[588 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[589 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[58a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[58b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[58c 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message GET_STATE from shim +[58d 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[58e 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [c8cc8373]Received GET_STATE, invoking get state from ledger +[58f 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[590 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373] getting state for chaincode mycc, key a, channel businesschannel +[591 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[592 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373]Got state. Sending RESPONSE +[593 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c8cc8373]handleGetState serial send RESPONSE +[594 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[595 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[596 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[597 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[598 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[599 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[59a 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[59b 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [fa67ca22-37f4-4d44-b15e-83723c98808d] +[59c 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[59d 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel chaincode id: name:"mycc" +[59e 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[59f 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel version: 1.0.4 +[5a0 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=true,proposal=0xc421b796d0,canname=escc:1.0.4 +[5a1 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[5a2 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[5a3 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[5a4 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[5a5 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[5a6 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[5a7 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[5a8 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[5a9 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[5aa 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[5ab 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[5ac 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message TRANSACTION from shim +[5ad 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[5ae 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c8cc8373]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[5af 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[5b0 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[5b1 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Transaction completed. Sending COMPLETED +[5b2 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Move state message COMPLETED +[5b3 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[5b4 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]send state message COMPLETED +[5b5 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[5b6 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[5b7 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[5b8 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[5b9 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[5ba 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[5bb 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[5bc 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [fa67ca22-37f4-4d44-b15e-83723c98808d] +[5bd 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[5be 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [4], peers number [1] +[5bf 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [4], peers number [1] +[5c0 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[5c1 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[5c2 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[5c3 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc421ece360 +[5c4 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\274\226\231\321\005\020\324\327\221\227\001\"\017businesschannel*@4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\tP\036\260gY7\367\205\207P\360\016\324u\222\213\372]\036\035\005\261\313" +[5c5 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[5c6 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[5c7 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org2MSP 4e712ad34f75c75845d706cd650231032af5f4450097cd3cdb64dfe19731dcbe} +[5c8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[5c9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[5ca 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc421608000, header channel_header:"\010\003\032\014\010\274\226\231\321\005\020\324\327\221\227\001\"\017businesschannel*@4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\tP\036\260gY7\367\205\207P\360\016\324u\222\213\372]\036\035\005\261\313" +[5cb 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[5cc 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[5cd 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[5ce 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[5cf 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] +[5d0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[5d1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [decf1f82-f6be-4aa2-bef9-e3c79a7e3739] +[5d2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[5d3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.Done -> DEBU Done with transaction simulation / query execution [decf1f82-f6be-4aa2-bef9-e3c79a7e3739] +[5d4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[5d5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [f677798c-50d1-48ea-95b5-fb37cae38189] +[5d6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=555df838-14bd-42c3-9035-6f665feb5aba,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[5d7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid 4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 chaindID businesschannel +[5d8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[5d9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[5da 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[5db 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [555df838]Inside sendExecuteMessage. Message TRANSACTION +[5dc 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[5dd 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [555df838]sendExecuteMsg trigger event TRANSACTION +[5de 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]Move state message TRANSACTION +[5df 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[5e0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[5e1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]sending state message TRANSACTION +[5e2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Received message TRANSACTION from shim +[5e3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [555df838]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[5e4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [555df838]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[5e5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[5e6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[5e7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[5e8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Transaction completed. Sending COMPLETED +[5e9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Move state message COMPLETED +[5ea 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [555df838]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[5eb 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]send state message COMPLETED +[5ec 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]Received message COMPLETED from shim +[5ed 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[5ee 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838-14bd-42c3-9035-6f665feb5aba]HandleMessage- COMPLETED. Notify +[5ef 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:555df838-14bd-42c3-9035-6f665feb5aba +[5f0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[5f1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [f677798c-50d1-48ea-95b5-fb37cae38189] +[5f2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[5f3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[5f4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc4249597c0), Data:(*common.BlockData)(0xc421ed0880), Metadata:(*common.BlockMetadata)(0xc421ed08c0)}, doMVCCValidation=true +[5f5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[5f6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[5f7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=a +[5f8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=b +[5f9 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [4] Transaction index [0] TxId [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] marked as valid by state validator +[5fa 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x64, 0xa3, 0xcc, 0x55, 0x10, 0x3d, 0x9b, 0x60, 0x6f, 0x36, 0xb2, 0xd5, 0x1b, 0xdd, 0x2e, 0xff, 0x58, 0x0, 0xf2, 0x4, 0x7d, 0x6f, 0xe4, 0x7, 0x53, 0x24, 0x4f, 0x76, 0x2, 0xf1, 0x2b, 0x64} txOffsets= +txId=4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 locPointer=offset=70, bytesLength=2849 +] +[5fb 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=27121, bytesLength=2849] for tx ID: [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] to index +[5fc 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=27121, bytesLength=2849] for tx number:[0] ID: [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] to blockNumTranNum index +[5fd 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[31728], isChainEmpty=[false], lastBlockNumber=[4] +[5fe 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [4] with 1 transaction(s) +[5ff 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[600 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[601 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[602 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[603 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[604 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[605 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[606 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[607 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [4] contains transaction id: 4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 +[608 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [4] +[609 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[60a 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[60b 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[60c 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[60d 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[60e 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[60f 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424d5cc60 +[610 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[611 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[612 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[613 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[614 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[615 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424b36410, header 0xc424d5cc90 +[616 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[617 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[618 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d] +[619 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[61a 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[61b 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel +[61c 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=true,proposal=0xc424b36410,canname=lscc:1.0.4 +[61d 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[61e 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[61f 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[620 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[621 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[622 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[623 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[624 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[625 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[626 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[627 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[628 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message TRANSACTION from shim +[629 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[62a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [6ca9040c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[62b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [6ca9040c]Sending GET_STATE +[62c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message GET_STATE from shim +[62d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[62e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [6ca9040c]Received GET_STATE, invoking get state from ledger +[62f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[630 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c] getting state for chaincode lscc, key mycc, channel businesschannel +[631 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[632 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c]Got state. Sending RESPONSE +[633 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [6ca9040c]handleGetState serial send RESPONSE +[634 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message RESPONSE from shim +[635 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[636 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [6ca9040c]before send +[637 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [6ca9040c]after send +[638 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [6ca9040c]Received RESPONSE, communicated (state:ready) +[639 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [6ca9040c]GetState received payload RESPONSE +[63a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Transaction completed. Sending COMPLETED +[63b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Move state message COMPLETED +[63c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[63d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]send state message COMPLETED +[63e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[63f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[640 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[641 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[642 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[643 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[644 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel version: 1.0 +[645 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=false,proposal=0xc424b36410,canname=mycc:1.0 +[646 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[647 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[648 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[649 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[64a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[64b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[64c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[64d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[64e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[64f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[650 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[651 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message GET_STATE from shim +[652 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[653 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [6ca9040c]Received GET_STATE, invoking get state from ledger +[654 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[655 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c] getting state for chaincode mycc, key a, channel businesschannel +[656 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[657 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c]Got state. Sending RESPONSE +[658 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [6ca9040c]handleGetState serial send RESPONSE +[659 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[65a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[65b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[65c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[65d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[65e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[65f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[660 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[661 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[662 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel chaincode id: name:"mycc" +[663 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[664 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel version: 1.0.4 +[665 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=true,proposal=0xc424b36410,canname=escc:1.0.4 +[666 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[667 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[668 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[669 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[66a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[66b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[66c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[66d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[66e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[66f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[670 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[671 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message TRANSACTION from shim +[672 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[673 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [6ca9040c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[674 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[675 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[676 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Transaction completed. Sending COMPLETED +[677 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Move state message COMPLETED +[678 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[679 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]send state message COMPLETED +[67a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[67b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[67c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[67d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[67e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[67f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[680 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[681 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[682 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[683 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[684 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421ce22a0 +[685 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[686 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[687 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[688 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[689 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[68a 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc42233bae0, header 0xc421ce22d0 +[68b 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[68c 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[68d 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5] +[68e 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[68f 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [14030388-1b5d-42fb-9342-ea052c545267] +[690 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel +[691 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel version: 1.0.4 +[692 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5,syscc=true,proposal=0xc42233bae0,canname=lscc:1.0.4 +[693 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[694 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[695 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[696 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]Inside sendExecuteMessage. Message TRANSACTION +[697 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[698 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[699 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]sendExecuteMsg trigger event TRANSACTION +[69a 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Move state message TRANSACTION +[69b 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[69c 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[69d 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]sending state message TRANSACTION +[69e 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message TRANSACTION from shim +[69f 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6a0 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [7990219e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6a1 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [7990219e]Sending GET_STATE +[6a2 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message GET_STATE from shim +[6a3 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[6a4 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [7990219e]Received GET_STATE, invoking get state from ledger +[6a5 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6a6 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [7990219e] getting state for chaincode lscc, key mycc, channel businesschannel +[6a7 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[6a8 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [7990219e]Got state. Sending RESPONSE +[6a9 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [7990219e]handleGetState serial send RESPONSE +[6aa 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message RESPONSE from shim +[6ab 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[6ac 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [7990219e]before send +[6ae 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [7990219e]GetState received payload RESPONSE +[6ad 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [7990219e]after send +[6af 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [7990219e]Received RESPONSE, communicated (state:ready) +[6b0 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Transaction completed. Sending COMPLETED +[6b1 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Move state message COMPLETED +[6b2 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[6b3 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]send state message COMPLETED +[6b4 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message COMPLETED from shim +[6b5 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[6b6 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5]HandleMessage- COMPLETED. Notify +[6b7 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[6b8 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[6b9 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[6ba 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[6bb 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [14030388-1b5d-42fb-9342-ea052c545267] +[6bc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[6bd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel chaincode id: name:"lscc" +[6be 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[6bf 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel version: 1.0.4 +[6c0 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5,syscc=true,proposal=0xc42233bae0,canname=escc:1.0.4 +[6c1 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[6c2 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[6c3 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[6c4 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]Inside sendExecuteMessage. Message TRANSACTION +[6c5 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[6c6 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[6c7 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]sendExecuteMsg trigger event TRANSACTION +[6c8 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Move state message TRANSACTION +[6c9 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[6ca 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6cb 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]sending state message TRANSACTION +[6cc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message TRANSACTION from shim +[6cd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6ce 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [7990219e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6cf 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[6d0 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[6d1 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Transaction completed. Sending COMPLETED +[6d2 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Move state message COMPLETED +[6d3 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[6d4 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]send state message COMPLETED +[6d5 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message COMPLETED from shim +[6d6 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[6d7 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5]HandleMessage- COMPLETED. Notify +[6d8 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[6d9 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[6da 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[6db 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[6dc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [14030388-1b5d-42fb-9342-ea052c545267] +[6dd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[6de 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[6df 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421c79b30 +[6e0 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[6e1 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[6e2 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[6e3 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[6e4 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[6e5 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a454f0, header 0xc421c79b60 +[6e6 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[6e7 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[6e8 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c] +[6e9 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[6ea 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[6eb 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel +[6ec 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel version: 1.0.4 +[6ed 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c,syscc=true,proposal=0xc424a454f0,canname=lscc:1.0.4 +[6ee 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[6ef 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[6f0 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[6f1 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]Inside sendExecuteMessage. Message TRANSACTION +[6f2 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[6f3 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[6f4 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]sendExecuteMsg trigger event TRANSACTION +[6f5 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Move state message TRANSACTION +[6f6 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[6f7 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6f8 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]sending state message TRANSACTION +[6f9 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message TRANSACTION from shim +[6fa 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6fb 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0c44f7a5]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6fc 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0c44f7a5]Sending GET_STATE +[6fd 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message GET_STATE from shim +[6fe 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[6ff 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [0c44f7a5]Received GET_STATE, invoking get state from ledger +[700 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0c44f7a5] getting state for chaincode lscc, key mycc, channel businesschannel +[701 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[702 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0c44f7a5]Got state. Sending RESPONSE +[703 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [0c44f7a5]handleGetState serial send RESPONSE +[704 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message RESPONSE from shim +[705 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[706 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0c44f7a5]before send +[707 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0c44f7a5]after send +[708 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [0c44f7a5]Received RESPONSE, communicated (state:ready) +[709 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0c44f7a5]GetState received payload RESPONSE +[70a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Transaction completed. Sending COMPLETED +[70b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Move state message COMPLETED +[70c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[70d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]send state message COMPLETED +[70e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[70f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message COMPLETED from shim +[710 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[711 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c]HandleMessage- COMPLETED. Notify +[712 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[713 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[714 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[715 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[716 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[717 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[718 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel chaincode id: name:"lscc" +[719 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[71a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel version: 1.0.4 +[71b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c,syscc=true,proposal=0xc424a454f0,canname=escc:1.0.4 +[71c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[71d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[71e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[71f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]Inside sendExecuteMessage. Message TRANSACTION +[720 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[721 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[722 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]sendExecuteMsg trigger event TRANSACTION +[723 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Move state message TRANSACTION +[724 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[725 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[726 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]sending state message TRANSACTION +[727 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message TRANSACTION from shim +[728 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[729 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0c44f7a5]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[72a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[72b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[72c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Transaction completed. Sending COMPLETED +[72d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Move state message COMPLETED +[72e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[72f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]send state message COMPLETED +[730 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message COMPLETED from shim +[731 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[732 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c]HandleMessage- COMPLETED. Notify +[733 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[734 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[735 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[736 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[737 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[738 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[739 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[73a 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421d0a2d0 +[73b 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[73c 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[73d 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[73e 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[73f 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[740 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a10f00, header 0xc421d0a300 +[741 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[742 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[743 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284] +[744 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[745 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [313fa3e2-259d-4445-95c3-022062a81146] +[746 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel +[747 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel version: 1.0.4 +[748 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284,syscc=true,proposal=0xc424a10f00,canname=lscc:1.0.4 +[749 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[74a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[74b 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[74c 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]Inside sendExecuteMessage. Message TRANSACTION +[74d 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[74e 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[74f 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]sendExecuteMsg trigger event TRANSACTION +[750 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Move state message TRANSACTION +[751 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[752 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[753 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]sending state message TRANSACTION +[754 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message TRANSACTION from shim +[755 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[756 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0b41eb23]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[757 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0b41eb23]Sending GET_STATE +[758 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message GET_STATE from shim +[759 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[75a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [0b41eb23]Received GET_STATE, invoking get state from ledger +[75b 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[75c 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0b41eb23] getting state for chaincode lscc, key mycc, channel businesschannel +[75d 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[75e 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0b41eb23]Got state. Sending RESPONSE +[75f 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [0b41eb23]handleGetState serial send RESPONSE +[760 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message RESPONSE from shim +[761 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[762 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0b41eb23]before send +[763 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0b41eb23]after send +[764 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [0b41eb23]Received RESPONSE, communicated (state:ready) +[765 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0b41eb23]GetState received payload RESPONSE +[766 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Transaction completed. Sending COMPLETED +[767 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Move state message COMPLETED +[768 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[769 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]send state message COMPLETED +[76a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message COMPLETED from shim +[76b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[76c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284]HandleMessage- COMPLETED. Notify +[76d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[76e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[76f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[770 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[771 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [313fa3e2-259d-4445-95c3-022062a81146] +[772 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[773 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel chaincode id: name:"lscc" +[774 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[775 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel version: 1.0.4 +[776 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284,syscc=true,proposal=0xc424a10f00,canname=escc:1.0.4 +[777 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[778 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[779 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[77a 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]Inside sendExecuteMessage. Message TRANSACTION +[77b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[77c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[77d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]sendExecuteMsg trigger event TRANSACTION +[77e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Move state message TRANSACTION +[77f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[780 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[781 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]sending state message TRANSACTION +[782 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message TRANSACTION from shim +[783 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[784 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0b41eb23]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[785 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[786 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[787 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Transaction completed. Sending COMPLETED +[788 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Move state message COMPLETED +[789 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[78a 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]send state message COMPLETED +[78b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message COMPLETED from shim +[78c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[78d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284]HandleMessage- COMPLETED. Notify +[78e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[78f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[790 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[791 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[792 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [313fa3e2-259d-4445-95c3-022062a81146] +[793 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[794 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[795 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc42179acc0 +[796 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[797 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[798 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[799 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[79a 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[79b 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc4217cf4a0, header 0xc42179acf0 +[79c 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[79d 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[79e 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c] +[79f 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[7a0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7a1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel +[7a2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel version: 1.0.4 +[7a3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c,syscc=true,proposal=0xc4217cf4a0,canname=lscc:1.0.4 +[7a4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[7a5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7a6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[7a7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]Inside sendExecuteMessage. Message TRANSACTION +[7a8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7a9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7aa 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]sendExecuteMsg trigger event TRANSACTION +[7ab 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Move state message TRANSACTION +[7ac 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7ad 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7ae 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]sending state message TRANSACTION +[7af 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Received message TRANSACTION from shim +[7b0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7b1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ec65cab1]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7b2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Transaction completed. Sending COMPLETED +[7b3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Move state message COMPLETED +[7b4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[7b5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]send state message COMPLETED +[7b6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Received message COMPLETED from shim +[7b7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[7b8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c]HandleMessage- COMPLETED. Notify +[7b9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[7ba 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[7bb 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[7bc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[7bd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7be 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[7bf 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel chaincode id: name:"lscc" +[7c0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[7c1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel version: 1.0.4 +[7c2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c,syscc=true,proposal=0xc4217cf4a0,canname=escc:1.0.4 +[7c3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[7c4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7c5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[7c6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]Inside sendExecuteMessage. Message TRANSACTION +[7c7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7c8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7c9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]sendExecuteMsg trigger event TRANSACTION +[7ca 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Move state message TRANSACTION +[7cb 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7cc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7cd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]sending state message TRANSACTION +[7ce 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Received message TRANSACTION from shim +[7cf 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7d0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ec65cab1]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7d1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[7d2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[7d3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Transaction completed. Sending COMPLETED +[7d4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Move state message COMPLETED +[7d5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[7d6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]send state message COMPLETED +[7d7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Received message COMPLETED from shim +[7d8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[7d9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c]HandleMessage- COMPLETED. Notify +[7da 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[7db 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[7dc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[7dd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[7de 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7df 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[7e0 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[7e1 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424da68a0 +[7e2 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[7e3 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[7e4 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[7e5 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[7e6 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[7e7 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424e74500, header 0xc424da68d0 +[7e8 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[7e9 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[7ea 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560] +[7eb 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[7ec 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [777d3720-fde9-4a58-9964-85ecf5cf9140] +[7ed 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel +[7ee 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel version: 1.0.4 +[7ef 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560,syscc=true,proposal=0xc424e74500,canname=lscc:1.0.4 +[7f0 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[7f1 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7f2 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[7f3 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]Inside sendExecuteMessage. Message TRANSACTION +[7f4 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7f5 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7f6 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]sendExecuteMsg trigger event TRANSACTION +[7f7 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Move state message TRANSACTION +[7f8 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7f9 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7fa 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]sending state message TRANSACTION +[7fb 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message TRANSACTION from shim +[7fc 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7fd 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c63148c7]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7fe 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.GetStateByRange.handleGetStateByRange.handleGetStateByRange -> DEBU [c63148c7]Sending GET_STATE_BY_RANGE +[7ff 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message GET_STATE_BY_RANGE from shim +[800 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[801 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func4.afterGetStateByRange -> DEBU Received GET_STATE_BY_RANGE, invoking get state from ledger +[802 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/common/ledger/util/leveldbhelper] GetStateRangeScanIterator.getStateRangeScanIterator.newResultsItr.GetStateRangeScanIterator.GetIterator -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[803 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/rwsetutil] getQueryResponse.Next.updateRangeQueryInfo.AddResult -> DEBU Adding a result +[804 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU Got keys and values. Sending RESPONSE +[805 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c63148c7]handleGetStateByRange serial send RESPONSE +[806 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message RESPONSE from shim +[807 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[808 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]before send +[809 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]after send +[80a 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c63148c7]Received RESPONSE, communicated (state:ready) +[80b 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.GetStateByRange.handleGetStateByRange.handleGetStateByRange -> DEBU [c63148c7]Received RESPONSE. Successfully got range +[80c 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.Close.handleQueryStateClose -> DEBU [c63148c7]Sending QUERY_STATE_CLOSE +[80d 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func4.afterGetStateByRange -> DEBU Exiting GET_STATE_BY_RANGE +[80e 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[80f 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message QUERY_STATE_CLOSE from shim +[810 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[811 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func8.afterQueryStateClose -> DEBU Received QUERY_STATE_CLOSE, invoking query state close from ledger +[813 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU Closed. Sending RESPONSE +[814 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c63148c7]handleQueryStateClose serial send RESPONSE +[815 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message RESPONSE from shim +[816 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[817 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]before send +[818 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]after send +[819 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c63148c7]Received RESPONSE, communicated (state:ready) +[81a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.Close.handleQueryStateClose -> DEBU [c63148c7]Received RESPONSE. Successfully got range +[81b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Transaction completed. Sending COMPLETED +[81c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Move state message COMPLETED +[81d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[81e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]send state message COMPLETED +[812 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func8.afterQueryStateClose -> DEBU Exiting QUERY_STATE_CLOSE +[81f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[820 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message COMPLETED from shim +[821 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[822 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560]HandleMessage- COMPLETED. Notify +[823 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[824 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[825 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[826 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[827 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [777d3720-fde9-4a58-9964-85ecf5cf9140] +[828 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[829 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel chaincode id: name:"lscc" +[82a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[82b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel version: 1.0.4 +[82c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560,syscc=true,proposal=0xc424e74500,canname=escc:1.0.4 +[82d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[82e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[82f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[830 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]Inside sendExecuteMessage. Message TRANSACTION +[831 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[832 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[833 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]sendExecuteMsg trigger event TRANSACTION +[834 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Move state message TRANSACTION +[835 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[836 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[837 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]sending state message TRANSACTION +[838 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message TRANSACTION from shim +[839 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[83a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c63148c7]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[83b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[83c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[83d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Transaction completed. Sending COMPLETED +[83e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Move state message COMPLETED +[83f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[840 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]send state message COMPLETED +[841 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message COMPLETED from shim +[842 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[843 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560]HandleMessage- COMPLETED. Notify +[844 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[845 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[846 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[847 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[848 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [777d3720-fde9-4a58-9964-85ecf5cf9140] +[849 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[84a 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[84b 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421d0bc20 +[84c 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[84d 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[84e 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[84f 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[850 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[851 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a11a90, header 0xc421d0bc50 +[852 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[853 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 +[854 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 channel id: +[855 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 channel id: version: 1.0.4 +[856 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757,syscc=true,proposal=0xc424a11a90,canname=qscc:1.0.4 +[857 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[858 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[859 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[85a 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [38e7f5c3]Inside sendExecuteMessage. Message TRANSACTION +[85b 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[85c 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[85d 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [38e7f5c3]sendExecuteMsg trigger event TRANSACTION +[85e 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]Move state message TRANSACTION +[85f 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[860 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[861 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]sending state message TRANSACTION +[862 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Received message TRANSACTION from shim +[863 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [38e7f5c3]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[864 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [38e7f5c3]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[865 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Invoke -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[866 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Transaction completed. Sending COMPLETED +[867 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Move state message COMPLETED +[868 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [38e7f5c3]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[869 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]send state message COMPLETED +[86a 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]Received message COMPLETED from shim +[86b 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[86c 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757]HandleMessage- COMPLETED. Notify +[86d 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 +[86e 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[86f 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[870 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[871 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[872 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[873 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421b1e2a0 +[874 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[875 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[876 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[877 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[878 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[879 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424e75450, header 0xc421b1e2d0 +[87a 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[87b 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 +[87c 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 channel id: +[87d 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 channel id: version: 1.0.4 +[87e 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979,syscc=true,proposal=0xc424e75450,canname=qscc:1.0.4 +[87f 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[880 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[881 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[882 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [fa2f592c]Inside sendExecuteMessage. Message TRANSACTION +[883 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[884 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[885 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [fa2f592c]sendExecuteMsg trigger event TRANSACTION +[886 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]Move state message TRANSACTION +[887 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[888 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[889 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]sending state message TRANSACTION +[88a 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Received message TRANSACTION from shim +[88b 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [fa2f592c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[88c 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [fa2f592c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[88d 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Invoke -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[88e 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber -> DEBU retrieveBlockByNumber() - blockNum = [2] +[88f 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.newBlockfileStream -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[17162] +[890 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.nextBlockBytes.nextBlockBytesAndPlacementInfo -> DEBU Remaining bytes=[14566], Going to peek [8] bytes +[891 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.nextBlockBytes.nextBlockBytesAndPlacementInfo -> DEBU Returning blockbytes - length=[5211], placementInfo={fileNum=[0], startOffset=[17162], bytesOffset=[17164]} +[892 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Transaction completed. Sending COMPLETED +[893 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Move state message COMPLETED +[894 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [fa2f592c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[895 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]send state message COMPLETED +[896 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]Received message COMPLETED from shim +[897 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[898 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979]HandleMessage- COMPLETED. Notify +[899 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 +[89a 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[89b 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[89c 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[89d 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit diff --git a/hyperledger_fabric/v1.4.2/solo/logs/dev_peer0.log b/hyperledger_fabric/v1.4.2/solo/logs/dev_peer0.log new file mode 100644 index 00000000..e66afa94 --- /dev/null +++ b/hyperledger_fabric/v1.4.2/solo/logs/dev_peer0.log @@ -0,0 +1,227 @@ +"2019-04-22 06:20:05.431 UTC [nodeCmd] serve -> INFO 001 Starting peer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64 + Chaincode: + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.7:7051" +"2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +"2019-04-22 06:20:05.439 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +"2019-04-22 06:20:05.440 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +"2019-04-22 06:20:05.539 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +"2019-04-22 06:20:05.573 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +"2019-04-22 06:20:05.573 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +"2019-04-22 06:20:05.590 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +"2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-04-22 06:20:05.619 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-04-22 06:20:05.638 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-04-22 06:20:05.643 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-04-22 06:20:05.644 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +"2019-04-22 06:20:05.646 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:20:05.648 UTC [cscc] Init -> INFO 014 Init CSCC" +"2019-04-22 06:20:05.648 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:20:05.650 UTC [qscc] Init -> INFO 016 Init QSCC" +"2019-04-22 06:20:05.651 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:20:05.652 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:20:05.652 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +"2019-04-22 06:20:05.653 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-04-22 06:20:05.653 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +"2019-04-22 06:20:05.653 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:20:05.654 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:20:06.572 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.571Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs +"2019-04-22 06:20:06.583 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:16.575Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.5807ms +"2019-04-22 06:20:06.588 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.587Z grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.3µs +"2019-04-22 06:20:09.194 UTC [endorser] callChaincode -> INFO 021 [][d7a70671] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:09.201 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +"2019-04-22 06:20:09.205 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +"2019-04-22 06:20:09.228 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +"2019-04-22 06:20:09.231 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-04-22 06:20:09.264 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-04-22 06:20:09.266 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:20:09.266 UTC [cscc] Init -> INFO 02b Init CSCC" +"2019-04-22 06:20:09.267 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:20:09.267 UTC [qscc] Init -> INFO 02d Init QSCC" +"2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:20:09.269 UTC [endorser] callChaincode -> INFO 030 [][d7a70671] Exit chaincode: name:"cscc" (74ms)" +"2019-04-22 06:20:09.269 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55716 grpc.code=OK grpc.call_duration=76.3852ms +"2019-04-22 06:20:10.473 UTC [endorser] callChaincode -> INFO 032 [][f9f9eb73] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:10.475 UTC [endorser] callChaincode -> INFO 033 [][f9f9eb73] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:20:10.475 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55724 grpc.code=OK grpc.call_duration=3.4108ms +"2019-04-22 06:20:11.426 UTC [endorser] callChaincode -> INFO 035 [][dabe5c8d] Entry chaincode: name:"qscc" " +"2019-04-22 06:20:11.429 UTC [endorser] callChaincode -> INFO 036 [][dabe5c8d] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:20:11.429 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55732 grpc.code=OK grpc.call_duration=3.4583ms +"2019-04-22 06:20:14.243 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-04-22 06:20:15.268 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-04-22 06:20:15.268 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +"2019-04-22 06:20:15.826 UTC [comm.grpc.server] 1 -> INFO 03b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.826Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.2µs +"2019-04-22 06:20:15.840 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.828Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2234ms +"2019-04-22 06:20:15.845 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.845Z grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=158.7µs +"2019-04-22 06:20:15.869 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.868Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.4µs +"2019-04-22 06:20:15.883 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.871Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8279ms +"2019-04-22 06:20:15.900 UTC [comm.grpc.server] 1 -> INFO 040 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.9Z grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.9369ms +"2019-04-22 06:20:15.916 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.914Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=949.4µs +"2019-04-22 06:20:15.957 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.2288ms +"2019-04-22 06:20:15.958 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.933Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=20.5323ms +"2019-04-22 06:20:15.995 UTC [comm.grpc.server] 1 -> INFO 044 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.994Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=188µs +"2019-04-22 06:20:16.014 UTC [comm.grpc.server] 1 -> INFO 045 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.998Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9576ms +"2019-04-22 06:20:16.015 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.144ms +"2019-04-22 06:20:17.640 UTC [endorser] callChaincode -> INFO 047 [][b0c8eda3] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:17.641 UTC [endorser] callChaincode -> INFO 048 [][b0c8eda3] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:17.642 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55776 grpc.code=OK grpc.call_duration=2.8919ms +"2019-04-22 06:20:18.273 UTC [ConnProducer] NewConnection -> ERRO 04a Failed connecting to orderer1.example.com:7050 , error: context deadline exceeded" +"2019-04-22 06:20:18.308 UTC [gossip.privdata] StoreBlock -> INFO 04b [businesschannel] Received block [1] from buffer" +"2019-04-22 06:20:18.351 UTC [gossip.gossip] JoinChan -> INFO 04c Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:18.352 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:20:18.366 UTC [committer.txvalidator] Validate -> INFO 050 [businesschannel] Validated block [1] in 58ms" +"2019-04-22 06:20:18.401 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [1] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=24ms state_commit=4ms)" +"2019-04-22 06:20:18.402 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [2] from buffer" +"2019-04-22 06:20:18.432 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.431Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.7µs +"2019-04-22 06:20:18.442 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.8527917s +"2019-04-22 06:20:18.443 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.439Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.2399ms +"2019-04-22 06:20:18.470 UTC [gossip.gossip] JoinChan -> INFO 056 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 057 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 058 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 059 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:20:18.526 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [2] in 122ms" +"2019-04-22 06:20:18.550 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [2] with 1 transaction(s) in 23ms (state_validation=1ms block_commit=14ms state_commit=5ms)" +"2019-04-22 06:20:18.622 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.621Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=488.1µs +"2019-04-22 06:20:18.638 UTC [comm.grpc.server] 1 -> INFO 05d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.629Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3762ms +"2019-04-22 06:20:18.649 UTC [gossip.comm] func1 -> WARN 05e peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 05f Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 060 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 061 Exiting" +"2019-04-22 06:20:18.680 UTC [comm.grpc.server] 1 -> INFO 062 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.676Z grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.0373ms +"2019-04-22 06:20:19.242 UTC [gossip.channel] reportMembershipChanges -> INFO 063 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +"2019-04-22 06:20:19.553 UTC [comm.grpc.server] 1 -> INFO 064 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:21.553Z grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.1µs +"2019-04-22 06:20:20.374 UTC [endorser] callChaincode -> INFO 065 [][2457efbe] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:20.375 UTC [endorser] callChaincode -> INFO 066 [][2457efbe] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:20.376 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55808 grpc.code=OK grpc.call_duration=2.6513ms +"2019-04-22 06:20:20.543 UTC [endorser] callChaincode -> INFO 068 [][1ba692c4] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:20.546 UTC [endorser] callChaincode -> INFO 069 [][1ba692c4] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:20:20.546 UTC [comm.grpc.server] 1 -> INFO 06a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=3.7147ms +"2019-04-22 06:20:20.568 UTC [endorser] callChaincode -> INFO 06b [businesschannel][8228dde0] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:20.571 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 06c successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:20.571 UTC [endorser] callChaincode -> INFO 06d [businesschannel][8228dde0] Exit chaincode: name:"_lifecycle" (4ms)" +"2019-04-22 06:20:20.582 UTC [comm.grpc.server] 1 -> INFO 06e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=15.3831ms +"2019-04-22 06:20:22.610 UTC [gossip.privdata] StoreBlock -> INFO 06f [businesschannel] Received block [3] from buffer" +"2019-04-22 06:20:22.658 UTC [committer.txvalidator] Validate -> INFO 070 [businesschannel] Validated block [3] in 47ms" +"2019-04-22 06:20:22.672 UTC [confighistory] HandleStateUpdates -> ERRO 071 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0036bd060)}" +"2019-04-22 06:20:22.687 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [3] with 1 transaction(s) in 19ms (state_validation=5ms block_commit=9ms state_commit=2ms)" +"2019-04-22 06:20:22.696 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:50.585Z grpc.peer_address=192.168.224.3:55814 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1106328s +"2019-04-22 06:20:24.209 UTC [gossip.channel] reportMembershipChanges -> INFO 074 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +"2019-04-22 06:20:25.090 UTC [gossip.privdata] StoreBlock -> INFO 075 [businesschannel] Received block [4] from buffer" +"2019-04-22 06:20:25.093 UTC [committer.txvalidator] Validate -> INFO 076 [businesschannel] Validated block [4] in 3ms" +"2019-04-22 06:20:25.105 UTC [confighistory] HandleStateUpdates -> ERRO 077 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00380de60)}" +"2019-04-22 06:20:25.130 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [4] with 1 transaction(s) in 35ms (state_validation=11ms block_commit=15ms state_commit=4ms)" +"2019-04-22 06:20:25.752 UTC [endorser] callChaincode -> INFO 079 [businesschannel][c7a707e5] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:25.761 UTC [lifecycle] QueryApprovalStatus -> INFO 07a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:25.761 UTC [endorser] callChaincode -> INFO 07b [businesschannel][c7a707e5] Exit chaincode: name:"_lifecycle" (9ms)" +"2019-04-22 06:20:25.762 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55832 grpc.code=OK grpc.call_duration=10.6769ms +"2019-04-22 06:20:26.400 UTC [endorser] callChaincode -> INFO 07d [][968d211d] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:26.401 UTC [endorser] callChaincode -> INFO 07e [][968d211d] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:26.401 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55842 grpc.code=OK grpc.call_duration=2.1624ms +"2019-04-22 06:20:26.600 UTC [endorser] callChaincode -> INFO 080 [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:26.604 UTC [lifecycle] QueryApprovalStatus -> INFO 081 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:26.606 UTC [lifecycle] CommitChaincodeDefinition -> INFO 082 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:26.607 UTC [endorser] callChaincode -> INFO 083 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (7ms)" +"2019-04-22 06:20:26.608 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55846 grpc.code=OK grpc.call_duration=9.3629ms +"2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [5] from buffer" +"2019-04-22 06:20:28.648 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [5] in 2ms" +"2019-04-22 06:20:28.650 UTC [lifecycle] update -> INFO 087 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:28.651 UTC [lifecycle] update -> INFO 088 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-04-22 06:20:28.651 UTC [cceventmgmt] HandleStateUpdates -> INFO 089 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-04-22 06:20:28.652 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 08a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-04-22 06:20:28.652 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 08b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-04-22 06:20:28.682 UTC [kvledger] CommitWithPvtData -> INFO 08c [businesschannel] Committed block [5] with 1 transaction(s) in 32ms (state_validation=8ms block_commit=12ms state_commit=3ms)" +"2019-04-22 06:20:28.740 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:55848 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1146288s +"2019-04-22 06:20:29.215 UTC [endorser] callChaincode -> INFO 08e [businesschannel][d82eabee] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:29.230 UTC [lifecycle] QueryChaincodeDefinition -> INFO 08f successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-04-22 06:20:29.233 UTC [endorser] callChaincode -> INFO 090 [businesschannel][d82eabee] Exit chaincode: name:"_lifecycle" (18ms)" +"2019-04-22 06:20:29.235 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55856 grpc.code=OK grpc.call_duration=27.47ms +"2019-04-22 06:20:29.934 UTC [endorser] callChaincode -> INFO 092 [businesschannel][32169d80] Entry chaincode: name:"exp02" " +"2019-04-22 06:20:29.954 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 093 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-04-22 06:21:05.510 UTC [endorser] callChaincode -> INFO 094 [businesschannel][32169d80] Exit chaincode: name:"exp02" (35610ms)" +"2019-04-22 06:21:05.510 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55864 grpc.code=OK grpc.call_duration=35.6134186s +"2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 096 [businesschannel] Received block [6] from buffer" +"2019-04-22 06:21:07.537 UTC [committer.txvalidator] Validate -> INFO 097 [businesschannel] Validated block [6] in 9ms" +"2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 098 [businesschannel] Committed block [6] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=20ms state_commit=8ms)" +"2019-04-22 06:21:10.723 UTC [endorser] callChaincode -> INFO 099 [businesschannel][99e7611d] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:10.727 UTC [endorser] callChaincode -> INFO 09a [businesschannel][99e7611d] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:21:10.729 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55900 grpc.code=OK grpc.call_duration=7.6767ms +"2019-04-22 06:21:10.941 UTC [endorser] callChaincode -> INFO 09c [businesschannel][967428f0] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:10.948 UTC [endorser] callChaincode -> INFO 09d [businesschannel][967428f0] Exit chaincode: name:"exp02" (7ms)" +"2019-04-22 06:21:10.950 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55906 grpc.code=OK grpc.call_duration=11.4845ms +"2019-04-22 06:21:11.190 UTC [endorser] callChaincode -> INFO 09f [businesschannel][f6ea81bf] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:11.193 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][f6ea81bf] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:21:11.194 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55912 grpc.code=OK grpc.call_duration=5.1112ms +"2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 0a2 [businesschannel] Received block [7] from buffer" +"2019-04-22 06:21:12.973 UTC [committer.txvalidator] Validate -> INFO 0a3 [businesschannel] Validated block [7] in 5ms" +"2019-04-22 06:21:13.010 UTC [kvledger] CommitWithPvtData -> INFO 0a4 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=24ms state_commit=2ms)" +"2019-04-22 06:21:13.373 UTC [endorser] callChaincode -> INFO 0a5 [businesschannel][2026f240] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.375 UTC [endorser] callChaincode -> INFO 0a6 [businesschannel][2026f240] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:21:13.376 UTC [comm.grpc.server] 1 -> INFO 0a7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55916 grpc.code=OK grpc.call_duration=4.7757ms +"2019-04-22 06:21:13.575 UTC [endorser] callChaincode -> INFO 0a8 [businesschannel][d0221f58] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.582 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][d0221f58] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:21:13.583 UTC [comm.grpc.server] 1 -> INFO 0aa unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55920 grpc.code=OK grpc.call_duration=9.5525ms +"2019-04-22 06:21:13.813 UTC [endorser] callChaincode -> INFO 0ab [businesschannel][96c67ee2] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.817 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][96c67ee2] Exit chaincode: name:"exp02" (4ms)" +"2019-04-22 06:21:13.818 UTC [comm.grpc.server] 1 -> INFO 0ad unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55926 grpc.code=OK grpc.call_duration=8.3056ms +"2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 0ae [businesschannel] Received block [8] from buffer" +"2019-04-22 06:21:15.603 UTC [committer.txvalidator] Validate -> INFO 0af [businesschannel] Validated block [8] in 2ms" +"2019-04-22 06:21:15.632 UTC [kvledger] CommitWithPvtData -> INFO 0b0 [businesschannel] Committed block [8] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +"2019-04-22 06:21:16.002 UTC [endorser] callChaincode -> INFO 0b1 [businesschannel][e59a9b97] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:16.005 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][e59a9b97] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:21:16.006 UTC [comm.grpc.server] 1 -> INFO 0b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55930 grpc.code=OK grpc.call_duration=5.1462ms +"2019-04-22 06:21:16.534 UTC [endorser] callChaincode -> INFO 0b4 [businesschannel][96bad1cb] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:16.536 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][96bad1cb] Exit chaincode: name:"qscc" (1ms)" +"2019-04-22 06:21:16.536 UTC [comm.grpc.server] 1 -> INFO 0b6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55936 grpc.code=OK grpc.call_duration=2.768ms +"2019-04-22 06:21:16.725 UTC [endorser] callChaincode -> INFO 0b7 [businesschannel][7962c131] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:16.727 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][7962c131] Exit chaincode: name:"qscc" (1ms)" +"2019-04-22 06:21:16.727 UTC [comm.grpc.server] 1 -> INFO 0b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55940 grpc.code=OK grpc.call_duration=2.8224ms +"2019-04-22 06:21:17.295 UTC [endorser] callChaincode -> INFO 0ba [businesschannel][4598da40] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.297 UTC [endorser] callChaincode -> INFO 0bb [businesschannel][4598da40] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.298 UTC [comm.grpc.server] 1 -> INFO 0bc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55948 grpc.code=OK grpc.call_duration=4.0243ms +"2019-04-22 06:21:17.547 UTC [endorser] callChaincode -> INFO 0bd [businesschannel][0384b6f2] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.548 UTC [endorser] callChaincode -> INFO 0be [businesschannel][0384b6f2] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.549 UTC [comm.grpc.server] 1 -> INFO 0bf unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55952 grpc.code=OK grpc.call_duration=2.6047ms +"2019-04-22 06:21:17.767 UTC [endorser] callChaincode -> INFO 0c0 [businesschannel][1f6e9f29] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.777 UTC [endorser] callChaincode -> INFO 0c1 [businesschannel][1f6e9f29] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.778 UTC [comm.grpc.server] 1 -> INFO 0c2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55956 grpc.code=OK grpc.call_duration=13.7744ms +"2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 0c3 [businesschannel] Received block [9] from buffer" +"2019-04-22 06:21:29.136 UTC [cauthdsl] deduplicate -> WARN 0c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.138 UTC [cauthdsl] deduplicate -> WARN 0c5 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] JoinChan -> INFO 0c6 Joining gossip network of channel businesschannel with 3 organizations" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c7 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c8 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c9 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0ca No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-04-22 06:21:29.200 UTC [committer.txvalidator] Validate -> INFO 0cb [businesschannel] Validated block [9] in 66ms" +"2019-04-22 06:21:29.220 UTC [comm.grpc.server] 1 -> INFO 0cc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.22Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.7µs +"2019-04-22 06:21:29.240 UTC [comm.grpc.server] 1 -> INFO 0cd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.224Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.5775ms +"2019-04-22 06:21:29.256 UTC [comm.grpc.server] 1 -> INFO 0ce unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.256Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.4µs +"2019-04-22 06:21:29.295 UTC [kvledger] CommitWithPvtData -> INFO 0cf [businesschannel] Committed block [9] with 1 transaction(s) in 94ms (state_validation=9ms block_commit=63ms state_commit=17ms)" +"2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m9.8442242s +"2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.272Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.8871ms +"2019-04-22 06:21:29.306 UTC [comm.grpc.server] 1 -> INFO 0d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.305Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.4µs +"2019-04-22 06:21:29.335 UTC [comm.grpc.server] 1 -> INFO 0d3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7535276s +"2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 0d4 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.311Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.8218ms +"2019-04-22 06:21:29.374 UTC [comm.grpc.server] 1 -> INFO 0d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.373Z grpc.peer_address=192.168.224.6:51284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=501.6µs +"2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d6 [][264d8e67] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d7 [][264d8e67] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:46.520 UTC [comm.grpc.server] 1 -> INFO 0d8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56068 grpc.code=OK grpc.call_duration=1.7062ms +"2019-04-22 06:21:47.446 UTC [endorser] callChaincode -> INFO 0d9 [][19533012] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:47.448 UTC [endorser] callChaincode -> INFO 0da [][19533012] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:21:47.448 UTC [comm.grpc.server] 1 -> INFO 0db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56080 grpc.code=OK grpc.call_duration=3.1853ms